Loading

A Comprehensive Study on Threat Classification and Security Service in P2P
M.Seetha1, Y.J.Sudha Rani2
1M.Seetha, Professor, Dept of CSE G. Narayanamma Institute of Technology and Science St. Mary’s Engineering College, Deshmukhi, Nalgonda (A.P.), India.
2
Y.J.Sudha Rani. Associate Proffessor Department of CSE St. Mary’s Engineering College, Deshmukhi, Nalgonda (A.P.), India.
Manuscript received on July 17, 2012. | Revised Manuscript received on August 20, 2012. | Manuscript published on August 30, 2012. | PP: 266-268 | Volume-1 Issue-6, August 2012.  | Retrieval Number: F0683081612/2012©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Peer-to-Peer overlay network provide various services for the feature of storing, discovering and locating resources efficiently. P2P platform raise more security-related challenges while providing more services. WhenP2P security mainly focusing on the security problems on Overlay, this paper first shows the how to we classify threat. and how to we provide the security mechanisms to that network. This paper also discuss about the various security services. 
Keywords: peer peer, threat classification, security services, overlay, underlay.