Skip to main content
Erschienen in: Programming and Computer Software 5/2018

01.09.2018

Decentralized Data Storages: Technologies of Construction

verfasst von: A. P. Kryukov, A. P. Demichev

Erschienen in: Programming and Computer Software | Ausgabe 5/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A comparative overview of decentralized data storages of different types is presented. It is shown that, although they have some common properties typical of all peer-to-peer (P2P) networks, the tasks they solve and, hence, the technologies used to construct storage facilities of different types are significantly different.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Handbook of Peer-to-Peer Networking, Shen, X.S., Yu, H., Buford, J., and Akon, M., Eds., vol. 34, Berlin: Springer, 2010.MATH Handbook of Peer-to-Peer Networking, Shen, X.S., Yu, H., Buford, J., and Akon, M., Eds., vol. 34, Berlin: Springer, 2010.MATH
2.
Zurück zum Zitat Daswani, N., Garcia-Molina, H., and Yang, B., Open problems in data-sharing peer-to-peer systems, Proc. 9th Int. Conf. Database Theory (ICDT), 2003, pp. 1–15. Daswani, N., Garcia-Molina, H., and Yang, B., Open problems in data-sharing peer-to-peer systems, Proc. 9th Int. Conf. Database Theory (ICDT), 2003, pp. 1–15.
3.
Zurück zum Zitat Napster. http://www.napster.com. Accessed February 15, 2018. Napster. http://​www.​napster.​com.​ Accessed February 15, 2018.
4.
Zurück zum Zitat The annotated Gnutella protocol specification. http:// rfc-gnutella.sourceforge.net/developer/stable. Accessed February 15, 2018. The annotated Gnutella protocol specification. http:// rfc-gnutella.sourceforge.net/developer/stable. Accessed February 15, 2018.
5.
Zurück zum Zitat Good, N.S. and Krekelberg, A., Usability and privacy: A study of Kazaa P2P file-sharing, Proc. SIGCHI Conf. Human Factors in Computing Systems, 2003, pp. 137–144. Good, N.S. and Krekelberg, A., Usability and privacy: A study of Kazaa P2P file-sharing, Proc. SIGCHI Conf. Human Factors in Computing Systems, 2003, pp. 137–144.
6.
Zurück zum Zitat Cohen, B., Incentives build robustness in BitTorrent, Proc. Workshop Economics of Peer-to-Peer systems, 2003, vol. 6, pp. 68–72. Cohen, B., Incentives build robustness in BitTorrent, Proc. Workshop Economics of Peer-to-Peer systems, 2003, vol. 6, pp. 68–72.
7.
Zurück zum Zitat Rizzo, F., Spoto, G.L., Brizzi, P., Bonino, D., Di Bella, G., and Castrogiovanni, P., Beekup: A distributed and safe P2P storage framework for IoE applications, Proc. 20th Conf. Innovations in Clouds, Internet, and Networks (ICIN), 2017, pp. 44–51. Rizzo, F., Spoto, G.L., Brizzi, P., Bonino, D., Di Bella, G., and Castrogiovanni, P., Beekup: A distributed and safe P2P storage framework for IoE applications, Proc. 20th Conf. Innovations in Clouds, Internet, and Networks (ICIN), 2017, pp. 44–51.
8.
Zurück zum Zitat Meng, X., A churn-aware durable data storage scheme in hybrid P2P networks, J. Supercomput., 2018, vol. 74, no. 1, pp. 183–204.CrossRef Meng, X., A churn-aware durable data storage scheme in hybrid P2P networks, J. Supercomput., 2018, vol. 74, no. 1, pp. 183–204.CrossRef
9.
Zurück zum Zitat Osorio, M. and Buil-Aranda, C., Storage balancing in P2P based distributed RDF data stores, 2017. https:// openreview.net/pdf?id=rJn8cDtIb. Osorio, M. and Buil-Aranda, C., Storage balancing in P2P based distributed RDF data stores, 2017. https:// openreview.net/pdf?id=rJn8cDtIb.
10.
Zurück zum Zitat Theyyampattil, M.R. and James, M., A survey on reputation systems and social network based peer-to-peer file sharing systems, Int. J. Comput., Inf., Syst. Sci., Eng., 2017, vol. 5, no. 3, pp. 1619–1626. Theyyampattil, M.R. and James, M., A survey on reputation systems and social network based peer-to-peer file sharing systems, Int. J. Comput., Inf., Syst. Sci., Eng., 2017, vol. 5, no. 3, pp. 1619–1626.
11.
Zurück zum Zitat Ravichandran, C.G. and Xavier, J.L., A survey of data sharing and security issues in P2P networks, Adv. Nat. Appl. Sci., 2017, vol. 11, no. 7, pp. 329–335. Ravichandran, C.G. and Xavier, J.L., A survey of data sharing and security issues in P2P networks, Adv. Nat. Appl. Sci., 2017, vol. 11, no. 7, pp. 329–335.
