Downloads: 137 | Views: 323
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.7 / 10
Bit Torrent (Peer to Peer Network): Antipiracy and Anonymity
Ashish Kumar Sharma, A. Prof. Neetu Sharma
Abstract: In this paper we have thoroughly analyzed Peer to Peer network and one of the most prominent file sharing Bit-Torrent protocol based on P2P network architecture which has been used as a major platform of pirating the copyrighted materials and imposing a threat of security as well, besides being a worthy tool of file sharing that supports almost all type and formats of data. It is also have been analyzed that P2P network is not a piracy but how it can help to reduce piracy so that antipiracy could be secured. Available tools and techniques used to support Antipiracy and Security are deeply analyzed that have been used so far by the law enforcement agencies and practitioners. So many attacks are discovered on the torrent systems and have been used to secure the antipiracy but there are also some legal complexities come into the system while addressing the issues depending upon to which country they belong. On the other hand the anonymity of the user (peer, client or node) on the Peer to peer networks is deeply discussed and further analyzed its need and methods to ensure the privacy of the users of Bit-Torrent (P2P) network. As it is important to know the source and destination pair information but new methods are also discovered for being Anonymous, used by legal and illegal way both and there are still new terminologies are being discovered to provide some solid solutions to these issues.
Keywords: Peer to Peer, BitTorrent, Torrent Poisoning, Antipiracy, Anonymity, Tor Networks
Edition: Volume 4 Issue 7, July 2015
Pages: 253 - 256
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 113
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2103 - 2107Analyzing Big Data Problem Using Hadoop and Cloud Technology
Hemlata S. Urade
Downloads: 114
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 435 - 439Recovering Multiple Failure Nodes in Wireless Sensor-Actor Networks with Least Distance Movements
J.Padma Kalyani, P. Anjaiah