Abstract
Distributed computer architectures labeled "peer-to-peer" are designed for the sharing of computer resources (content, storage, CPU cycles) by direct exchange, rather than requiring the intermediation or support of a centralized server or authority. Peer-to-peer architectures are characterized by their ability to adapt to failures and accommodate transient populations of nodes while maintaining acceptable connectivity and performance.Content distribution is an important peer-to-peer application on the Internet that has received considerable research attention. Content distribution applications typically allow personal computers to function in a coordinated manner as a distributed storage medium by contributing, searching, and obtaining digital content.In this survey, we propose a framework for analyzing peer-to-peer content distribution technologies. Our approach focuses on nonfunctional characteristics such as security, scalability, performance, fairness, and resource management potential, and examines the way in which these characteristics are reflected in---and affected by---the architectural design decisions adopted by current peer-to-peer systems.We study current peer-to-peer systems and infrastructure technologies in terms of their distributed object location and routing mechanisms, their approach to content replication, caching and migration, their support for encryption, access control, authentication and identity, anonymity, deniability, accountability and reputation, and their use of resource trading and management schemes.
- Agre, P. 2003. P2p and the promise of internet equality. Comm. ACM 46, 2 (Feb.), 39--42.]] Google ScholarDigital Library
- Anagnostakis, K. and Greenwald, M. 2004. Exchange-based incentive mechanisms for peer-to-peer file sharing. To Appear in the Proceedings of the 24th International Conference on Distributed Computing (ICDCS04).]] Google ScholarDigital Library
- Anderson, R. 2001. Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, New York.]] Google ScholarDigital Library
- Anderson, R., Needham, R., and Shamir, A. 1998. The steganographic file system. In Proceedings of International Workshop on Information Hiding (IWIH).]]Google Scholar
- Ayyasamy, S., Patel, C., and Lee, Y. 2003. Semantic web services and dht-based peer-to-peer networks: A new symbiotic relationship. In Proceedings of the 1st Workshop on Semantics in Peer-to-Peer and Grid Computing at the 12th International World Wide Web Conference. Budapest, Hungary.]]Google Scholar
- Bach, M. 1986. The Design of the UNIX Operating System. Prentice-Hall.]] Google ScholarDigital Library
- Balakrishnan, H., Kaashoek, M., Karger, D., R, M., and Stoica, I. 2003. Looking up data in p2p systems. Comm. ACM 46, 2 (Feb.), 43--48.]] Google ScholarDigital Library
- Berners-Lee, T., Hendler, J., and Lassila, O. 2001. The semantic web. Scientific American.]]Google Scholar
- Bernstein, P., Giunchiglia, F., Kementsietsidis, A., Mylopoulos, J., Serafini, L., and Zaihrayeu, I. 2002. Data management for peer-to-peer computing: A vision. In Proceedings of the Workshop on the Web and Databases (WebDB'02).]]Google Scholar
- Berthold, O., Federrath, H., and Kopsell, S. 1998. Web mixes: A system for anonymous and unobservable internet access. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. Berkeley, CA.]] Google ScholarDigital Library
- Bonifacio, M., Cuel, R., Mameli, G., and Nori, M. 2002. A peer-to-peer architecture for distributed knowledge management. In Proceedings of the 3rd International Symposium on Multi-Agent Systems, Large Complex Systems, and E-Businesses (MALCEB'02).]]Google Scholar
- Broekstra, J., Ehrig, M., Haase, P., van Harmelen, F., Kampman, A., Sabou, M., Siebes, R., Staab, S., Stuckenschmidt, H., and Tempich, C. 2003. A metadata model for semantics-based peer-to-peer systems. In Proceedings of the 1st Workshop on Semantics in Peer-to-Peer and Grid Computing at the 12th International World Wide Web Conference. Budapest, Hungary.]]Google Scholar
- Buragohain, C., Agrawal, D., and Suri, S. 2003. A game theoretic framework for incentives in p2p systems. In Proceedings of the 3rd International Conference on Peer-to-Peer Computing.]] Google ScholarDigital Library
