skip to main content
article

A survey of peer-to-peer content distribution technologies

Published:01 December 2004Publication History
Skip Abstract Section

Abstract

Distributed computer architectures labeled "peer-to-peer" are designed for the sharing of computer resources (content, storage, CPU cycles) by direct exchange, rather than requiring the intermediation or support of a centralized server or authority. Peer-to-peer architectures are characterized by their ability to adapt to failures and accommodate transient populations of nodes while maintaining acceptable connectivity and performance.Content distribution is an important peer-to-peer application on the Internet that has received considerable research attention. Content distribution applications typically allow personal computers to function in a coordinated manner as a distributed storage medium by contributing, searching, and obtaining digital content.In this survey, we propose a framework for analyzing peer-to-peer content distribution technologies. Our approach focuses on nonfunctional characteristics such as security, scalability, performance, fairness, and resource management potential, and examines the way in which these characteristics are reflected in---and affected by---the architectural design decisions adopted by current peer-to-peer systems.We study current peer-to-peer systems and infrastructure technologies in terms of their distributed object location and routing mechanisms, their approach to content replication, caching and migration, their support for encryption, access control, authentication and identity, anonymity, deniability, accountability and reputation, and their use of resource trading and management schemes.

References

  1. Agre, P. 2003. P2p and the promise of internet equality. Comm. ACM 46, 2 (Feb.), 39--42.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Anagnostakis, K. and Greenwald, M. 2004. Exchange-based incentive mechanisms for peer-to-peer file sharing. To Appear in the Proceedings of the 24th International Conference on Distributed Computing (ICDCS04).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Anderson, R. 2001. Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, New York.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Anderson, R., Needham, R., and Shamir, A. 1998. The steganographic file system. In Proceedings of International Workshop on Information Hiding (IWIH).]]Google ScholarGoogle Scholar
  5. Ayyasamy, S., Patel, C., and Lee, Y. 2003. Semantic web services and dht-based peer-to-peer networks: A new symbiotic relationship. In Proceedings of the 1st Workshop on Semantics in Peer-to-Peer and Grid Computing at the 12th International World Wide Web Conference. Budapest, Hungary.]]Google ScholarGoogle Scholar
  6. Bach, M. 1986. The Design of the UNIX Operating System. Prentice-Hall.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Balakrishnan, H., Kaashoek, M., Karger, D., R, M., and Stoica, I. 2003. Looking up data in p2p systems. Comm. ACM 46, 2 (Feb.), 43--48.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Berners-Lee, T., Hendler, J., and Lassila, O. 2001. The semantic web. Scientific American.]]Google ScholarGoogle Scholar
  9. Bernstein, P., Giunchiglia, F., Kementsietsidis, A., Mylopoulos, J., Serafini, L., and Zaihrayeu, I. 2002. Data management for peer-to-peer computing: A vision. In Proceedings of the Workshop on the Web and Databases (WebDB'02).]]Google ScholarGoogle Scholar
  10. Berthold, O., Federrath, H., and Kopsell, S. 1998. Web mixes: A system for anonymous and unobservable internet access. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. Berkeley, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Bonifacio, M., Cuel, R., Mameli, G., and Nori, M. 2002. A peer-to-peer architecture for distributed knowledge management. In Proceedings of the 3rd International Symposium on Multi-Agent Systems, Large Complex Systems, and E-Businesses (MALCEB'02).]]Google ScholarGoogle Scholar
  12. Broekstra, J., Ehrig, M., Haase, P., van Harmelen, F., Kampman, A., Sabou, M., Siebes, R., Staab, S., Stuckenschmidt, H., and Tempich, C. 2003. A metadata model for semantics-based peer-to-peer systems. In Proceedings of the 1st Workshop on Semantics in Peer-to-Peer and Grid Computing at the 12th International World Wide Web Conference. Budapest, Hungary.]]Google ScholarGoogle Scholar
