skip to main content
survey
Public Access

A Survey of Socially Aware Peer-to-Peer Systems

Published:12 May 2016Publication History
Skip Abstract Section

Abstract

Peer-to-peer technologies have proven their strength in large-scale resource sharing and data transfer. Such systems, however, still need to address a variety of issues, including efficient routing, security, quality of service, incentives, and reputation. Recent research started leveraging social information to develop new and effective techniques to improve the performance of peer-to-peer systems. However, using social information is a double-edged sword, which can bring benefits as well as new challenges. This survey presents and classifies the types of social information that have been used so far in the design of peer-to-peer systems, how the social fabric has been used to facilitate transactions in the system, and some challenges caused by using social information.

References

  1. Osama Abboud, Konstantin Pussep, Aleksandra Kovacevic, Katharina Mohr, Sebastian Kaune, and Ralf Steinmetz. 2011. Enabling resilient P2P video streaming: Survey and analysis. Multimedia Systems 17, 3 (2011), 177--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AllJoyn. 2015. AllJoyn. Retrieved from https://allseenalliance.org/developers/learn/core/standard-core.Google ScholarGoogle Scholar
  3. Zahid Anwar, William Yurcik, Vivek Pandey, Asim Shankar, Indrail Gupta, and Roy H. Campbell. 2005. Leveraging social-network infrastructure to improve peer-to-peer overlay performance: Results from Orkut. In ACM Computing Research Repository.Google ScholarGoogle Scholar
  4. Robert Axelrod. 1985. The Evolution of Cooperation. Basic Books.Google ScholarGoogle Scholar
  5. Suman Banerjee, Bobby Bhattacharjee, and Christopher Kommareddy. 2002. Scalable Application Layer Multicast. Vol. 32. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Salman Baset and Henning Schulrinne. 2004. An analysis of the skype peer-to-peer internet telephony protocol. arXiv Preprint cs/0412017 (2004).Google ScholarGoogle Scholar
  7. Ehrhard Behrends. 2000. Introduction to Markov Chains: With Special Emphasis on Rapid Mixing. Vieweg Braunschweig.Google ScholarGoogle Scholar
  8. Yang Beverly and Hector Garcia-Molina. 2003. Designing a super-peer network. In Proceedings of the 19th International Conference on Data Engineering. IEEE, 49--60.Google ScholarGoogle ScholarCross RefCross Ref
  9. Nabhendra Bisnik and Alhussein Abouzeid. 2005. Modeling and analysis of random walk search algorithms in P2P networks. In Proceedings of the 2nd International Workshop on Hot Topics in Peer-to-Peer Systems. IEEE, 95--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jeremy Blackburn, Nicolas Kourtellis, and Adriana Iamnitchi. 2011. Vulnerability in socially-informed peer-to-peer systems. In Proceedings of the 4th Workshop on Social Network Systems. ACM, 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Yazan Boshmaf. 2012. A Quick Survey of Social Network-based Sybil Defenses. Technical Report. University of British Columbia, Vancouver, Canada.Google ScholarGoogle Scholar
  12. Yazan Boshmaf, Konstantin Beznosov, and Matei Ripeanu. 2013. Graph-based sybil detection in social and information systems. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM, 466--473. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. 2011. The socialbot network: When bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC’11). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pablo Branas-Garza and Maria P. Espinosa Alejos. 2006. Altruism with social roots: An emerging literature. Desarrollo and Sociedad 58 (2006), 245--260.Google ScholarGoogle ScholarCross RefCross Ref
  15. Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In Proc. of NSDI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron, and Dan S. Wallach. 2002. Secure routing for structured peer-to-peer overlay networks. ACM SIGOPS Operating Systems Review 36, SI (2002), 299--314. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Luther Chan, James Yong, Jiaqiang Bai, Ben Leong, and Raymond Tan. 2007. Hydra: A massively-multiplayer peer-to-peer architecture for the game developer. In Proceedings of the 6th ACM SIGCOMM Workshop on Network and System Support for Games. ACM, 37--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Xu Cheng and Jiangchuan Liu. 2012. Exploring interest correlation for peer-to-peer socialized video sharing. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) 8, 1 (2012), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Vicent Cholvi, Pascal Felber, and Ernst Biersack. 2004. Efficient search in unstructured peer-to-peer networks. European Transactions on Telecommunications 15, 6 (2004), 535--548.Google ScholarGoogle ScholarCross RefCross Ref
