Show simple item record

dc.contributor.authorLiu, Yi
dc.contributor.authorElmazi, Donald
dc.contributor.authorSakamoto, Shinji
dc.contributor.authorBarolli, Leonard
dc.contributor.authorXhafa Xhafa, Fatos
dc.contributor.authorUchida, Kazunori
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament de Ciències de la Computació
dc.date.accessioned2016-04-27T13:02:52Z
dc.date.available2016-04-27T13:02:52Z
dc.date.issued2015
dc.identifier.citationLiu, Y., Elmazi, D., Sakamoto, S., Barolli, L., Xhafa, F., Uchida, K. A reliable system for JXTA-Overlay P2P platform considering number of authentic files, security and QoS parameters. A: IEEE International Conference on Advanced Information Networking and Applications Workshops. "29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangju, South Korea, March 24-27, 2015". Gwangju: 2015, p. 521-526.
dc.identifier.urihttp://hdl.handle.net/2117/86256
dc.description(c) 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
dc.description.abstractThe reliability of peers is very important for safe communication in Peer-to-Peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different services. However, in order to decide the peer reliability there are needed many parameters, which make the problem NP-hard. In this paper, we propose and evaluate a new fuzzy-based reliability system for P2P communications in JXTA-Overlay platform. In our system, we considered three input parameters: Number of Authentic Files (NAF), Security (S) and Quality of Service (QoS) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results have shown that the proposed system has a good performance and can choose reliable peers to connect in JXTA-Overlay platform.
dc.format.extent6 p.
dc.language.isoeng
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica
dc.subjectÀrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors
dc.subject.lcshComputer security
dc.subject.lcshArtificial intelligence
dc.subject.lcshBroadband communication systems
dc.subject.lcshComputer network protocols
dc.subject.otherfuzzy ystem
dc.subject.otherJXTA-Overlay platform
dc.subject.othernumber of authentic files
dc.subject.otherP2P
dc.subject.otherquality of service
dc.subject.otherreliability
dc.subject.othersecurity
dc.titleA reliable system for JXTA-Overlay P2P platform considering number of authentic files, security and QoS parameters
dc.typeConference report
dc.subject.lemacSeguretat informàtica
dc.subject.lemacIntel·ligència artificial
dc.subject.lemacTelecomunicació de banda ampla, Sistemes de
dc.subject.lemacProtocols de xarxes d'ordinadors
dc.identifier.doi10.1109/AINA.2015.231
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7098016&tag=1
dc.rights.accessOpen Access
local.identifier.drac17549968
dc.description.versionPostprint (author's final draft)
local.citation.authorLiu, Y.; Elmazi, D.; Sakamoto, S.; Barolli, L.; Xhafa, F.; Uchida, K.
local.citation.contributorIEEE International Conference on Advanced Information Networking and Applications Workshops
local.citation.pubplaceGwangju
local.citation.publicationName29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangju, South Korea, March 24-27, 2015
local.citation.startingPage521
local.citation.endingPage526


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

All rights reserved. This work is protected by the corresponding intellectual and industrial property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public communication or transformation of this work are prohibited without permission of the copyright holder