Proactive Content Poisoning Computer Project Abstract

Introduction to Proactive Content Poisoning Computer Project:

The existing system is specially developed for the prevention of the collusive privacy for the peer-to-peer sharing of the files and documents. In today’s generation the peer-to-peer networks are widely used in the field of music, gaming, video stream and the developing of the standard software’s too… these networks are more costly to be bringing in use and also for transferring the big files and documents from one user to another user. The main target of this system is to put a break to the collusive privacy protection in the limits of the peer-to-peer networks.

After doing the testing and the experimental work of the existing system the results that were gained are it is very critical and also very hard to make the copyright of the peer-to-peer networks in the current life time. So replicate peer-to-peer networks were brought in use to get the experimental results in the successful manner. The standard features of the p2p networks were constructed by making use of these three architectures plans like first measuring the small parts of the replicate networks, Secondly measuring the download and upload time duration of the replace p2p networks and last is that both this are distinguished to protect the resulted experiences.

By observing the experimental results and the experiences the system is brought to the conclusion that the multitask use of the system index the networks are enough capable to detect the accomplice and helping the user to stop the piracy of the peer-to-peer networks in the whole department of the Peer-to-Peer networks.

The large observations that are done regarding the existing system are stopping the peer-to-peer network; the piracy is detected during the execution time duration only, making the choice of large peers, gets prevented by Unauthorized networks directly, all secured networks are protected, torrent networks are rejected and more work plans that the system provides to the users while the execution period.


Leave a Reply

Your email address will not be published. Required fields are marked *