- Castano, S., Ferrara, A., Montanelli, S., Pagani, E., and Rossi, G. 2003. Ontology-addressable contents in p2p networks. In Proceedings of the 1st Workshop on Semantics in Peer-to-Peer and Grid Computing at the 12th International World Wide Web Conference. Budapest, Hungary.]]Google Scholar
- Castro, M., Druschel, P., Ganesh, A., A, R., and Wallach, D. 2002. Secure routing for structured peer-to-peer overlay networks. In Proceedings of the 5th Usenix Symposium on Operating Systems. Boston, MA.]] Google ScholarDigital Library
- Castro, M., Druschel, P., Kermarree, A.-M., and Rowstron, A. 2002. Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE J. Select. Areas Comm. 20, 8 (Oct.).]] Google ScholarDigital Library
- Castro, M., Druschel, P., YC, H., and Rowstron, A. 2002. Exploiting network proximity in peer-to-peer overlay networks. In Proceedings of the International Workshop on Future Directions in Distributed Computing (FuDiCo'02).]]Google Scholar
- Chaum, D. 1981. Untraceable electronic mail, return addresses and digital pseudonyms. Comm. ACM 24, 2, 84--88.]] Google ScholarDigital Library
- Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., and Shenker, S. 2003. Making Gnutella-like p2p systems scalable. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe, Germany, 407--418.]] Google ScholarDigital Library
- Chen, Y., Edler, J., Goldberg, A., Gottlieb, A., Sobti, S., and Yanilos, P. 1999. A prototype implementation of archival intermemory. In Proceedings of the 4th ACM Conference on Digital Libraries. Berkeley, CA.]] Google ScholarDigital Library
- Chen, Y., Katz, R., and Kubiatowicz, J. 2000. Scan: A dynamic, scalable and efficient content distribution network. In Proceedings of International Conference on Pervasive Computing.]] Google ScholarDigital Library
- Chun, B., Fu, Y., and Vahdat, A. 2003. Bootstrapping a distributed computational economy with peer-to-peer bartering. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems.]]Google Scholar
- Clake, I., Hong, T., Sanberg, O., and Wiley, B. 2002. Protecting free expression online with Freenet. IEEE Internet Comput. 6, 1 (Jan.-Feb.), 40--49.]] Google ScholarDigital Library
- Clarke, I., Sandberg, O., and Wiley, B. 2000. Freenet: A distributed anonymous information storage and /etrieval system. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. Berkeley, CA.]] Google ScholarDigital Library
- Cohen, B. 2003. Incentives build robustness in bitorrent. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems.]]Google Scholar
- Cohen, E. and Shenker, S. 2001. Optimal replication in random search networks. Preprint.]]Google Scholar
- Cooper, B. and Garcia-Molina, H. 2002. Peer-to-peer resource trading in a reliable distributed system. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Crespo, A. and Garcia-Molina, H. 2002. Routing indices for peer-to-peer systems. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02). Vienna, Autria.]] Google ScholarDigital Library
- Dabek, F., Kaashoek, M., Karger, D., Morris, R., and Stoica, I. 2001. Wide-area cooperative storage with CFS. In Proceedings of the ACM SOSP'01 Conference. Banff, Canada.]] Google ScholarDigital Library
- Daswani, N., Garcia-Molina, H., and Yang, B. 2003. Open problems in data-sharing peer-to-peer systems. In Proceedings of the 9th International Conference on Database Theory. Siena, Italy.]] Google ScholarDigital Library
- Deering, S. 1998. Host extensions for IP multicasting. Tech. Rep. RFC-1112, IETF, (Aug.). SRI International, Menlo Park, CA.]] Google ScholarDigital Library
- Dellarocas, C. 2001. Analyzing the economic efficiency of ebay-like online reputation mechanisms. In Proceedings of the 3rd ACM Conference on Electronic Commerce. Tampa, FL.]] Google ScholarDigital Library
- Dingledine, R., Freedman, M., and Molnar, D. 2000. The FreeHaven project: Distributed anonymous storage service. In Workshop on Design Issues in Anonymity and Unobservability. 67--95.]] Google ScholarDigital Library
- Dingledine, R., Freedman, M., and Molnar, D. 2001a. Peer-to-peer: Harnessing the Power of Disruptive Technology, 1st Ed. O'Reilly (Chapter 1. A network of peers: Peer-to-peer models through the history of the Internet, 3--20).]]Google Scholar
