Potential Security Issues in a Peer-to-Peer Network from a Database Perspective

Potential Security Issues in a Peer-to-Peer Network from a Database Perspective

Sridhar Asvathanarayanan
Copyright: © 2005 |Pages: 14
ISBN13: 9781591404293|ISBN10: 1591404290|ISBN13 Softcover: 9781591404309|EISBN13: 9781591404316
DOI: 10.4018/978-1-59140-429-3.ch006
Cite Chapter Cite Chapter

MLA

Asvathanarayanan, Sridhar. "Potential Security Issues in a Peer-to-Peer Network from a Database Perspective." Peer-to-Peer Computing: The Evolution of a Disruptive Technology, edited by Ramesh Subramanian and Brian D. Goodman, IGI Global, 2005, pp. 131-144. https://doi.org/10.4018/978-1-59140-429-3.ch006

APA

Asvathanarayanan, S. (2005). Potential Security Issues in a Peer-to-Peer Network from a Database Perspective. In R. Subramanian & B. Goodman (Eds.), Peer-to-Peer Computing: The Evolution of a Disruptive Technology (pp. 131-144). IGI Global. https://doi.org/10.4018/978-1-59140-429-3.ch006

Chicago

Asvathanarayanan, Sridhar. "Potential Security Issues in a Peer-to-Peer Network from a Database Perspective." In Peer-to-Peer Computing: The Evolution of a Disruptive Technology, edited by Ramesh Subramanian and Brian D. Goodman, 131-144. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-429-3.ch006

Export Reference

Mendeley
Favorite

Abstract

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.