  13. Buragohain, C., Agrawal, D., and Suri, S. 2003. A game theoretic framework for incentives in p2p systems. In Proceedings of the 3rd International Conference on Peer-to-Peer Computing.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Castano, S., Ferrara, A., Montanelli, S., Pagani, E., and Rossi, G. 2003. Ontology-addressable contents in p2p networks. In Proceedings of the 1st Workshop on Semantics in Peer-to-Peer and Grid Computing at the 12th International World Wide Web Conference. Budapest, Hungary.]]Google ScholarGoogle Scholar
  15. Castro, M., Druschel, P., Ganesh, A., A, R., and Wallach, D. 2002. Secure routing for structured peer-to-peer overlay networks. In Proceedings of the 5th Usenix Symposium on Operating Systems. Boston, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Castro, M., Druschel, P., Kermarree, A.-M., and Rowstron, A. 2002. Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE J. Select. Areas Comm. 20, 8 (Oct.).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Castro, M., Druschel, P., YC, H., and Rowstron, A. 2002. Exploiting network proximity in peer-to-peer overlay networks. In Proceedings of the International Workshop on Future Directions in Distributed Computing (FuDiCo'02).]]Google ScholarGoogle Scholar
  18. Chaum, D. 1981. Untraceable electronic mail, return addresses and digital pseudonyms. Comm. ACM 24, 2, 84--88.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., and Shenker, S. 2003. Making Gnutella-like p2p systems scalable. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe, Germany, 407--418.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Chen, Y., Edler, J., Goldberg, A., Gottlieb, A., Sobti, S., and Yanilos, P. 1999. A prototype implementation of archival intermemory. In Proceedings of the 4th ACM Conference on Digital Libraries. Berkeley, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Chen, Y., Katz, R., and Kubiatowicz, J. 2000. Scan: A dynamic, scalable and efficient content distribution network. In Proceedings of International Conference on Pervasive Computing.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Chun, B., Fu, Y., and Vahdat, A. 2003. Bootstrapping a distributed computational economy with peer-to-peer bartering. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems.]]Google ScholarGoogle Scholar
  23. Clake, I., Hong, T., Sanberg, O., and Wiley, B. 2002. Protecting free expression online with Freenet. IEEE Internet Comput. 6, 1 (Jan.-Feb.), 40--49.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Clarke, I., Sandberg, O., and Wiley, B. 2000. Freenet: A distributed anonymous information storage and /etrieval system. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. Berkeley, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Cohen, B. 2003. Incentives build robustness in bitorrent. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems.]]Google ScholarGoogle Scholar
  26. Cohen, E. and Shenker, S. 2001. Optimal replication in random search networks. Preprint.]]Google ScholarGoogle Scholar
  27. Cooper, B. and Garcia-Molina, H. 2002. Peer-to-peer resource trading in a reliable distributed system. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Crespo, A. and Garcia-Molina, H. 2002. Routing indices for peer-to-peer systems. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02). Vienna, Autria.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Dabek, F., Kaashoek, M., Karger, D., Morris, R., and Stoica, I. 2001. Wide-area cooperative storage with CFS. In Proceedings of the ACM SOSP'01 Conference. Banff, Canada.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Daswani, N., Garcia-Molina, H., and Yang, B. 2003. Open problems in data-sharing peer-to-peer systems. In Proceedings of the 9th International Conference on Database Theory. Siena, Italy.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Deering, S. 1998. Host extensions for IP multicasting. Tech. Rep. RFC-1112, IETF, (Aug.). SRI International, Menlo Park, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Dellarocas, C. 2001. Analyzing the economic efficiency of ebay-like online reputation mechanisms. In Proceedings of the 3rd ACM Conference on Electronic Commerce. Tampa, FL.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Dingledine, R., Freedman, M., and Molnar, D. 2000. The FreeHaven project: Distributed anonymous storage service. In Workshop on Design Issues in Anonymity and Unobservability. 67--95.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Dingledine, R., Freedman, M., and Molnar, D. 2001a. Peer-to-peer: Harnessing the Power of Disruptive Technology, 1st Ed. O'Reilly (Chapter 1. A network of peers: Peer-to-peer models through the history of the Internet, 3--20).]]Google ScholarGoogle Scholar