12.
Zurück zum Zitat Gurkin, Yu.N. and Semenov, Yu.A., File-sharing P2P networks: Basic principles, protocols, and security. http://www.ccc.ru/magazine/depot/06_11/read.html ?0302.htm. Accessed February 15, 2018. Gurkin, Yu.N. and Semenov, Yu.A., File-sharing P2P networks: Basic principles, protocols, and security. http://​www.​ccc.​ru/​magazine/​depot/​06_​11/​read.​html ?0302.htm. Accessed February 15, 2018.
13.
Zurück zum Zitat Malatras, A., State-of-the-art survey on P2P overlay networks in pervasive computing environments, J. Network Comput. Appl., 2015, vol. 55, pp. 1–23.CrossRef Malatras, A., State-of-the-art survey on P2P overlay networks in pervasive computing environments, J. Network Comput. Appl., 2015, vol. 55, pp. 1–23.CrossRef
14.
Zurück zum Zitat Meshkova, E., Riihijarvi, J., Petrova, M., and Mahonen, P., A survey on resource discovery mechanisms, peer-to-peer, and service discovery frameworks, Comput. Networks, 2008, vol. 52, no. 11, pp. 2097–2128.CrossRef Meshkova, E., Riihijarvi, J., Petrova, M., and Mahonen, P., A survey on resource discovery mechanisms, peer-to-peer, and service discovery frameworks, Comput. Networks, 2008, vol. 52, no. 11, pp. 2097–2128.CrossRef
15.
Zurück zum Zitat Tsoumakos, D. and Roussopoulos, N., Adaptive probabilistic search in peer-to-peer networks, Proc. 2nd Int. Workshop Peer-to-Peer Systems (IPTPS), 2003, pp. 102–109. Tsoumakos, D. and Roussopoulos, N., Adaptive probabilistic search in peer-to-peer networks, Proc. 2nd Int. Workshop Peer-to-Peer Systems (IPTPS), 2003, pp. 102–109.
16.
Zurück zum Zitat Yang, C. and Wu, J., A dominating-set-based routing in peer-to-peer networks, Proc. 2nd Int. Workshop Grid and Cooperative Computing (GCC), 2003. pp. 332–339. Yang, C. and Wu, J., A dominating-set-based routing in peer-to-peer networks, Proc. 2nd Int. Workshop Grid and Cooperative Computing (GCC), 2003. pp. 332–339.
17.
Zurück zum Zitat Mizrak, A.T., Cheng, Y., Kumar, V., and Savage, S., Structured superpeers: Leveraging heterogeneity to provide constant-time lookup, Proc. IEEE Workshop Internet Applications (WIAPP), 2003, pp. 104–111. Mizrak, A.T., Cheng, Y., Kumar, V., and Savage, S., Structured superpeers: Leveraging heterogeneity to provide constant-time lookup, Proc. IEEE Workshop Internet Applications (WIAPP), 2003, pp. 104–111.
18.
Zurück zum Zitat Li, J-S. and Chao, C-H., An efficient superpeer overlay construction and broadcasting scheme based on perfect difference graph, IEEE Trans. Parallel Distrib. Syst., 2010, vol. 21, no. 5, pp. 594–606.CrossRef Li, J-S. and Chao, C-H., An efficient superpeer overlay construction and broadcasting scheme based on perfect difference graph, IEEE Trans. Parallel Distrib. Syst., 2010, vol. 21, no. 5, pp. 594–606.CrossRef
19.
Zurück zum Zitat Lv, Q., Cao, P., Cohen, E., Li, K., and Shenker, S., Search and replication in unstructured peer-to-peer networks, Proc. 16th ACM Int. Conf. Supercomputing (ACM ICS), 2002, pp. 84–95. Lv, Q., Cao, P., Cohen, E., Li, K., and Shenker, S., Search and replication in unstructured peer-to-peer networks, Proc. 16th ACM Int. Conf. Supercomputing (ACM ICS), 2002, pp. 84–95.
20.
Zurück zum Zitat Barjini, H., Othman, M., Ibrahim, H., and Udzir, N., Shortcoming, problems, and analytical comparison for flooding-based search techniques in unstructured P2P networks, Peer-to-Peer Network Appl., 2012, vol. 5, pp. 1–13.CrossRef Barjini, H., Othman, M., Ibrahim, H., and Udzir, N., Shortcoming, problems, and analytical comparison for flooding-based search techniques in unstructured P2P networks, Peer-to-Peer Network Appl., 2012, vol. 5, pp. 1–13.CrossRef
21.
