IRM : Integrated File Replication And Consistency Maintenance In P2p Systems

In peer-to-peer file sharing systems, file replication and consistency maintenance are widely used techniques for high system performance. Despite significant interdependencies between them, these two issues are typically addressed separately. Most file replication methods rigidly specify replica nodes, leading to low replica utilization, unnecessary replicas and hence extra consistency maintenance overhead.

Most consistency maintenance methods propagate update messages based on message spreading or a structure without considering file replication dynamism, leading to inefficient file update and hence high possibility of outdated file response. This paper presents an Integrated file Replication and consistency Maintenance mechanism (IRM) that integrates the two techniques in a systematic and harmonized manner.

It achieves high efficiency in file replication and consistency maintenance at a significantly low cost. Instead of passively accepting replicas and updates, each node determines file replication and update polling by dynamically adapting to time-varying file query and update rates, which avoids unnecessary file replications and updates. Simulation results demonstrate the effectiveness of IRM in comparison with other approaches. It dramatically reduces overhead and yields significant improvements on the efficiency of both file replication and consistency maintenance approaches.

Existing System:

However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message.

We find that the existing PVD-based approaches cannot make full use of edge information for data hiding, and they are also poor at resisting some statistical analyses.

Proposed System:

We expand the LSB matching revisited image steganography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image.

For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters.

Module Description:

  • Module 1

  • File is sharing into IRM of equal size and k simultaneous connections are used. Client downloads a file from P2P at a time. Each peer sends a replication to the client.
  • Module 2

  • File is divided into many p2p and user downloads file replication sequentially one at time. The client randomly chooses the source peer at each time slot and download the file replication from each peer in the given time slots.
  • Module 3

  • Whenever a user completes a replication from its current source peer, the user randomly selects a new source peer and connects to it to retrieve a new p2p. Switching source peers based on chunk can reduce average time varying file download replications and updates.
  • Module 4

  • File replication is an effective method to deal with the problem of overload condition due to flash crowds or hot files. It distributes load over replica nodes and improves file query efficiency. File consistency maintenance to maintain the consistency between a file and its replicas is indispensable to file replication. Requiring that the replica nodes be reliably informed of all updates could be prohibitively costly in a large system.