  35. Dingledine, R., Freedman, M., and Molnar, D. 2001b. Peer-to-peer: Harnessing the power of disruptive technology, 1st Ed. O'Reilly (Chapter 16. Accountability, 271--340).]]Google ScholarGoogle Scholar
  36. Douceur, J. 2002. The Sybill attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Druschel, P. and Rowstron, A. 2001. Past: A large-scale, persistent peer-to-peer storage utility. In Proceedings of the Eighth Workshop on Hot Topics in Operating Systems.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. FastTrack Accessed on-line 2003. The FastTrack web site. http://www.fasttrack.nu.]]Google ScholarGoogle Scholar
  39. Foster, I. 2000. Internet computing and the emerging grid. Nature Web Matters.]]Google ScholarGoogle Scholar
  40. Foster, I. and Iamnitchi, A. 2003. On death, taxes, and the convergence of peer-to-peer and grid computing. In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03). Berkley, CA.]]Google ScholarGoogle Scholar
  41. Foster, I., Kesselman, C., and Tuecke, S. 2001. The anatomy of the grid. Intl. J. Supercomput. Appl.]]Google ScholarGoogle Scholar
  42. Francis, P. 2000. Yoid: Extending the internet multicast architecture. Unpublished Paper, available on-line at http://www.aciri.org/yoid/docs/index.html.]]Google ScholarGoogle Scholar
  43. Freedman, M., Sit, E., Cates, J., and Morris, R. 2002. Introducing tarzan, a peer-to-peer anonymizing network layer. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Freedom 2003. The Freedom anonymity system web site. http://www.freedom.net.]]Google ScholarGoogle Scholar
  45. Garces-Erice, L., Felber, P., Biersack, E., Urvoy-Keller, G., and Ross, K. 2004. Data indexing in peer-to-peer dht networks. In Proceedings of the 24th IEEE International Conference on Distributed Computing Systems (ICDCS). Tokyo, Japan, 200--208.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. GenomeAtHome 2003. The genome@home project web site. http://genomeathome.stanford.edu/.]]Google ScholarGoogle Scholar
  47. Gnutella 2003. The Gnutella web site: http://gnutella.wego.com.]]Google ScholarGoogle Scholar
  48. Goldschlag, D., Reed, M., and Syverson, P. 1999. Onion routing for anonymous and private internet connections. Comm. ACM 42, 2, 39--41.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Groove 2003. The Groove web site. http://www. groove.net.]]Google ScholarGoogle Scholar
  50. Gupta, M., Judge, P., and Ammar, M. 2003. A reputation system for peer-to-peer networks. In Proceedings of the NOSSDAV'03 Conference. Monterey, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Halevy, A., Ives, Z., Mork, P., and Tatarinov, I. 2003. Piazza: Data management infrastructure for semantic web applications. In Proceedings of the 12th International Conference on World Wide Web. Budapest, Hungary, 556--567.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Hand, S. and Roscoe, T. 2002. Mnemosyne: Peer-to-peer steganographic storage. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Harding, G. 1968. The tragedy of the commons. Science 162, 1243--1248.]]Google ScholarGoogle ScholarCross RefCross Ref
  54. Harren, M., Hellerstein, J., Huebsch, R., Loo, B., Shenker, S., and Stoica, I. 2002. Complex queries in dht-based peer-to-peer networks. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Hazel, S. and Wiley, B. 2002. Achord: A variant of the Chord lookup service for use in censorship resistant peer-to-peerpublishing systems. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]]Google ScholarGoogle Scholar
  56. Heleher, P., Bhattacharjee, B., and Silaghi, B. 2002. Are vitrualized overlay networks too much of a good thing? In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Huebsch, R., Hellerstein, J., Lanham, N., and Thau Loo, B. 2003. Querying the internet with pier. In Proceedings of the 29th VLDB Conference. Berlin, Germany.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Hummel, K., Kotsis, G., and Kopecny, R. 2003. Peer profile driven group support for mobile learning teams. In Proceedings of the CATE/IASTED Conference. Rhodes, Greece.]]Google ScholarGoogle Scholar
  59. Ioannidis, J., Ioannidis, S., Keromytis, A., and Prevelakis, V. 2002. Fileteller: Paying and getting paid for file storage. In Proceedings of the Sixth International Conference on Financial Cryptography.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Jabber 2003. The Jabber web site. http://www.jabber.org/.]]Google ScholarGoogle Scholar
  61. Janakiraman, R., Waldvogel, M., and Zhang, Q. 2003. Indra: A peer-to-peer approach to network intrusion detection and prevention. In Proceedgings of 2003 IEEE WET ICE Workshop on Enterprize Security. Linz, Austria.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Jovanovic, M. 2000. Modelling large-scale peer-to-peer networks and a case study of Gnutella. M.S. thesis, Department of Electrical and Computer Engineering and Computer Science, University of Cincinnati, Cincinnati, OH 45221.]]Google ScholarGoogle Scholar
  63. Jovanovich, M., Annexstein, F., and Berman, K. 2001. Scalability issues in large peer-to-peer networks---a case study of Gnutella. Tech. rep., ECECS Department, University of Cincinnati, Cincinnati, OH 45221.]]Google ScholarGoogle Scholar
  64. Jxta 2003. The project JXTA web site. http://www.jxta.org.]]Google ScholarGoogle Scholar
  65. Kalogeraki, V., Gunopoulos, D., and Zeinalipour-Yazti, D. 2002. A local search mechanism for peer-to-peer networks. In Proceedings of the 11th International Conference on Information and Knowledge Management (CIKM'02). McLean, VA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The Eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web. ACM Press, 640--651.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Karger, D., Lehman, E., Leighton, F., Levine, M., Lewin, D., and Panigrahy, R. 1997. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing. El Paso, TX, 654--663.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Kazaa 2003. The Kazaa web site. http://www.kazaa.com.]]Google ScholarGoogle Scholar
  69. Keromytis, A., V, M., and Rubenstein, D. 2002. SOS: Secure overlay services. In Proceedings of the ACM SIGCOMM'02 Conference. Pittsburgh, PA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Khambatti, M., Dasgupta, P., and Ryu, K. 2004. A role-based trust model for peer-to-peer communities and dynamic coalitions. In Proceedings of the Second IEEE International Information Assurance Workshop. Charlotte, NC.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Khambatti, M., Ryu, K., and Dasgupta, P. 2003. Structuring peer-to-peer networks using interest-based communities. In Proceedings of the International Workshop On Databases, Information Systems and Peer-to-Peer Computing (P2PDBIS). Berlin, Germany.]]Google ScholarGoogle Scholar
  72. Kim, H. 2001. P2p overview. Tech. rep., Korea Advanced Institute of Technology. (Aug.)]]Google ScholarGoogle Scholar
  73. Kubiatowics, J. 2003. Extracting guarantees from chaos. Comm. ACM 46, 2 (Feb.), 33--38.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Kubiatowicz, J., Bindel, D., Chen, Y., Eaton, P., Geels, D., Gummadi, S., Weatherspoon, H., Weimer, W., Wells, C., and Zhao, B. 2000. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACM ASPLOS.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Lai, K., Feldman, M., Stoica, I., and Chuang, J. 2003. Incentives for cooperation in peer-to-peer networks. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems. Berkeley, CA.]]Google ScholarGoogle Scholar
  76. Lamport, L., Shostak, R., and Pease, M. 1982. The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3 (July), 382--401.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Larson, S., Snow, C., and Pande, V. 2003. Modern Methods in Computational Biology,. (Chapter Folding@Home and Genome@Home: Using distributed computing to tackle previously intractable problems in computational biology) Horizon Press.]]Google ScholarGoogle Scholar
  78. Lee, J. 2003. An end-user perspective on file-sharing systems. Comm. ACM 46, 2 (Feb.), 49--53.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Liben-Nowell, D., Balakrishnan, H., and Karger, D. 2002a. Analysis of the evolution of peer-to-peer systems. In Proceedings of the ACM Symposium on the Principles of Distributed Computing (PODC). Monterey, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Liben-Nowell, D., Balakrishnan, H., and Karger, D. 2002b. Observations on the dynamic evolution of peer-to-peer networks. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Loeser, A., Wolpers, M., Siberski, W., and Nejdl, W. 2003. Semantic overlay clusters within super-peer networks. In Proceedings of the International Workshop On Databases, Information Systems and Peer-to-Peer Computing (P2PDBIS). Berlin, Germany.]]Google ScholarGoogle Scholar
  82. Lv, Q., Cao, P., Cohen, E., Li, K., and Shenker, S. 2002. Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th ACM International Conference on Supercomputing (ICS'02). New York, NY.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Lv, Q., Ratnasamy, S., and Shenker, S. 2002. Can heterogeneity make Gnutella scalable? In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Mayamounkov, P. and Mazieres, D. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. MojoNation 2003. The MojoNation web site. http://www.mojonation.net.]]Google ScholarGoogle Scholar
  86. Nejdl, W., Wolf, B., Qu, C., Decker, S., Sintek, M., Naeve, A., Nilsson, M., Palmer, M., and Risch, T. 2003. Edutella: A p2p networking infrastructure based on rdf. In Proceedings of the 12th International Conference on World Wide Web. Budapest, Hungary.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Plaxton, C., Rajaraman, R., and Richa, A. 1997. Accessing nearby copies of replicated objects in a distributed environment. In Proceedings of ACM SPAA. ACM.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Rabin, M. 1989. Efficient dispersal of information for security, load balancing and fault tolerance. J. ACM 36, 2 (April), 335--348.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Ramaswamy, L. and Liu, L. 2003. Free riding: A new challenge for peer-to-peer file sharing systems. In Proceedings of the Hawaii International Conference on Systems Science.]]Google ScholarGoogle Scholar
  90. Ratnasamy, S., Francis, P., Handley, M., and Karp, R. 2001. A scalable content-addressable network. In Proceedings of SIGCOMM 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Reiter, M. and Rubin, A. 1999. Anonymous web transactions with Crowds. Comm. ACM 42, 2, 32--38.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Rhea, S., Wells, C., et al. 2001. Maintenance-free global storage. IEEE Internet Compu., 40--49.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Ripeanu, M. and Foster, I. 2002. Mapping the Gnutella network: Macroscopic properties of large-scale peer-to-peer systems. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Rowstron, A. and Druschel, P. 2001. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of IFIP/ACM Middleware. Heidelberg, Germany.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Saroiu, S., Gummadi, P., and Gribble, S. 2002. Exploring the design space of distributed peer-to-peer systems: Comparing the web, TRIAD and Chord/CFS. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Schoder, D. and Fischbach, K. 2003. Peer-to-peer prospects. Comm. ACM 46, 2 (Feb.), 27--29.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Serjantov, A. 2002. Anonymizing censorship resistant systems. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). MIT Faculty Club, Cambridge, MA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. SetiAtHome 2003. The seti@home project web site. http://setiathome.ssl.berkeley.edu.]]Google ScholarGoogle Scholar
  99. Shamir, A. 1979. How to share a secret. Comm. ACM 22, 612--613.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Shaw, M. and Garlan, D. 1995. Formulations and formalisms in software architecture. In Computer Science Today: Recent Trends and Developments, Lecture Notes in Computer Science, 1000. J. van Leeuwen, Ed. Springer Verlag, 307--323.]]Google ScholarGoogle Scholar
  101. Shirky, C. 2000. What is p2p... and what isnt't. Network, available online at http://www. oreillynet.com/pub/a/p2p/2000/11/24/shirky1 -whatisp2p.html. O'Reilly]]Google ScholarGoogle Scholar
  102. Stoica, I., Adkins, D., Zhuang, S., Shenker, S., and Surana, S. 2002. Internet indirection infrastructure. In Proceedings of the ACM SIGCOMM'02 Conference. Pittsburgh, PA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Stoica, I., Morris, R., Karger, D., Kaashoek, M., and Balakrishnan, H. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of SIGCOMM 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Stubblefield, A. and Wallach, D. 2001. Dagster:censorship-resistant publishing without replication. Tech. Rep. Technical Report TR01-380, Rice University, Dept. of Computer Science. (July).]]Google ScholarGoogle Scholar
  105. Sullivan III, W., Werthimer, D., Bowyer, S., Cobb, J., Gedye, D., and Anderson, D. 1997. A new major seti project based on project serendip data and 100,000 personal computers. In Proceedings of the 5th International Conference on Bioastronomy.]]Google ScholarGoogle Scholar
  106. Tsoumakos, D. and Roussopoulos, N. 2003. A comparison of peer-to-peer search methods. In Proceedings of the Sixth International Workshop on the Web and Databases. San Diego, CA.]]Google ScholarGoogle Scholar