Zurück zum Zitat Brocco, A., Malatras, A., and Hirsbrunner, B., Enabling efficient information discovery in a self-structured grid, Future Gener. Comput. Syst., 2010, vol. 26, no. 6, pp. 838–846.CrossRef Brocco, A., Malatras, A., and Hirsbrunner, B., Enabling efficient information discovery in a self-structured grid, Future Gener. Comput. Syst., 2010, vol. 26, no. 6, pp. 838–846.CrossRef
22.
Zurück zum Zitat Ciancaglini, V., Liquori, L., and Hoang, G., Towards a common architecture to interconnect heterogeneous overlay networks, Proc. 17th Int. Conf. Parallel and Distributed Systems, 2011, pp. 817–822. Ciancaglini, V., Liquori, L., and Hoang, G., Towards a common architecture to interconnect heterogeneous overlay networks, Proc. 17th Int. Conf. Parallel and Distributed Systems, 2011, pp. 817–822.
23.
Zurück zum Zitat Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., and Balakrishnan, H., Chord: A scalable peer-to-peer lookup service for internet applications, IEEE/ACM Trans. Networking, 2003, vol. 11, no. 1, pp. 17–32.CrossRef Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., and Balakrishnan, H., Chord: A scalable peer-to-peer lookup service for internet applications, IEEE/ACM Trans. Networking, 2003, vol. 11, no. 1, pp. 17–32.CrossRef
24.
Zurück zum Zitat Varlamov, M.I. and Turdakov, D.Yu., A survey of methods for the extraction of information from Web resources, Program. Comput. Software, 2016, vol. 42, no. 5, pp. 279–291.CrossRef Varlamov, M.I. and Turdakov, D.Yu., A survey of methods for the extraction of information from Web resources, Program. Comput. Software, 2016, vol. 42, no. 5, pp. 279–291.CrossRef
25.
Zurück zum Zitat Clarke, I., Sandberg, O., Wiley, B., and Hong, T.W., Freenet: A distributed anonymous information storage and retrieval system, in Designing Privacy Enhancing Technologies, 2001, pp. 46–66. Clarke, I., Sandberg, O., Wiley, B., and Hong, T.W., Freenet: A distributed anonymous information storage and retrieval system, in Designing Privacy Enhancing Technologies, 2001, pp. 46–66.
26.
Zurück zum Zitat Manku, G.S., Bawa, M., and Raghavan, P., Symphony: Distributed hashing in a small world, Proc. 4th USENIX Symp. Internet Technology and Systems (USITS), 2003, p. 10–25. Manku, G.S., Bawa, M., and Raghavan, P., Symphony: Distributed hashing in a small world, Proc. 4th USENIX Symp. Internet Technology and Systems (USITS), 2003, p. 10–25.
27.
Zurück zum Zitat Gupta, I., Birman, K., Linga, P., Demers, A., and Renesse, R.V., Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead, Proc. 2nd Int. Workshop Peer-to-Peer Systems (IPTPS), 2003, pp. 160–169. Gupta, I., Birman, K., Linga, P., Demers, A., and Renesse, R.V., Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead, Proc. 2nd Int. Workshop Peer-to-Peer Systems (IPTPS), 2003, pp. 160–169.
28.
Zurück zum Zitat Demirci, M. and Ammar, M., Fair allocation of substrate resources among multiple overlay networks, Proc. IEEE Int. Symp. Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 2010, pp. 121–30. Demirci, M. and Ammar, M., Fair allocation of substrate resources among multiple overlay networks, Proc. IEEE Int. Symp. Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 2010, pp. 121–30.
29.
Zurück zum Zitat Hsu, C-J., Chung, W-C., Lai, K-C., Li, K-C., and Chung, Y-C., A novel approach for cooperative overlay-maintenance in multi-overlay environments, Proc. IEEE 2nd Int. Conf. Cloud Computing Technology and Science (CloudCom), 2010, pp. 81–88. Hsu, C-J., Chung, W-C., Lai, K-C., Li, K-C., and Chung, Y-C., A novel approach for cooperative overlay-maintenance in multi-overlay environments, Proc. IEEE 2nd Int. Conf. Cloud Computing Technology and Science (CloudCom), 2010, pp. 81–88.
30.
Zurück zum Zitat Peng, F., Malatras, A., Hirsbrunner, B., and Courant, M., Antom: Constructing multi-layer overlays for pervasive environments, Proc. 8th Int. Workshop Mobile P2P Computing (MP2P), 2012, pp. 1–6. Peng, F., Malatras, A., Hirsbrunner, B., and Courant, M., Antom: Constructing multi-layer overlays for pervasive environments, Proc. 8th Int. Workshop Mobile P2P Computing (MP2P), 2012, pp. 1–6.
31.
Zurück zum Zitat Buford, J., Yu, H., and Lua, E.K., P2P Networking and Applications, San Francisco: Morgan Kaufmann, 2008. Buford, J., Yu, H., and Lua, E.K., P2P Networking and Applications, San Francisco: Morgan Kaufmann, 2008.
32.
Zurück zum Zitat Serbu, S., Felber, P., and Kropf, P., Hypeer: Structured overlay with flexible-choice routing, Comput. Networks, 2011, vol. 55, no. 1, pp. 300–313.CrossRef Serbu, S., Felber, P., and Kropf, P., Hypeer: Structured overlay with flexible-choice routing, Comput. Networks, 2011, vol. 55, no. 1, pp. 300–313.CrossRef
33.
Zurück zum Zitat Balakrishnan, H., Kaashoek, M.F., Karger, D., Morris, R., and Stoica, I., Looking up data in P2P systems, Commun. ACM, 2003, vol. 46, no. 2, pp. 43–48.CrossRef Balakrishnan, H., Kaashoek, M.F., Karger, D., Morris, R., and Stoica, I., Looking up data in P2P systems, Commun. ACM, 2003, vol. 46, no. 2, pp. 43–48.CrossRef
34.
Zurück zum Zitat Ratnasamy, S., Francis, P., Handley, M., Karp, R., and Shenker, S., A scalable content-addressable network, ACM SIGCOMM Comput. Commun. Rev., 2001, vol. 31, pp. 161–172.CrossRefMATH Ratnasamy, S., Francis, P., Handley, M., Karp, R., and Shenker, S., A scalable content-addressable network, ACM SIGCOMM Comput. Commun. Rev., 2001, vol. 31, pp. 161–172.CrossRefMATH
35.
Zurück zum Zitat Rowstron, A. and Druschel, P., Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Proc. IFIP/ACM Int. Conf. Distributed Systems Platforms, 2001, pp. 329–350. Rowstron, A. and Druschel, P., Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Proc. IFIP/ACM Int. Conf. Distributed Systems Platforms, 2001, pp. 329–350.
36.
Zurück zum Zitat Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., and Kubiatowicz, J.D., Tapestry: A resilient global-scale overlay for service deployment, IEEE J. Sel. Areas Commun., 2004, vol. 22, no. 1, pp. 41–53.CrossRef Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., and Kubiatowicz, J.D., Tapestry: A resilient global-scale overlay for service deployment, IEEE J. Sel. Areas Commun., 2004, vol. 22, no. 1, pp. 41–53.CrossRef
37.
Zurück zum Zitat Maymounkov, P. and Mazieres, D., Kademlia: A peer-to-peer information system based on the XOR metric, Proc. 1st Int. Workshop Peer-to-Peer Systems (IPTPS), 2002, pp. 53–65. Maymounkov, P. and Mazieres, D., Kademlia: A peer-to-peer information system based on the XOR metric, Proc. 1st Int. Workshop Peer-to-Peer Systems (IPTPS), 2002, pp. 53–65.
38.
Zurück zum Zitat Malkhi, D., Naor, M., and Ratajczak, D., Viceroy: A scalable and dynamic emulation of the butterfly, Proc. 21st Symp. Principles of Distributed Computing (PODC), 2002, pp. 183–192. Malkhi, D., Naor, M., and Ratajczak, D., Viceroy: A scalable and dynamic emulation of the butterfly, Proc. 21st Symp. Principles of Distributed Computing (PODC), 2002, pp. 183–192.
39.
Zurück zum Zitat Aberer, K., Cudre-Mauroux, P., Datta, A., Despotovic, Z., Hauswirth, M., and Punceva, M., P-grid: A self-organizing structured P2P system, SIGMOD Record, 2003, vol. 32, no. 3, pp. 29–33.CrossRef Aberer, K., Cudre-Mauroux, P., Datta, A., Despotovic, Z., Hauswirth, M., and Punceva, M., P-grid: A self-organizing structured P2P system, SIGMOD Record, 2003, vol. 32, no. 3, pp. 29–33.CrossRef
40.
Zurück zum Zitat Harvey, N., Jones, M., Saroiu, S., Theimer, M., and Wolman, A., Skipnet: A scalable overlay network with practical locality properties, Proc. 4th USENIX Symp. Internet Technologies and Systems (USITS), 2003, pp. 1–38. Harvey, N., Jones, M., Saroiu, S., Theimer, M., and Wolman, A., Skipnet: A scalable overlay network with practical locality properties, Proc. 4th USENIX Symp. Internet Technologies and Systems (USITS), 2003, pp. 1–38.
41.
42.
Zurück zum Zitat Estrada, E., The Structure of Complex Networks: Theory and Applications, Oxford University Press, 2011.CrossRef Estrada, E., The Structure of Complex Networks: Theory and Applications, Oxford University Press, 2011.CrossRef
43.
Zurück zum Zitat Cohen, R. and Havlin, S., Complex Networks: Structure, Robustness, and Function, Cambridge University Press, 2010.CrossRefMATH Cohen, R. and Havlin, S., Complex Networks: Structure, Robustness, and Function, Cambridge University Press, 2010.CrossRefMATH
44.
Zurück zum Zitat Ciancaglini, V., Gaeta, R., Loti, R., and Liquori, L., Interconnection of large scale unstructured P2P networks: Modeling and analysis, Lect. Notes Comput. Sci., 2013, vol. 7984, pp. 183–197.CrossRef Ciancaglini, V., Gaeta, R., Loti, R., and Liquori, L., Interconnection of large scale unstructured P2P networks: Modeling and analysis, Lect. Notes Comput. Sci., 2013, vol. 7984, pp. 183–197.CrossRef
45.
Zurück zum Zitat Leitao, J., Marques, J.P., Pereira, J., and Rodrigues, L., X-bot: A protocol for resilient optimization of unstructured overlay networks, IEEE Trans. Parallel Distrib. Syst., 2012, vol. 23, no. 11, pp. 2175–2188.CrossRef Leitao, J., Marques, J.P., Pereira, J., and Rodrigues, L., X-bot: A protocol for resilient optimization of unstructured overlay networks, IEEE Trans. Parallel Distrib. Syst., 2012, vol. 23, no. 11, pp. 2175–2188.CrossRef
46.
Zurück zum Zitat Matos, R., Marques, C., and Sargento, S., Distributed approach to control and manage context-based multi-virtual networks, Mobile Networks Appl., 2012, vol. 17, no. 4, pp. 447–462.CrossRef Matos, R., Marques, C., and Sargento, S., Distributed approach to control and manage context-based multi-virtual networks, Mobile Networks Appl., 2012, vol. 17, no. 4, pp. 447–462.CrossRef
47.
Zurück zum Zitat Liang, J., Kumar, R., and Ross, K.W., The fasttrack overlay: A measurement study, Comput. Networks, 2006, vol. 50, no. 6, pp. 842–858.CrossRef Liang, J., Kumar, R., and Ross, K.W., The fasttrack overlay: A measurement study, Comput. Networks, 2006, vol. 50, no. 6, pp. 842–858.CrossRef
48.
Zurück zum Zitat Cohen, B., Incentives build robustness in BitTorrent, Proc. Workshop Economics of Peer-to-Peer systems, 2003, vol. 6, pp. 68–72. Cohen, B., Incentives build robustness in BitTorrent, Proc. Workshop Economics of Peer-to-Peer systems, 2003, vol. 6, pp. 68–72.
49.
Zurück zum Zitat Ripeanu, M., Iamnitchi, A., Foster, I., and Rogers, A., In search of simplicity: A self-organizing group communication overlay, Concurrency Comput. Pract. Exper., 2010, vol. 22, pp. 788–815. Ripeanu, M., Iamnitchi, A., Foster, I., and Rogers, A., In search of simplicity: A self-organizing group communication overlay, Concurrency Comput. Pract. Exper., 2010, vol. 22, pp. 788–815.
50.
Zurück zum Zitat Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., and Shenker, S., Making Gnutella-like P2P systems scalable, Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2003. pp. 407–418. Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., and Shenker, S., Making Gnutella-like P2P systems scalable, Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2003. pp. 407–418.
51.
Zurück zum Zitat Wouhaybi, R.H. and Campbell, A.T., Phenix: Supporting resilient low-diameter peer-to-peer topologies, Proc. 23rd Joint Conf. IEEE Computer and Communications Societies (INFOCOM), 2004, pp. 1–12. Wouhaybi, R.H. and Campbell, A.T., Phenix: Supporting resilient low-diameter peer-to-peer topologies, Proc. 23rd Joint Conf. IEEE Computer and Communications Societies (INFOCOM), 2004, pp. 1–12.
52.
Zurück zum Zitat Carchiolo, V., Malgeri, M., Mangioni, G., and Nicosia, V., An adaptive overlay network inspired by social behaviour, J. Parallel Distrib. Comput., 2010, vol. 70, no. 3, pp. 282–295.CrossRefMATH Carchiolo, V., Malgeri, M., Mangioni, G., and Nicosia, V., An adaptive overlay network inspired by social behaviour, J. Parallel Distrib. Comput., 2010, vol. 70, no. 3, pp. 282–295.CrossRefMATH
53.
Zurück zum Zitat Babaoglu, O., Canright, G., Deutsch, A., di Caro, G.A., Ducatelle, F., and Gambardella, L.M., Design patterns from biology for distributed computing, ACM Trans. Auton. Adapt. Syst., 2006, vol. 1, no. 1, pp. 26–66.CrossRef Babaoglu, O., Canright, G., Deutsch, A., di Caro, G.A., Ducatelle, F., and Gambardella, L.M., Design patterns from biology for distributed computing, ACM Trans. Auton. Adapt. Syst., 2006, vol. 1, no. 1, pp. 26–66.CrossRef
54.