  20. Yang-Hua Chu, Sanjay Rao, Srinivasan Seshan, and Hui Zhang. 2002. A case for end system multicast. IEEE Journal on Selected Areas in Communications 2, 8 (2002), 1456--1471. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. John Chuang. 2004. Designing incentive mechanisms for peer-to-peer systems. In Proceedings of the 1st IEEE International Workshop on Grid Economics and Business Models (GECON’04). IEEE, 67--81.Google ScholarGoogle ScholarCross RefCross Ref
  22. Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. 2001. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability. 46--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Code42 Software. Inc. 2014. CrashPlan. Retrieved from https://www.code42.com/crashplan/.Google ScholarGoogle Scholar
  24. Leucio Antonio Cutillo, Refik Molva, and Thorsten Strufe. 2009. Safebook: A privacy preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47, 12 (December 2009), 94--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica. 2001. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP’01). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Neil Daswani, Hector Garcia-Molina, and Beverly Yang. 2003. Open problems in data-sharing peer-to-peer systems. In Database Theory—ICDT 2003. Springer, 1--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Matteo Dellamico and Yves Roudier. 2009. A measurement of mixing time in social networks. In Proceedings of the 5th International Workshop on Security and Trust Management.Google ScholarGoogle Scholar
  28. Diaspora. 2014. The Community-Run, Distributed Social-Network. Retrieved from https://joindiaspora.com/.Google ScholarGoogle Scholar
  29. Anhai Doan, Raghu Ramakrishnan, and Alon Halevy. 2011. Crowdsourcing systems on the World-Wide Web. Communications of the ACM 54, 4 (2011), 86--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. John R. Douceur. 2002. The sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Dan Dumitriu, E. Knightly, Aleksandar Knightly, Ion Stoica, and Willy Zwaenepoel. 2005. Denial-of-service resilience in peer-to-peer file sharing systems. In ACM SIGMETRICS Performance Evaluation Review, Vol. 33. ACM, 38--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Brynn M. Evans and Ed H. Chi. 2008. Towards a model of understanding social search. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work. ACM, 485--494. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Reza Farahbakhsh, Noel Crespi, Ángel Cuevas, Sraddha Adhikari, Mehdi Mani, and Teerapat Sanguankotchakorn. 2012. socP2P: P2P content discovery enhancement by considering social networks characteristics. In Proceedings of the 2012 IEEE Symposium on Computers and Communications (ISCC). IEEE, 000530--000533. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Santo Fortunato. 2010. Community detection in graphs. Physics Reports 486, 3 (2010), 75--174.Google ScholarGoogle ScholarCross RefCross Ref
  35. Michael J. Freeman, Eric Freudenthal, and David Mazieres. 2004. Democratizing content publication with coral. In NSDI, Vol. 4. 18--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Noah E. Friedkin. 1983. Horizons of observability and limits of informal control in organizations. Social Forces 62, 6 (March 1983), 54--77.Google ScholarGoogle ScholarCross RefCross Ref
  37. Eric Gilbert and Karrie Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 211--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Michelle Girvan and M. E. J. Newman. 2002. Community structure in social and biological networks. Proceedings of the National Academy of Science (PANS) 99 (2002), 7821--7826.Google ScholarGoogle ScholarCross RefCross Ref
  39. Gnutella. 2013. Homepage. Retrieved from https://www.gnutella.com/.Google ScholarGoogle Scholar
  40. Kalman Graffi, Christian Gross, Dominik Stingl, Daniel Hartung, Aleksandra Kovacevic, and Ralf Steinmetz. 2011. LifeSocial.KOM: A secure and p2p-based solution for online social networks. In Proceedings of the IEEE Consumer Communications and Networking Conference (IEEE CCNC’11).Google ScholarGoogle ScholarCross RefCross Ref
  41. Mark S. Granovetter. 1973. The strength of weak ties. American Journal of Sociology 78, 6 (1973).Google ScholarGoogle ScholarCross RefCross Ref
  42. Mark S. Granovetter. 1974. A study of contacts and careers. Harvard University Press, Cambridge, MA (1974).Google ScholarGoogle Scholar