- Dingledine, R., Freedman, M., and Molnar, D. 2001b. Peer-to-peer: Harnessing the power of disruptive technology, 1st Ed. O'Reilly (Chapter 16. Accountability, 271--340).]]Google Scholar
- Douceur, J. 2002. The Sybill attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Druschel, P. and Rowstron, A. 2001. Past: A large-scale, persistent peer-to-peer storage utility. In Proceedings of the Eighth Workshop on Hot Topics in Operating Systems.]] Google ScholarDigital Library
- FastTrack Accessed on-line 2003. The FastTrack web site. http://www.fasttrack.nu.]]Google Scholar
- Foster, I. 2000. Internet computing and the emerging grid. Nature Web Matters.]]Google Scholar
- Foster, I. and Iamnitchi, A. 2003. On death, taxes, and the convergence of peer-to-peer and grid computing. In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03). Berkley, CA.]]Google Scholar
- Foster, I., Kesselman, C., and Tuecke, S. 2001. The anatomy of the grid. Intl. J. Supercomput. Appl.]]Google Scholar
- Francis, P. 2000. Yoid: Extending the internet multicast architecture. Unpublished Paper, available on-line at http://www.aciri.org/yoid/docs/index.html.]]Google Scholar
- Freedman, M., Sit, E., Cates, J., and Morris, R. 2002. Introducing tarzan, a peer-to-peer anonymizing network layer. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Freedom 2003. The Freedom anonymity system web site. http://www.freedom.net.]]Google Scholar
- Garces-Erice, L., Felber, P., Biersack, E., Urvoy-Keller, G., and Ross, K. 2004. Data indexing in peer-to-peer dht networks. In Proceedings of the 24th IEEE International Conference on Distributed Computing Systems (ICDCS). Tokyo, Japan, 200--208.]] Google ScholarDigital Library
- GenomeAtHome 2003. The genome@home project web site. http://genomeathome.stanford.edu/.]]Google Scholar
- Gnutella 2003. The Gnutella web site: http://gnutella.wego.com.]]Google Scholar
- Goldschlag, D., Reed, M., and Syverson, P. 1999. Onion routing for anonymous and private internet connections. Comm. ACM 42, 2, 39--41.]] Google ScholarDigital Library
- Groove 2003. The Groove web site. http://www. groove.net.]]Google Scholar
- Gupta, M., Judge, P., and Ammar, M. 2003. A reputation system for peer-to-peer networks. In Proceedings of the NOSSDAV'03 Conference. Monterey, CA.]] Google ScholarDigital Library
- Halevy, A., Ives, Z., Mork, P., and Tatarinov, I. 2003. Piazza: Data management infrastructure for semantic web applications. In Proceedings of the 12th International Conference on World Wide Web. Budapest, Hungary, 556--567.]] Google ScholarDigital Library
- Hand, S. and Roscoe, T. 2002. Mnemosyne: Peer-to-peer steganographic storage. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Harding, G. 1968. The tragedy of the commons. Science 162, 1243--1248.]]Google ScholarCross Ref
- Harren, M., Hellerstein, J., Huebsch, R., Loo, B., Shenker, S., and Stoica, I. 2002. Complex queries in dht-based peer-to-peer networks. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Hazel, S. and Wiley, B. 2002. Achord: A variant of the Chord lookup service for use in censorship resistant peer-to-peerpublishing systems. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]]Google Scholar
- Heleher, P., Bhattacharjee, B., and Silaghi, B. 2002. Are vitrualized overlay networks too much of a good thing? In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Huebsch, R., Hellerstein, J., Lanham, N., and Thau Loo, B. 2003. Querying the internet with pier. In Proceedings of the 29th VLDB Conference. Berlin, Germany.]] Google ScholarDigital Library
- Hummel, K., Kotsis, G., and Kopecny, R. 2003. Peer profile driven group support for mobile learning teams. In Proceedings of the CATE/IASTED Conference. Rhodes, Greece.]]Google Scholar
- Ioannidis, J., Ioannidis, S., Keromytis, A., and Prevelakis, V. 2002. Fileteller: Paying and getting paid for file storage. In Proceedings of the Sixth International Conference on Financial Cryptography.]] Google ScholarDigital Library
- Jabber 2003. The Jabber web site. http://www.jabber.org/.]]Google Scholar
- Janakiraman, R., Waldvogel, M., and Zhang, Q. 2003. Indra: A peer-to-peer approach to network intrusion detection and prevention. In Proceedgings of 2003 IEEE WET ICE Workshop on Enterprize Security. Linz, Austria.]] Google ScholarDigital Library
- Jovanovic, M. 2000. Modelling large-scale peer-to-peer networks and a case study of Gnutella. M.S. thesis, Department of Electrical and Computer Engineering and Computer Science, University of Cincinnati, Cincinnati, OH 45221.]]Google Scholar
- Jovanovich, M., Annexstein, F., and Berman, K. 2001. Scalability issues in large peer-to-peer networks---a case study of Gnutella. Tech. rep., ECECS Department, University of Cincinnati, Cincinnati, OH 45221.]]Google Scholar
- Jxta 2003. The project JXTA web site. http://www.jxta.org.]]Google Scholar
- Kalogeraki, V., Gunopoulos, D., and Zeinalipour-Yazti, D. 2002. A local search mechanism for peer-to-peer networks. In Proceedings of the 11th International Conference on Information and Knowledge Management (CIKM'02). McLean, VA.]] Google ScholarDigital Library
- Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The Eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web. ACM Press, 640--651.]] Google ScholarDigital Library
- Karger, D., Lehman, E., Leighton, F., Levine, M., Lewin, D., and Panigrahy, R. 1997. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing. El Paso, TX, 654--663.]] Google ScholarDigital Library
- Kazaa 2003. The Kazaa web site. http://www.kazaa.com.]]Google Scholar
- Keromytis, A., V, M., and Rubenstein, D. 2002. SOS: Secure overlay services. In Proceedings of the ACM SIGCOMM'02 Conference. Pittsburgh, PA.]] Google ScholarDigital Library
- Khambatti, M., Dasgupta, P., and Ryu, K. 2004. A role-based trust model for peer-to-peer communities and dynamic coalitions. In Proceedings of the Second IEEE International Information Assurance Workshop. Charlotte, NC.]] Google ScholarDigital Library
- Khambatti, M., Ryu, K., and Dasgupta, P. 2003. Structuring peer-to-peer networks using interest-based communities. In Proceedings of the International Workshop On Databases, Information Systems and Peer-to-Peer Computing (P2PDBIS). Berlin, Germany.]]Google Scholar
- Kim, H. 2001. P2p overview. Tech. rep., Korea Advanced Institute of Technology. (Aug.)]]Google Scholar
- Kubiatowics, J. 2003. Extracting guarantees from chaos. Comm. ACM 46, 2 (Feb.), 33--38.]] Google ScholarDigital Library
- Kubiatowicz, J., Bindel, D., Chen, Y., Eaton, P., Geels, D., Gummadi, S., Weatherspoon, H., Weimer, W., Wells, C., and Zhao, B. 2000. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACM ASPLOS.]] Google ScholarDigital Library
- Lai, K., Feldman, M., Stoica, I., and Chuang, J. 2003. Incentives for cooperation in peer-to-peer networks. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems. Berkeley, CA.]]Google Scholar
- Lamport, L., Shostak, R., and Pease, M. 1982. The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3 (July), 382--401.]] Google ScholarDigital Library
- Larson, S., Snow, C., and Pande, V. 2003. Modern Methods in Computational Biology,. (Chapter Folding@Home and Genome@Home: Using distributed computing to tackle previously intractable problems in computational biology) Horizon Press.]]Google Scholar
- Lee, J. 2003. An end-user perspective on file-sharing systems. Comm. ACM 46, 2 (Feb.), 49--53.]] Google ScholarDigital Library
- Liben-Nowell, D., Balakrishnan, H., and Karger, D. 2002a. Analysis of the evolution of peer-to-peer systems. In Proceedings of the ACM Symposium on the Principles of Distributed Computing (PODC). Monterey, CA.]] Google ScholarDigital Library
- Liben-Nowell, D., Balakrishnan, H., and Karger, D. 2002b. Observations on the dynamic evolution of peer-to-peer networks. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Loeser, A., Wolpers, M., Siberski, W., and Nejdl, W. 2003. Semantic overlay clusters within super-peer networks. In Proceedings of the International Workshop On Databases, Information Systems and Peer-to-Peer Computing (P2PDBIS). Berlin, Germany.]]Google Scholar
- Lv, Q., Cao, P., Cohen, E., Li, K., and Shenker, S. 2002. Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th ACM International Conference on Supercomputing (ICS'02). New York, NY.]] Google ScholarDigital Library
- Lv, Q., Ratnasamy, S., and Shenker, S. 2002. Can heterogeneity make Gnutella scalable? In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Mayamounkov, P. and Mazieres, D. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- MojoNation 2003. The MojoNation web site. http://www.mojonation.net.]]Google Scholar
- Nejdl, W., Wolf, B., Qu, C., Decker, S., Sintek, M., Naeve, A., Nilsson, M., Palmer, M., and Risch, T. 2003. Edutella: A p2p networking infrastructure based on rdf. In Proceedings of the 12th International Conference on World Wide Web. Budapest, Hungary.]] Google ScholarDigital Library
- Plaxton, C., Rajaraman, R., and Richa, A. 1997. Accessing nearby copies of replicated objects in a distributed environment. In Proceedings of ACM SPAA. ACM.]] Google ScholarDigital Library
- Rabin, M. 1989. Efficient dispersal of information for security, load balancing and fault tolerance. J. ACM 36, 2 (April), 335--348.]] Google ScholarDigital Library
- Ramaswamy, L. and Liu, L. 2003. Free riding: A new challenge for peer-to-peer file sharing systems. In Proceedings of the Hawaii International Conference on Systems Science.]]Google Scholar
- Ratnasamy, S., Francis, P., Handley, M., and Karp, R. 2001. A scalable content-addressable network. In Proceedings of SIGCOMM 2001.]] Google ScholarDigital Library
- Reiter, M. and Rubin, A. 1999. Anonymous web transactions with Crowds. Comm. ACM 42, 2, 32--38.]] Google ScholarDigital Library
- Rhea, S., Wells, C., et al. 2001. Maintenance-free global storage. IEEE Internet Compu., 40--49.]] Google ScholarDigital Library
- Ripeanu, M. and Foster, I. 2002. Mapping the Gnutella network: Macroscopic properties of large-scale peer-to-peer systems. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Rowstron, A. and Druschel, P. 2001. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of IFIP/ACM Middleware. Heidelberg, Germany.]] Google ScholarDigital Library
- Saroiu, S., Gummadi, P., and Gribble, S. 2002. Exploring the design space of distributed peer-to-peer systems: Comparing the web, TRIAD and Chord/CFS. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- Schoder, D. and Fischbach, K. 2003. Peer-to-peer prospects. Comm. ACM 46, 2 (Feb.), 27--29.]] Google ScholarDigital Library
- Serjantov, A. 2002. Anonymizing censorship resistant systems. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarDigital Library
- SetiAtHome 2003. The seti@home project web site. http://setiathome.ssl.berkeley.edu.]]Google Scholar
- Shamir, A. 1979. How to share a secret. Comm. ACM 22, 612--613.]] Google ScholarDigital Library
- Shaw, M. and Garlan, D. 1995. Formulations and formalisms in software architecture. In Computer Science Today: Recent Trends and Developments, Lecture Notes in Computer Science, 1000. J. van Leeuwen, Ed. Springer Verlag, 307--323.]]Google Scholar
- Shirky, C. 2000. What is p2p... and what isnt't. Network, available online at http://www. oreillynet.com/pub/a/p2p/2000/11/24/shirky1 -whatisp2p.html. O'Reilly]]Google Scholar
- Stoica, I., Adkins, D., Zhuang, S., Shenker, S., and Surana, S. 2002. Internet indirection infrastructure. In Proceedings of the ACM SIGCOMM'02 Conference. Pittsburgh, PA.]] Google ScholarDigital Library
- Stoica, I., Morris, R., Karger, D., Kaashoek, M., and Balakrishnan, H. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of SIGCOMM 2001.]] Google ScholarDigital Library
- Stubblefield, A. and Wallach, D. 2001. Dagster:censorship-resistant publishing without replication. Tech. Rep. Technical Report TR01-380, Rice University, Dept. of Computer Science. (July).]]Google Scholar
- Sullivan III, W., Werthimer, D., Bowyer, S., Cobb, J., Gedye, D., and Anderson, D. 1997. A new major seti project based on project serendip data and 100,000 personal computers. In Proceedings of the 5th International Conference on Bioastronomy.]]Google Scholar
- Tsoumakos, D. and Roussopoulos, N. 2003. A comparison of peer-to-peer search methods. In Proceedings of the Sixth International Workshop on the Web and Databases. San Diego, CA.]]Google Scholar
- VanRenesse, R., Birman, K., Bozdog, A., Dimitriu, D., Singh, M., and Vogels, W. 2003. Heterogeneity-aware peer-to-peer multicast. In Proceedings of the 17th International Symposium on Distributed Computing (DISC2003). Sorrento, Italy.]]Google Scholar
- Vishnimurthy, V., Chandrakumar, S., and Gun Sirer, E. 2003. Karma: A secure economic framework for p2p resource sharing. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems.]]Google Scholar
- Vlachos, V., Androutsellis-Theotokis, S., and Spinellis, D. 2004. Security applications of peer-to-peer networks. Comput. Netw. J. 45, 2, 195--205.]] Google ScholarDigital Library
- Waldman, M., AD, R., and LF, C. 2000. Publius: A robust, tamper-evident, censorship-resistant web publishing system. In Proceedings of the 9th USENIX Security Symposium.]] Google ScholarDigital Library
- Waldman, M. and Mazi, D. 2001. Tangler: a censorship-resistant publishing system based on document entanglements. In Proceedings of the ACM Conference on Computer and Communications Security. 126--131.]] Google ScholarDigital Library
- Wallach, D. 2002. A survey of peer-to-peer security issues. In International Symposium on Software Security. Tokyo, Japan.]] Google ScholarDigital Library
- Witten, I., Moffat, A., and Bell, T. 1999. Managing Gigabytes: Compressing and Indexing Documents and Images, 2nd ed. Morgan Kauffman.]] Google ScholarDigital Library
- Xiong, L. and Liu, L. 2002. Building trust in decentralized peer-to-peer communities. In Proceedings of the International Conference on Electronic Commerce Research.]]Google Scholar
- Yang, B. and Garcia-Molina, H. 2001. Comparing hybrid peer-to-peer systems. In Proceedings of the 27th VLDB Conference. Rome, Italy, 561--570.]] Google ScholarDigital Library
- Yang, B. and Garcia-Molina, H. 2002a. Designing a super-peer network. Tech. rep., Stanford University. (Feb.). Available online: http://dbpubs.stanford.edu/pub/2002-13.]]Google Scholar
- Yang, B. and Garcia-Molina, H. 2002b. Improving search in peer-to-peer networks. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02). Vienna, Autria.]] Google ScholarDigital Library
- Yu, B. and Singh, M. 2003. Incentive mechanisms for peer-to-peer systems. In Proceedings of the 2nd International Workshop on Agents and Peer-to-Peer Computing.]] Google ScholarDigital Library
- Zhang, X., Zhang, Q., Zhang, Z., Song, G., and Zhu, W. 2004. A construction of locality-aware overlay network: moverlay and its performance. IEEE JSAC Special Issue on Recent Advances on Service Overlay Networks.]] Google ScholarDigital Library
- Zhao, B., Joseph, A., and Kubiatowicz, J. 2002. Locality aware mechanisms for large-scale networks. In Proceedings of the International Workshop on Future Directions in Distributed Computing (FuDiCo2002).]]Google Scholar
- Zhao, B., Kubiatowicz, J., and Joseph, A. 2001. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Tech. Rep. UCB/CSD-01-1141, Computer Science Division, University of California, Berkeley, 94720. (April)]] Google ScholarDigital Library
- Zhichen, X., Mahalingam, M., and Karlsson, M. 2002. Turning heterogeneity to an advantage in overlay routing. Tech. Rep. HPL-2002-126, HP Labs.]]Google Scholar
- Zhou, J., Dialani, V., De Roure, D., and Hall, W. 2003. A semantic search algorithm for peer-to-peer open hypermedia systems. In Proceedings of the 1st Workshop on Semantics in Peer-to-Peer and Grid Computing at the 12th International World Wide Web Conference. Budapest, Hungary.]] Google ScholarDigital Library
Index Terms
- A survey of peer-to-peer content distribution technologies
Recommendations
A Novel Hierarchical Overlay for Structured Peer-to-Peer Network
SCALCOM-EMBEDDEDCOM '09: Proceedings of the 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded ComputingLarge-scale P2P systems typically have hundreds of thousands of peers that involve frequent dynamic activities. Empirical studies have shown that participating nodes in P2P systems are not equivalent. Such heterogeneity has been taken into account in ...
A peer-to-peer content-distribution scheme resilient to key leakage
WISA'11: Proceedings of the 12th international conference on Information Security ApplicationsWe consider a problem of key leakage in peer-to-peer (P2P) content distribution. In content-distribution services, content is encrypted so that only legitimate users can access the content. Users (peers) cannot be fully trusted in a P2P network because ...
Bandwidth trading in BitTorrent-like P2P networks for content distribution
Bandwidth trading schemes give peers an incentive to provide upload bandwidth to other peers in a P2P network for fast file distribution. A popular example is the tit-for-tat strategy used in the BitTorrent protocol. Although this game theoretical ...
Comments