Zurück zum Zitat Balasubramaniam, S., Leibnitz, K., Lio, P., Botvich, D., and Murata, M., Biological principles for future Internet architecture design, IEEE Commun. Mag., 2011, vol. 49, no. 7, pp. 44–52.CrossRef Balasubramaniam, S., Leibnitz, K., Lio, P., Botvich, D., and Murata, M., Biological principles for future Internet architecture design, IEEE Commun. Mag., 2011, vol. 49, no. 7, pp. 44–52.CrossRef
55.
Zurück zum Zitat Brocco, A. and Baumgart, I., A framework for a comprehensive evaluation of ant-inspired peer-to-peer protocols, Proc. 20th Euromicro Int. Conf. Parallel, Distributed, and Network-Based Processing (PDP), 2012, pp. 303–310. Brocco, A. and Baumgart, I., A framework for a comprehensive evaluation of ant-inspired peer-to-peer protocols, Proc. 20th Euromicro Int. Conf. Parallel, Distributed, and Network-Based Processing (PDP), 2012, pp. 303–310.
56.
Zurück zum Zitat Dressler, F. and Akan, O.B., Bio-inspired networking: From theory to practice, IEEE Commun. Mag., 2010, vol. 48, no. 11, pp. 176–83.CrossRefMATH Dressler, F. and Akan, O.B., Bio-inspired networking: From theory to practice, IEEE Commun. Mag., 2010, vol. 48, no. 11, pp. 176–83.CrossRefMATH
57.
Zurück zum Zitat Brocco, A., Malatras, A., and Hirsbrunner, B., Enabling efficient information discovery in a self-structured grid, Future Gener. Comput. Syst., 2010, vol. 26, no. 6, pp. 838–846.CrossRef Brocco, A., Malatras, A., and Hirsbrunner, B., Enabling efficient information discovery in a self-structured grid, Future Gener. Comput. Syst., 2010, vol. 26, no. 6, pp. 838–846.CrossRef
58.
Zurück zum Zitat Peng, F., Malatras, A., Hirsbrunner, B., and Courant, M., Antom: Constructing multi-layer overlays for pervasive environments, Proc. 8th Int. Workshop Mobile P2P Computing (MP2P), 2012, pp. 1–6. Peng, F., Malatras, A., Hirsbrunner, B., and Courant, M., Antom: Constructing multi-layer overlays for pervasive environments, Proc. 8th Int. Workshop Mobile P2P Computing (MP2P), 2012, pp. 1–6.
59.
Zurück zum Zitat Forestiero, A., Leonardi, E., Mastroianni, C., and Meo, M., Self-chord: A bio-inspired P2P framework for self-organizing distributed systems, IEEE/ACM Trans. Networking, 2010, vol. 18, no. 5, pp. 1651–1664.CrossRef Forestiero, A., Leonardi, E., Mastroianni, C., and Meo, M., Self-chord: A bio-inspired P2P framework for self-organizing distributed systems, IEEE/ACM Trans. Networking, 2010, vol. 18, no. 5, pp. 1651–1664.CrossRef
61.
Zurück zum Zitat Wallach, D., A survey of peer-to-peer security issues, Proc. Int. Symp. Software Security, Theories, and Systems, 2002, pp. 42–57. Wallach, D., A survey of peer-to-peer security issues, Proc. Int. Symp. Software Security, Theories, and Systems, 2002, pp. 42–57.
62.
Zurück zum Zitat Marmol, F.G. and Perez, G.M., State of the art in trust and reputation models in P2P networks, Handbook of Peer-to-Peer Networking, 2010, pp. 761–784. Marmol, F.G. and Perez, G.M., State of the art in trust and reputation models in P2P networks, Handbook of Peer-to-Peer Networking, 2010, pp. 761–784.
63.
Zurück zum Zitat Urdaneta, G., Pierre, G., and van Steen, M., A survey of DHT security techniques, ACM Comput. Surv., 2011, vol. 43, no. 2, pp. 1–49.CrossRefMATH Urdaneta, G., Pierre, G., and van Steen, M., A survey of DHT security techniques, ACM Comput. Surv., 2011, vol. 43, no. 2, pp. 1–49.CrossRefMATH
64.
Zurück zum Zitat Tormasov, A., Lysov, A., and Mazur, E., Distributed storage systems: Analysis, classification, and choice, Tr. Inst. Sistemnogo Program. Ross. Akad. Nauk, 2015, vol. 27, no. 6, pp. 225–252. Tormasov, A., Lysov, A., and Mazur, E., Distributed storage systems: Analysis, classification, and choice, Tr. Inst. Sistemnogo Program. Ross. Akad. Nauk, 2015, vol. 27, no. 6, pp. 225–252.
65.
Zurück zum Zitat Kuznetsov, S.D. and Poskonin, A.V., NoSQL data management systems, Program. Comput. Software, 2014, vol. 40, no. 6, pp. 323–332.CrossRef Kuznetsov, S.D. and Poskonin, A.V., NoSQL data management systems, Program. Comput. Software, 2014, vol. 40, no. 6, pp. 323–332.CrossRef
66.
Zurück zum Zitat Rabin, M.O., Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM, 1989, vol. 36, no. 2, pp. 335–348.MathSciNetCrossRefMATH Rabin, M.O., Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM, 1989, vol. 36, no. 2, pp. 335–348.MathSciNetCrossRefMATH
67.
Zurück zum Zitat Dimakis, A.G., Ramchandran, K., Wu, Y., and Suh, C., A survey on network codes for distributed storage, Proc. IEEE, 2011, vol. 99, no. 3, pp. 476–489.CrossRef Dimakis, A.G., Ramchandran, K., Wu, Y., and Suh, C., A survey on network codes for distributed storage, Proc. IEEE, 2011, vol. 99, no. 3, pp. 476–489.CrossRef
68.
Zurück zum Zitat Weatherspoon, H. and Kubiatowicz, J.D., Erasure coding vs. replication: A quantitative comparison, Proc. Int. Workshop Peer-to-Peer Systems (IPTPS), 2002, pp. 328–337. Weatherspoon, H. and Kubiatowicz, J.D., Erasure coding vs. replication: A quantitative comparison, Proc. Int. Workshop Peer-to-Peer Systems (IPTPS), 2002, pp. 328–337.
69.
Zurück zum Zitat Peterson, W.W. and Wesley, W., Error-Correcting Codes, MIT Press, 1972.MATH Peterson, W.W. and Wesley, W., Error-Correcting Codes, MIT Press, 1972.MATH
70.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D., Provable data possession at untrusted stores, Proc. 14th ACM Conf. Computer and Communications Security, 2007, pp. 598–609. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D., Provable data possession at untrusted stores, Proc. 14th ACM Conf. Computer and Communications Security, 2007, pp. 598–609.
71.
Zurück zum Zitat Ateniese, G., Pietro, R.D., Mancini, L.V., and Tsudik, G., Scalable and efficient provable data possession, Proc. 4th Int. Conf. Security and Privacy in Communication Networks, 2008, p. 9. Ateniese, G., Pietro, R.D., Mancini, L.V., and Tsudik, G., Scalable and efficient provable data possession, Proc. 4th Int. Conf. Security and Privacy in Communication Networks, 2008, p. 9.
72.
Zurück zum Zitat Wang, C., Ren, K., and Wang, J., Secure and practical outsourcing of linear programming in cloud computing, Proc. IEEE INFOCOM, 2011, pp. 820–828. Wang, C., Ren, K., and Wang, J., Secure and practical outsourcing of linear programming in cloud computing, Proc. IEEE INFOCOM, 2011, pp. 820–828.
73.
Zurück zum Zitat Juels, A. and Kaliski, B.S., PORs: Proofs of retrievability for large files, Proc. 14th ACM Conf. Computer and Communications Security, 2007, pp. 584–597. Juels, A. and Kaliski, B.S., PORs: Proofs of retrievability for large files, Proc. 14th ACM Conf. Computer and Communications Security, 2007, pp. 584–597.
74.
Zurück zum Zitat Dodis, Y., Vadhan, S., and Wichs, D., Proofs of retrievability via hardness implication, Proc. 6th Conf. Theory of Cryptography, 2009, pp. 109–127. Dodis, Y., Vadhan, S., and Wichs, D., Proofs of retrievability via hardness implication, Proc. 6th Conf. Theory of Cryptography, 2009, pp. 109–127.
75.
Zurück zum Zitat Sookhak, M., Talebian, H., Ahmed, E., Gani, A., and Khan, M.K., A review on remote data auditing in single cloud server: Taxonomy and open issues, J. Network Comput. Appl., 2014, vol. 43, pp. 121–141.CrossRef Sookhak, M., Talebian, H., Ahmed, E., Gani, A., and Khan, M.K., A review on remote data auditing in single cloud server: Taxonomy and open issues, J. Network Comput. Appl., 2014, vol. 43, pp. 121–141.CrossRef
76.
Zurück zum Zitat Mao, W., Modern Cryptography: Theory and Practice, Prentice Hall, 2005.MATH Mao, W., Modern Cryptography: Theory and Practice, Prentice Hall, 2005.MATH
77.
Zurück zum Zitat Szabo, N., The idea of smart contracts. http://www. fon.hum.uva.nl/rob/Courses/InformationInSpeech/ CDROM/Literature/LOTwinterschool2006/szabo. best.vwh.net/smart_contracts_idea.html. Accessed February 15, 2018. Szabo, N., The idea of smart contracts. http://​www.​ fon.hum.uva.nl/rob/Courses/InformationInSpeech/ CDROM/Literature/LOTwinterschool2006/szabo. best.vwh.net/smart_contracts_idea.html. Accessed February 15, 2018.
78.
Zurück zum Zitat BitFury Group, Public versus private blockchains. http: //bitfury.com/content/5-white-papers-research/public-vs-private-pt1-1.pdf. Accessed February 15, 2018. BitFury Group, Public versus private blockchains. http: //bitfury.com/content/5-white-papers-research/public-vs-private-pt1-1.pdf. Accessed February 15, 2018.
79.
Zurück zum Zitat Buterin, V., Ethereum white paper. https://github. com/ethereum/wiki/wiki/White-Paper. Accessed February 15, 2018. Buterin, V., Ethereum white paper. https://​github.​ com/ethereum/wiki/wiki/White-Paper. Accessed February 15, 2018.
80.
Zurück zum Zitat Wood, G., Ethereum: A secure decentralized generalised transaction ledger. http://gavwood.com/paper. pdf. Accessed February 15, 2018. Wood, G., Ethereum: A secure decentralized generalised transaction ledger. http://​gavwood.​com/​paper.​ pdf. Accessed February 15, 2018.
81.
Zurück zum Zitat Franco, P., Understanding Bitcoin, Cryptography, Engineering, and Economics, West Sussex: Wiley, 2015. Franco, P., Understanding Bitcoin, Cryptography, Engineering, and Economics, West Sussex: Wiley, 2015.
82.
Zurück zum Zitat Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M., and Morris, R., Designing a DHT for low latency and high throughput, Proc. 1st Symp. Networked Systems Design and Implementation (NSDI), 2004, vol. 4, pp. 85–98. Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M., and Morris, R., Designing a DHT for low latency and high throughput, Proc. 1st Symp. Networked Systems Design and Implementation (NSDI), 2004, vol. 4, pp. 85–98.
83.
Zurück zum Zitat Flocchini, P., Nayak, A., and Xie, M., Enhancing peer-to-peer systems through redundancy, IEEE J. Sel. Areas Commun., 2007, vol. 25, no. 1, pp. 15–24.CrossRef Flocchini, P., Nayak, A., and Xie, M., Enhancing peer-to-peer systems through redundancy, IEEE J. Sel. Areas Commun., 2007, vol. 25, no. 1, pp. 15–24.CrossRef
84.
Zurück zum Zitat Giordanelli, R., Mastroianni, C., and Meo, M., Bio-inspired P2P systems: The case of multidimensional overlay, ACM Trans. Auton. Adapt. Syst., 2012, vol. 7, no. 4, pp. 35:1–28. Giordanelli, R., Mastroianni, C., and Meo, M., Bio-inspired P2P systems: The case of multidimensional overlay, ACM Trans. Auton. Adapt. Syst., 2012, vol. 7, no. 4, pp. 35:1–28.
85.
Zurück zum Zitat Clarke, I., Sandberg, O., Wiley, B., and Hong, T.W., Freenet: A distributed anonymous information storage and retrieval system, Proc. Int. Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, 2001, pp. 46–66. Clarke, I., Sandberg, O., Wiley, B., and Hong, T.W., Freenet: A distributed anonymous information storage and retrieval system, Proc. Int. Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, 2001, pp. 46–66.
86.
Zurück zum Zitat Wilkinson, S., Boshevski, T., Brandoff, J., and Buterin, V., Storj: A peer-to-peer cloud storage network. https:// storj.io/storj.pdf. Accessed February 15, 2018. Wilkinson, S., Boshevski, T., Brandoff, J., and Buterin, V., Storj: A peer-to-peer cloud storage network. https:// storj.io/storj.pdf. Accessed February 15, 2018.
87.
Zurück zum Zitat Vorick, D. and Champine, L., Sia: Simple decentralized storage. https://sia.tech/sia.pdf. Accessed February 15, 2018. Vorick, D. and Champine, L., Sia: Simple decentralized storage. https://​sia.​tech/​sia.​pdf.​ Accessed February 15, 2018.
Metadaten
Titel
Decentralized Data Storages: Technologies of Construction
verfasst von
A. P. Kryukov
A. P. Demichev
Publikationsdatum
01.09.2018
Verlag
Pleiades Publishing
Erschienen in
Programming and Computer Software / Ausgabe 5/2018
Print ISSN: 0361-7688
Elektronische ISSN: 1608-3261
DOI
https://doi.org/10.1134/S0361768818050067

Weitere Artikel der Ausgabe 5/2018

Programming and Computer Software 5/2018 Zur Ausgabe