  43. Anjali Gupta, Barbara Liskov, and Rodrigo Rodrigues. 2004. Efficient routing for peer-to-peer overlays. In NSDI, Vol. 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Indranil Gupta, Ken Birman, Prakash Linga, Al Demers, and Robbert van Renesse. 2003a. Kelips: Building an efficient and stable p2p DHT through increased memory and background overhead. In Peer-to-Peer Systems II, M. Frans Kaashoek and Ion Stoica (Eds.). Lecture Notes in Computer Science, Vol. 2735. Springer, Berlin, 160--169. DOI:http://dx.doi.org/10.1007/978-3-540-45172-3_15Google ScholarGoogle Scholar
  45. Minaxi Gupta, Paul Judge, and Mostafa Ammar. 2003b. A reputation system for peer-to-peer networks. In Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video. ACM, 144--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Ahsan Habib and John Chuang. 2004. Incentive mechanism for peer-to-peer media streaming. In 12th IEEE International Workshop on Quality of Service (IWQOS’04). IEEE, 171--180.Google ScholarGoogle ScholarCross RefCross Ref
  47. Sudheendra Hangal, Diana Maclean, Monica S. Lam, and Jeffery Heer. 2010. All friends are not equal: Using weights in social graphs to improve search. In In 4th ACM Workshop on SONAM.Google ScholarGoogle Scholar
  48. Jianming He, Wesley W. Chu, and Zhenyu Victor Liu. 2006. Inferring privacy information from social networks. In Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics (ISI’06), 154--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Mohamed Hefeeda. 2004. Peer-to-Peer Systems: A Comprehensive Survey. Technical Report. School of Computing Science, Simon Fraser University.Google ScholarGoogle Scholar
  50. Xiaojun Hei, Chao Liang, Jian Liang, Yon Liu, and Keith W. Ross. 2007. A measurement study of a large-scale P2P IPTV system. IEEE Transactions on Multimedia 9, 8 (2007), 1672--1687. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Todd Herberlein and Matt Bishop. 1996. Attack class: Address spoofing. In Proceedings of the 19th National Information Systems Security Conference. 371--377.Google ScholarGoogle Scholar
  52. Cheng Huang, Jin Li, and Keith W. Ross. 2007. Can internet video-on-demand be profitable? ACM SIGCOMM Computer Communication Review 37, 4 (2007), 133--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Jiaqing Huang, Qingyuan Liu, Zhibin Lei, and Dah Ming Chiu. 2012. Applications of social networks in peer-to-peer networks. In Computational Social Networks. Springer, 301--327.Google ScholarGoogle Scholar
  54. Daniel Hughes, Geoff Coulson, and James Walkerdine. 2005. Free riding on Gnutella revisited: The bell tolls? IEEE Distributed Systems Online 6, 6 (June 2005), 1541--4922. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Adriana Iamnitchi, Jeremy Blackburn, and Nicolas Kourtellis. 2012. The social hourglass: An infrastructure for socially aware applications and services. IEEE Internet Computing 16 (2012), 13--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Adriana Iamnitchi, Matei Ripeanu, Elizeu Santos-Neto, and Ian Foster. 2011. The small world of file sharing. IEEE Transactions on Parallel and Distributed Systems 22, 7 (2011), 1120--1134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, and Thomas Anderson. 2010. Privacy-preserving P2P data sharing with OneSwarm. In ACM SIGCOMM Computer Communication Review, Vol. 40. ACM, 111--122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. David Jurgens. 2013. That’s what friends are for: Inferring location in online social media platforms based on social relationships. In ICWSM.Google ScholarGoogle Scholar
  59. Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. Incentives for combatting freeriding on P2P networks. In Euro-Par 2003 Parallel Processing. Springer, 1273--1279.Google ScholarGoogle Scholar
  60. David Karger, Eric Lehman, Tom Leighton, Rina Panigrahy, Matthew Levine, and Daniel Lewin. 1997. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing. ACM, 654--663. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Imrul Kayes and Adriana Iamnitchi. 2013. Out of the wild: On generating default policies in social ecosystems. In IEEE ICC’13—Workshop on Beyond Social Networks: Collective Awareness.Google ScholarGoogle Scholar
  62. Peter D. Killworth, Eugene C. Johnsen, H. Russell Bernard, Gene Ann Shelley, and Christopher McCarty. 1990. Estimating the size of personal networks. Social Networks 12, 4 (1990), 289--312.Google ScholarGoogle ScholarCross RefCross Ref
  63. Jon Kleinberg. 2000. The small-world phenomenon: An algorithmic perspective. In Proceedings of the 32nd Annual ACM Symposium on Theory of Computing. ACM, 163--170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Bjorn Knutsson, Honghui Lu, Wei Xu, and Bryan Hopkins. 2004. Peer-to-peer support for massively multiplayer games. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’04), Vol. 1. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  65. Nicolas Kourtellis. 2012. On the Design of Socially-Aware Distributed Systems. Ph.D. Dissertation. University of South Florida. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Nicolas Kourtellis, Jeremy Blackburn, Cristian Borcea, and Adriana Iamnitchi. 2013. Enabling social applications via decentralized social data mangement. ACM Transactions on Internet Technology (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn, Cristian Borcea, and Adriana Iamnitchi. 2010. Prometheus: User-controlled P2P social data management for socially-aware applications. In Proceedings of the USENIX 11th International Middleware Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Ramayya Krishnan, Michael D. Smith, Zhulei Tang, and Rahul Telang. 2004. The impact of free-riding on peer-to-peer networks. In Proceedings of the 37th Hawaii International Conference on System Sciences. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Yoram Kulbak and Danny Bickson. 2005. The eMule Protocol Specification. eMule project. Retrieved from http://sourceforge. net.Google ScholarGoogle Scholar
  70. Nathaniel Leibowitz, Matei Ripeanu, and Adam Wierzbicki. 2003. Deconstructing the kazaa network. In Proceedings of the 3rd IEEE Workshop on Internet Applications (WIAPP’03). IEEE, 112--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Jure Leskovec, Kevin Lang, Anirban Dasgupta, and Michael Mahoney. 2009. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics 6, 1 (2009), 29--123.Google ScholarGoogle ScholarCross RefCross Ref
  72. Chris Lesniewski-Laas and M. Frans Kaashoek. 2010. Whanau: A sybil-proof distributed hash table. In Proceedings of the Symposium on Networked System Design and Implementation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Jinyang Li and Frank Dabek. 2006. F2F: Reliable storage in open networks. In Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS’06).Google ScholarGoogle Scholar
  74. Ze Li and Haiying Shen. 2012. Social-P2P: Social network-based P2P file sharing system. In Proceedings of the 20th IEEE International Conference on Network Protocols (ICNP’12). 1--10. DOI:http://dx.doi.org/10.1109/ICNP.2012.6459983 Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yafei Dai, and Xiaoming Li. 2007. An empirical study of collusion behavior in the Maze P2P file-sharing system. In 27th International Conference on Distributed Computing Systems (ICDCS’07). IEEE, 56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Marcello Lioy. 2011. Peer-to-Peer Technology Driving Innovative User Experiences in Mobile. Retrieved from http://cdn.oreillystatic.com/en/assets/1/event/61/Peer-to-Peer%20Technology%20Driving%20Innovative%20User%20Experiences%20in%20Mobile%20Presentation.pdf.Google ScholarGoogle Scholar
  77. Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma, Steven Lim, and others. 2005. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials 7, 1--4 (2005), 72--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Dahlia Malkhi, Moni Naor, and David Ratajczak. 2002. Viceroy: A scalable and dynamic emulation of the butterfly. In Proceedings of the 21st Annual Symposium on Principles of Distributed Computing. ACM, 183--192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Sergio Marti, Prasanna Ganesan, and Hector Garcia-Molina. 2004a. DHT routing using social links. In Proceedings of the 3rd International Workshop on Peer-to-Peer Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Serigo Marti, Prasanna Ganesan, and Hector Garcia-Molina. 2004b. SPROUT: P2P routing with social networks. In Proceedings of the 2004 International Conference on Current Trends in Database Technology (EDBT’04). 425--435. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Miller McPherson, Lynn Smith-Lovin, and James Cook. 2001. Birds of a feather: Homophily in social networks. Annual Review of Sociology (2001), 415--444.Google ScholarGoogle Scholar
  82. Alan Mislove, Krishna P. Gummadi, and Peter Druschel. 2006. Exploiting social networks for internet search. In Proceedings of the 5th Workshop on Hot Topics in Networks (HotNets’06).Google ScholarGoogle Scholar
  83. Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, and Bobby Bhattacharjee. 2007. Measurement and analysis of online social networks. In Proceedings of the 5th ACM/USENIX Internet Measurement Conference (IMC’07). Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Alan Mislove, Ansley Post, Peter Druschel, and Krishna P. Gummadi. 2008. Ostra: Leveraging trust to thwart unwanted communication. In Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI). Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Prateek Mittal. 2012. Trustworthy and Scalable Anonymous Communication. Ph.D. Dissertation. University of Illinois at Urbana-Champaign. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Prateek Mittal, Matthew Caesar, and Nikita Borisov. 2012. X-Vine: Secure and pseudonymous routing in DHTs using social networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  87. Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim. 2010. Measuring the mixing time of social graphs. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC’10). 383--389. Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Anirban Mondal, Kazuo Goda, and Masaru Kitsuregawa. 2003. Effective load-balancing of peer-to-peer systems. In Proceedings of the Data Engineering Workshop.Google ScholarGoogle Scholar
  89. Space Monkey. 2014. Space Monkey. Retrieved from https://www.spacemonkey.com.Google ScholarGoogle Scholar
  90. Adrián Moreno-Martínez, Raúl Gracia-Tinedo, Marc Sánchez-Artigas, and Pedro Garcia-Lopez. 2012. Friendbox: A cloudified F2F storage application. In Proceedings of the 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P). IEEE, 75--76.Google ScholarGoogle ScholarCross RefCross Ref
  91. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Consulted 1, 2012 (2008).Google ScholarGoogle Scholar
  92. LLC Napster. 2001. Napster. Retrieved from http://www.napster.com.Google ScholarGoogle Scholar
  93. Mark Newman. 2010. Networks: An Introduction. Oxford University Press. Google ScholarGoogle ScholarCross RefCross Ref
  94. Anh Tuan Nguyen, Baochun Li, Michael Welzl, and F. Eliassen. 2011. Stir: Spontaneous social peer-to-peer streaming. In Proceedings of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 816--821. DOI:http://dx.doi.org/10.1109/INFCOMW.2011.5928925Google ScholarGoogle ScholarCross RefCross Ref
  95. Shirin Nilizadeh, Naveed Alam, Nathaniel Husted, and Apu Kapadia. 2011. Pythia: A privacy aware, peer-to-peer network for social search. In Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society (WPES’11). ACM, New York, NY, 43--48. DOI:http://dx.doi.org/10.1145/2046556.2046562 Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. J. P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, and A. L. Barabasi. 2007. Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences 104, 18 (2007), 7332--7336.Google ScholarGoogle ScholarCross RefCross Ref
  97. Andrea Passarella. 2012. A survey on content-centric technologies for the current Internet: CDN and P2P solutions. Computer Communications 35, 1 (2012), 1--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Thomas Paul, Antonino Famulari, and Thorsten Strufe. 2014. A survey on decentralized online social networks. Computer Networks 75, Part A (2014), 437--452. DOI:http://dx.doi.org/10.1016/j.comnet.2014.10.005Google ScholarGoogle Scholar
  99. PeerCDN. 2013. PeerCDN. Retrieved from https://peercdn.com/.Google ScholarGoogle Scholar
  100. C. Greg Plaxton, Rajmohan Rajaraman, and Andrea W. Richa. 1999. Accessing nearby copies of replicated objects in a distributed environment. Theory of Computing Systems 32, 3 (1999), 241--280.Google ScholarGoogle ScholarCross RefCross Ref
  101. Bogdan C. Popescu, Bruno Crispo, and Andrew S. Tanenbaum. 2004. Safe and private data sharing with turtle: Friends team-up and beat the system. In Proceedings of the 12th International Conference on Security Protocols (SP’04). Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Johan A. Pouwelse, Pawel Garbacki, Jun Wang, Arno Bakker, Jie Yang, Alexandru Iosup, Dick H. J. Epema, Marcel Reinders, Maarten R. Van Steen, and Henk J. Sips. 2008. TRIBLER: A social-based peer-to-peer system. Concurrency and Computation: Practice and Experience 20, 2 (2008), 127--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Yi Qiao and Fabián E. Bustamante. 2005. Elders know best-handling churn in less structured p2p systems. In Proceedings of the 5th IEEE International Conference on Peer-to-Peer Computing (P2P’05). IEEE, 77--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Vignesh Ramachandran. 2013. Space Monkey Brings Peer-to-Peer Storage to the Cloud. Retrieved from http://mashable.com/2013/04/26/space-monkey-peer-to-peer-cloud-storage/.Google ScholarGoogle Scholar
  105. Venugopalan Ramasubramanian and Emin Gün Sirer. 2004a. Beehive: Exploiting power law query distributions for O (1) lookup performance in peer to peer overlays. In Proceedings of the Symposium on Networked Systems Design and Implementation.Google ScholarGoogle Scholar
  106. Venugopalan Ramasubramanian and Emin Gün Sirer. 2004b. The design and implementation of a next generation name service for the internet. ACM SIGCOMM Computer Communication Review 34, 4 (2004), 331--342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Lakshmish Ramaswamy, Bugra Gedik, and Ling Liu. 2005. A distributed approach to node clustering in decentralized peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems 16, 9 (2005), 814--829. Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Schenker. 2001. A scalable content-addressable network. In SIGCOMM’01. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Gracia Tinedo Raúl, Marc Sánchez Artigas, and Pedro García López. 2012. Analysis of data availability in F2F storage systems: When correlations matter. In Peer-to-Peer Computing. 225--236.Google ScholarGoogle Scholar
  110. Sean Rhea, Brighten Godfrey, Brad Karp, and John Kubiatowicz. 2005. OpenDHT: A public DHT service and its uses. In Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Rodrigo Rodrigues and Peter Druschel. 2010. Peer-to-peer systems. ACM Magazine of Communications 53, 10 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Hosam Rowaihy, William Enck, Patrick McDaniel, and Tom La Porta. 2007. Limiting sybil attacks in structured p2p networks. In Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007). IEEE, 2596--2600. Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. Antony Rowstron and Peter Druschel. 2001a. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Middleware 2001. Springer, 329--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Antony Rowstron and Peter Druschel. 2001b. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP). Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Atul Saini. 2002. Super-peer architectures for distribtuted computing. http://www.fiorano.com/whitepapers/superpeer.pdf. (2002).Google ScholarGoogle Scholar
  116. Stefan Saroiu, Krishna Gummadi, and Steven Gribble. 2001. Measurement study of peer-to-peer file sharing systems. In Electronic Imaging 2002. International Society for Optics and Photonics, 156--170.Google ScholarGoogle Scholar
  117. Rajesh Sharma, Anwitaman Datta, Matteo Dell Amico, and Pietro Michiardi. 2011. An empirical study of availability in friend-to-friend storage systems. In Peer-to-Peer Computing. 348--351.Google ScholarGoogle Scholar
  118. Thomas Silverston and Olivier Fourmaux. 2007. Measuring p2p iptv systems. In Proceedings of NOSSDAV, Vol. 7.Google ScholarGoogle Scholar
  119. Skype. 2015. https://www.skype.com/. (2015).Google ScholarGoogle Scholar
  120. Daniel A. Spielman. 2006. Random walks on graphs. (2006). http://www.cs.yale.edu/homes/spielman/462/2006/lect4.pdf.Google ScholarGoogle Scholar
  121. Moritz Steiner, Taoufik En-Najjary, and Ernst W Biersack. 2007. Exploiting KAD: Possible uses and misuses. ACM SIGCOMM Computer Communication Review 37, 5 (2007), 65--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Daniel Stutzbach and Reza Rejaie. 2006. Understanding churn in peer-to-peer networks. In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. ACM, 189--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Mika Suvanto. 2005. Privacy in peer-to-peer networks. In Helsinki University of Technology T-110.551 Seminar on Internetworking. Citeseer.Google ScholarGoogle Scholar
  125. Symform. 2014. Symform. (2014). http://www.symform.com/.Google ScholarGoogle Scholar
  126. Dinh Nguyen Tran, Frank Chiang, and Jinyang Li. 2008. Friendstore: Cooperative online backup using trusted nodes. In Proceedings of the 1st Workshop on Social Network Systems. 37--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  127. Nguyen Tran, Frank Chiang, and Jinyang Li. 2012. Efficient cooperative back with decentralized trust management. ACM Transactions on Storage 8, 8 (September 2012), 1--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Nguyen Tran, Jinyang Li, Lakshminarayanan Subramanian, and Sherman S. M. Chow. 2011. Optimal sybil-resilient node admission control. In Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM’11).Google ScholarGoogle Scholar
  129. John C. Turner. 1991. Social Influence. Thomson Brooks/Cole Publishing Co.Google ScholarGoogle Scholar
  130. Roelof Van Zwol. 2007. Flickr: Who is looking? In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence. IEEE Computer Society, 184--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. Bimal Viswanath, Alan Mislove, Meeyoung Cha, and Krishna P. Gummadi. 2009. On the evolution of user interaction in Facebook. In Proceedings of the 2nd ACM Workshop on Online Social Networks (WOSN’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Bimal Viswanath, Ansley Post, Krishna P. Gumadi, and Alan Mislove. 2010. An analysis of social network-based sybil defenses. In Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. Luis Von Ahn, Manuel Blum, and John Langford. 2003. CAPTCHA: Telling humans and computers apart. In IACR Eurocrypt.Google ScholarGoogle Scholar
  134. Dan S. Wallach. 2002. A survey of peer-to-peer security issues. In Proceedings of the 2002 Mext-NSF-JSPS International Conference on Software Security: Theories and Systems (ISSS’02). 42--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. Duncan J. Watts and Steven H. Strogatz. 1998. Collective dynamics of ‘small-world’ networks. Nature 393, 6684 (1998), 440--442.Google ScholarGoogle Scholar
  136. Barry Wellman. 1988. Structural analysis: From method and metaphor to theory and substance. Social Structures: A Network Approach. (1988), 19--61.Google ScholarGoogle Scholar
  137. Barry Wellman and Scot Wortley. 1990. Different strokes from different folks: Community ties and social support. American Journal of Sociology 96, 3 (1990), 558.Google ScholarGoogle ScholarCross RefCross Ref
  138. Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Y. Zhao. 2009. User interactions in social networks and their implications. In Proceedings of the 4th ACM European Conference on Computer Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. Nick Wingfield. 2013. Bitcoin Pursues the Mainstream. The New York Times. (November 2013).Google ScholarGoogle Scholar
  140. Amir Yahyavi and Bettina Kemme. 2013. Peer-to-peer architectures for massively multiplayer online games: A survey. ACM Computing Surveys (CSUR) 46, 1 (2013), 9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. Beverly Yang and Hector Garcia-Molina. 2003. Designing a super-peer network. In 19th International Conference on Data Engineering. IEEE.Google ScholarGoogle Scholar
  142. Stephen J. H. Yang, Jia Zhang, Leon Lin, and Jeffrey J. P. Tsai. 2009. Improving peer-to-peer search performance through intelligent social search. Expert Systems with Applications 36, 7 (2009), 10312--10324. DOI:http://dx.doi.org/10.1016/j.eswa.2009.01.045 Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. Haifeng Yu. 2011. Sybil defenses via social networks: A tutorial and survey. ACM SIGACT News Distributed Computing Column 42, 3 (2011), 80--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. Haifeng Yu, Phillip Gibbons, Michael Kaminsky, and Feng Xiao. 2008. SybilLimit: A near-optimal social network defense against sybil attacks. In Proceedings of the IEEE Symposium on Security and Privacy. 3--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. 2006. Sybilguard: Defending against sybil attacks via social networks. In Proceedings of the SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 267--278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu. 2013. Distributed Hash Table: Theory, Platforms and Applications. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John D. Kubiatowicz. 2004. Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications 22, 1 (2004), 41--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. Yingwu Zhu, Honghao Wang, and Yiming Hu. 2003. A super-peer based lookup in structured peer-to-peer systems. In ISCA PDCS. 465--470.Google ScholarGoogle Scholar
  149. Xiang Zuo, Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, and Adriana Iamnitchi. 2014a. The influence of indirect ties on social network dynamics. In Social Informatics. Springer, 50--65.Google ScholarGoogle Scholar
  150. Xiang Zuo, Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, and Adriana Iamnitchi. 2014b. The power of indirect ties in friend-to-friend storage systems. In Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, 1--5.Google ScholarGoogle Scholar
  151. Xiang Zuo, Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, and Adriana Iamnitchi. 2016. The power of indirect ties. Computer Communications 73 (2016), 188--199. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Survey of Socially Aware Peer-to-Peer Systems

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image ACM Computing Surveys
                  ACM Computing Surveys  Volume 49, Issue 1
                  March 2017
                  705 pages
                  ISSN:0360-0300
                  EISSN:1557-7341
                  DOI:10.1145/2911992
                  • Editor:
                  • Sartaj Sahni
                  Issue’s Table of Contents

                  Copyright © 2016 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 12 May 2016
                  • Accepted: 1 February 2016
                  • Revised: 1 December 2015
                  • Received: 1 June 2014
                  Published in csur Volume 49, Issue 1

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • survey
                  • Research
                  • Refereed

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader