Potential Security Issues in a Peer-to-Peer Network from a Database Perspective

Potential Security Issues in a Peer-to-Peer Network from a Database Perspective

Sridhar Asvathanarayanan
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
DOI: 10.4018/978-1-59904-937-3.ch073
Cite Chapter Cite Chapter

MLA

Asvathanarayanan, Sridhar. "Potential Security Issues in a Peer-to-Peer Network from a Database Perspective." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 1070-1079. https://doi.org/10.4018/978-1-59904-937-3.ch073

APA

Asvathanarayanan, S. (2008). Potential Security Issues in a Peer-to-Peer Network from a Database Perspective. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 1070-1079). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch073

Chicago

Asvathanarayanan, Sridhar. "Potential Security Issues in a Peer-to-Peer Network from a Database Perspective." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 1070-1079. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch073

Export Reference

Mendeley
Favorite

Abstract

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.