Open Problems in Data-Sharing Peer-to-Peer Systems

作者: Neil Daswani , Hector Garcia-Molina , Beverly Yang

DOI: 10.1007/3-540-36285-1_1

关键词: Order (exchange)Reputation systemService qualityData sharingPeer-to-peerComputer scienceComputer securityQuery languageScale (chemistry)Server

摘要: In a Peer-To-Peer (P2P) system, autonomous computers pool their resources (e.g., files, storage, compute cycles) in order to inexpensively handle tasks that would normally require large costly servers. The scale of these systems, "open nature," and the lack centralized control pose difficult performance security challenges. Much research has recently focused on tackling some challenges; this paper, we propose future directions for P2P highlight problems have not yet been studied great depth. We focus two particular aspects systems - search suggest several open important community address.

参考文章(33)
Emil Sit, Robert Morris, None, Security Considerations for Peer-to-Peer Distributed Hash Tables international workshop on peer to peer systems. pp. 261- 269 ,(2002) , 10.1007/3-540-45748-8_25
Hector Garcia-Molina, Beverly Yang, Improving Search in Peer-to-Peer Systems Stanford. ,(2001)
Yun Mao, Shiping Chen, Miguel Castro, Security for Structured Peer-to-peer Overlay Networks ,(2004)
Peter Biddle, Bryan Willman, Paul England, Marcus Peinado, The Darknet and the Future of Content Distribution Research Papers in Economics. ,(2003)
Marvin Theimer, Alec Wolman, Michael B. Jones, Stefan Saroiu, Nicholas J. A. Harvey, SkipNet: a scalable overlay network with practical locality properties usenix symposium on internet technologies and systems. pp. 9- 9 ,(2003)
Sylvia Ratnasamy, Ion Stoica, Scott Shenker, Routing Algorithms for DHTs: Some Open Questions international workshop on peer to peer systems. pp. 45- 52 ,(2002) , 10.1007/3-540-45748-8_4
Petros Maniatis, Mary Baker, Secure History Preservation Through Timeline Entanglement usenix security symposium. pp. 297- 312 ,(2002)
Matthew K. Wright, Brian Neil Levine, Clay Shields, Micah Adler, An Analysis of the Degradation of Anonymous Protocols. network and distributed system security symposium. pp. 1- 12 ,(2002)
Roger Dingledine, Michael J. Freedman, David Molnar, The free haven project: distributed anonymous storage service privacy enhancing technologies. pp. 67- 95 ,(2001) , 10.1007/3-540-44702-4_5
Kenneth L. Thompson, Robert Charles Pike, Distributed computing system ,(1991)