  107. VanRenesse, R., Birman, K., Bozdog, A., Dimitriu, D., Singh, M., and Vogels, W. 2003. Heterogeneity-aware peer-to-peer multicast. In Proceedings of the 17th International Symposium on Distributed Computing (DISC2003). Sorrento, Italy.]]Google ScholarGoogle Scholar
  108. Vishnimurthy, V., Chandrakumar, S., and Gun Sirer, E. 2003. Karma: A secure economic framework for p2p resource sharing. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems.]]Google ScholarGoogle Scholar
  109. Vlachos, V., Androutsellis-Theotokis, S., and Spinellis, D. 2004. Security applications of peer-to-peer networks. Comput. Netw. J. 45, 2, 195--205.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Waldman, M., AD, R., and LF, C. 2000. Publius: A robust, tamper-evident, censorship-resistant web publishing system. In Proceedings of the 9th USENIX Security Symposium.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Waldman, M. and Mazi, D. 2001. Tangler: a censorship-resistant publishing system based on document entanglements. In Proceedings of the ACM Conference on Computer and Communications Security. 126--131.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Wallach, D. 2002. A survey of peer-to-peer security issues. In International Symposium on Software Security. Tokyo, Japan.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. Witten, I., Moffat, A., and Bell, T. 1999. Managing Gigabytes: Compressing and Indexing Documents and Images, 2nd ed. Morgan Kauffman.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Xiong, L. and Liu, L. 2002. Building trust in decentralized peer-to-peer communities. In Proceedings of the International Conference on Electronic Commerce Research.]]Google ScholarGoogle Scholar
  115. Yang, B. and Garcia-Molina, H. 2001. Comparing hybrid peer-to-peer systems. In Proceedings of the 27th VLDB Conference. Rome, Italy, 561--570.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Yang, B. and Garcia-Molina, H. 2002a. Designing a super-peer network. Tech. rep., Stanford University. (Feb.). Available online: http://dbpubs.stanford.edu/pub/2002-13.]]Google ScholarGoogle Scholar
  117. Yang, B. and Garcia-Molina, H. 2002b. Improving search in peer-to-peer networks. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02). Vienna, Autria.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Yu, B. and Singh, M. 2003. Incentive mechanisms for peer-to-peer systems. In Proceedings of the 2nd International Workshop on Agents and Peer-to-Peer Computing.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Zhang, X., Zhang, Q., Zhang, Z., Song, G., and Zhu, W. 2004. A construction of locality-aware overlay network: moverlay and its performance. IEEE JSAC Special Issue on Recent Advances on Service Overlay Networks.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Zhao, B., Joseph, A., and Kubiatowicz, J. 2002. Locality aware mechanisms for large-scale networks. In Proceedings of the International Workshop on Future Directions in Distributed Computing (FuDiCo2002).]]Google ScholarGoogle Scholar
  121. Zhao, B., Kubiatowicz, J., and Joseph, A. 2001. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Tech. Rep. UCB/CSD-01-1141, Computer Science Division, University of California, Berkeley, 94720. (April)]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Zhichen, X., Mahalingam, M., and Karlsson, M. 2002. Turning heterogeneity to an advantage in overlay routing. Tech. Rep. HPL-2002-126, HP Labs.]]Google ScholarGoogle Scholar
  123. Zhou, J., Dialani, V., De Roure, D., and Hall, W. 2003. A semantic search algorithm for peer-to-peer open hypermedia systems. In Proceedings of the 1st Workshop on Semantics in Peer-to-Peer and Grid Computing at the 12th International World Wide Web Conference. Budapest, Hungary.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A survey of peer-to-peer content distribution technologies

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image ACM Computing Surveys
                  ACM Computing Surveys  Volume 36, Issue 4
                  December 2004
                  129 pages
                  ISSN:0360-0300
                  EISSN:1557-7341
                  DOI:10.1145/1041680
                  Issue’s Table of Contents

                  Copyright © 2004 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 December 2004
                  Published in csur Volume 36, Issue 4

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • article

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader