P2P has more uses than just sharing files such as music, videos and games, as is commonly thought. It can also...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
include Instant Messaging (IM) and grid computing architectures. In either case, the two biggest issues, to start, are confidentiality and authentication.
A Web of authentication needs to be set up so only trusted clients can communicate with each other. First, since multiple clients can access each other, without a central authentication server, the system has to have a way for two clients to authentication each other when communicating. This can be done through certificates or key exchanges, for example.
Confidentiality is best protected by encrypting the traffic between the peers once they authenticate each other. Again, key exchanges and agreed upon encryption protocols for the system can be used for this purpose, similar to the way SSL works.
Since P2P networks contain a mix of clients, not always designed for heavy traffic like a dedicated server, they can also suffer from availability issues. Some P2P networks can't handle the loads of their stronger client-server cousins.
Finally, P2P networks can be a den of malware and spread viruses among their clients. They should be carefully monitored for unwanted traffic from outside the network and usage policies should be in place restricting the types of files they can transfer and to which networks they can connect.
Learn how novel P2P server infrastructure may turn out to be a game-changer
Dig Deeper on Social media security risks and real-time communication security
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.