Abstract
Peer-to-peer technologies have proven their strength in large-scale resource sharing and data transfer. Such systems, however, still need to address a variety of issues, including efficient routing, security, quality of service, incentives, and reputation. Recent research started leveraging social information to develop new and effective techniques to improve the performance of peer-to-peer systems. However, using social information is a double-edged sword, which can bring benefits as well as new challenges. This survey presents and classifies the types of social information that have been used so far in the design of peer-to-peer systems, how the social fabric has been used to facilitate transactions in the system, and some challenges caused by using social information.
- Osama Abboud, Konstantin Pussep, Aleksandra Kovacevic, Katharina Mohr, Sebastian Kaune, and Ralf Steinmetz. 2011. Enabling resilient P2P video streaming: Survey and analysis. Multimedia Systems 17, 3 (2011), 177--197. Google ScholarDigital Library
- AllJoyn. 2015. AllJoyn. Retrieved from https://allseenalliance.org/developers/learn/core/standard-core.Google Scholar
- Zahid Anwar, William Yurcik, Vivek Pandey, Asim Shankar, Indrail Gupta, and Roy H. Campbell. 2005. Leveraging social-network infrastructure to improve peer-to-peer overlay performance: Results from Orkut. In ACM Computing Research Repository.Google Scholar
- Robert Axelrod. 1985. The Evolution of Cooperation. Basic Books.Google Scholar
- Suman Banerjee, Bobby Bhattacharjee, and Christopher Kommareddy. 2002. Scalable Application Layer Multicast. Vol. 32. ACM. Google ScholarDigital Library
- Salman Baset and Henning Schulrinne. 2004. An analysis of the skype peer-to-peer internet telephony protocol. arXiv Preprint cs/0412017 (2004).Google Scholar
- Ehrhard Behrends. 2000. Introduction to Markov Chains: With Special Emphasis on Rapid Mixing. Vieweg Braunschweig.Google Scholar
- Yang Beverly and Hector Garcia-Molina. 2003. Designing a super-peer network. In Proceedings of the 19th International Conference on Data Engineering. IEEE, 49--60.Google ScholarCross Ref
- Nabhendra Bisnik and Alhussein Abouzeid. 2005. Modeling and analysis of random walk search algorithms in P2P networks. In Proceedings of the 2nd International Workshop on Hot Topics in Peer-to-Peer Systems. IEEE, 95--103. Google ScholarDigital Library
- Jeremy Blackburn, Nicolas Kourtellis, and Adriana Iamnitchi. 2011. Vulnerability in socially-informed peer-to-peer systems. In Proceedings of the 4th Workshop on Social Network Systems. ACM, 7. Google ScholarDigital Library
- Yazan Boshmaf. 2012. A Quick Survey of Social Network-based Sybil Defenses. Technical Report. University of British Columbia, Vancouver, Canada.Google Scholar
- Yazan Boshmaf, Konstantin Beznosov, and Matei Ripeanu. 2013. Graph-based sybil detection in social and information systems. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM, 466--473. Google ScholarDigital Library
- Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. 2011. The socialbot network: When bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC’11). Google ScholarDigital Library
- Pablo Branas-Garza and Maria P. Espinosa Alejos. 2006. Altruism with social roots: An emerging literature. Desarrollo and Sociedad 58 (2006), 245--260.Google ScholarCross Ref
- Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In Proc. of NSDI. Google ScholarDigital Library
- Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron, and Dan S. Wallach. 2002. Secure routing for structured peer-to-peer overlay networks. ACM SIGOPS Operating Systems Review 36, SI (2002), 299--314. Google ScholarDigital Library
- Luther Chan, James Yong, Jiaqiang Bai, Ben Leong, and Raymond Tan. 2007. Hydra: A massively-multiplayer peer-to-peer architecture for the game developer. In Proceedings of the 6th ACM SIGCOMM Workshop on Network and System Support for Games. ACM, 37--42. Google ScholarDigital Library
- Xu Cheng and Jiangchuan Liu. 2012. Exploring interest correlation for peer-to-peer socialized video sharing. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) 8, 1 (2012), 5. Google ScholarDigital Library
- Vicent Cholvi, Pascal Felber, and Ernst Biersack. 2004. Efficient search in unstructured peer-to-peer networks. European Transactions on Telecommunications 15, 6 (2004), 535--548.Google ScholarCross Ref
- Yang-Hua Chu, Sanjay Rao, Srinivasan Seshan, and Hui Zhang. 2002. A case for end system multicast. IEEE Journal on Selected Areas in Communications 2, 8 (2002), 1456--1471. Google ScholarDigital Library
- John Chuang. 2004. Designing incentive mechanisms for peer-to-peer systems. In Proceedings of the 1st IEEE International Workshop on Grid Economics and Business Models (GECON’04). IEEE, 67--81.Google ScholarCross Ref
- Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. 2001. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability. 46--66. Google ScholarDigital Library
- Code42 Software. Inc. 2014. CrashPlan. Retrieved from https://www.code42.com/crashplan/.Google Scholar
- Leucio Antonio Cutillo, Refik Molva, and Thorsten Strufe. 2009. Safebook: A privacy preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47, 12 (December 2009), 94--101. Google ScholarDigital Library
- Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica. 2001. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP’01). Google ScholarDigital Library
- Neil Daswani, Hector Garcia-Molina, and Beverly Yang. 2003. Open problems in data-sharing peer-to-peer systems. In Database Theory—ICDT 2003. Springer, 1--15. Google ScholarDigital Library
- Matteo Dellamico and Yves Roudier. 2009. A measurement of mixing time in social networks. In Proceedings of the 5th International Workshop on Security and Trust Management.Google Scholar
- Diaspora. 2014. The Community-Run, Distributed Social-Network. Retrieved from https://joindiaspora.com/.Google Scholar
- Anhai Doan, Raghu Ramakrishnan, and Alon Halevy. 2011. Crowdsourcing systems on the World-Wide Web. Communications of the ACM 54, 4 (2011), 86--96. Google ScholarDigital Library
- John R. Douceur. 2002. The sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS). Google ScholarDigital Library
- Dan Dumitriu, E. Knightly, Aleksandar Knightly, Ion Stoica, and Willy Zwaenepoel. 2005. Denial-of-service resilience in peer-to-peer file sharing systems. In ACM SIGMETRICS Performance Evaluation Review, Vol. 33. ACM, 38--49. Google ScholarDigital Library
- Brynn M. Evans and Ed H. Chi. 2008. Towards a model of understanding social search. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work. ACM, 485--494. Google ScholarDigital Library
- Reza Farahbakhsh, Noel Crespi, Ángel Cuevas, Sraddha Adhikari, Mehdi Mani, and Teerapat Sanguankotchakorn. 2012. socP2P: P2P content discovery enhancement by considering social networks characteristics. In Proceedings of the 2012 IEEE Symposium on Computers and Communications (ISCC). IEEE, 000530--000533. Google ScholarDigital Library
- Santo Fortunato. 2010. Community detection in graphs. Physics Reports 486, 3 (2010), 75--174.Google ScholarCross Ref
- Michael J. Freeman, Eric Freudenthal, and David Mazieres. 2004. Democratizing content publication with coral. In NSDI, Vol. 4. 18--18. Google ScholarDigital Library
- Noah E. Friedkin. 1983. Horizons of observability and limits of informal control in organizations. Social Forces 62, 6 (March 1983), 54--77.Google ScholarCross Ref
- Eric Gilbert and Karrie Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 211--220. Google ScholarDigital Library
- Michelle Girvan and M. E. J. Newman. 2002. Community structure in social and biological networks. Proceedings of the National Academy of Science (PANS) 99 (2002), 7821--7826.Google ScholarCross Ref
- Gnutella. 2013. Homepage. Retrieved from https://www.gnutella.com/.Google Scholar
- Kalman Graffi, Christian Gross, Dominik Stingl, Daniel Hartung, Aleksandra Kovacevic, and Ralf Steinmetz. 2011. LifeSocial.KOM: A secure and p2p-based solution for online social networks. In Proceedings of the IEEE Consumer Communications and Networking Conference (IEEE CCNC’11).Google ScholarCross Ref
- Mark S. Granovetter. 1973. The strength of weak ties. American Journal of Sociology 78, 6 (1973).Google ScholarCross Ref
- Mark S. Granovetter. 1974. A study of contacts and careers. Harvard University Press, Cambridge, MA (1974).Google Scholar
- Anjali Gupta, Barbara Liskov, and Rodrigo Rodrigues. 2004. Efficient routing for peer-to-peer overlays. In NSDI, Vol. 4. Google ScholarDigital Library
- Indranil Gupta, Ken Birman, Prakash Linga, Al Demers, and Robbert van Renesse. 2003a. Kelips: Building an efficient and stable p2p DHT through increased memory and background overhead. In Peer-to-Peer Systems II, M. Frans Kaashoek and Ion Stoica (Eds.). Lecture Notes in Computer Science, Vol. 2735. Springer, Berlin, 160--169. DOI:http://dx.doi.org/10.1007/978-3-540-45172-3_15Google Scholar
- Minaxi Gupta, Paul Judge, and Mostafa Ammar. 2003b. A reputation system for peer-to-peer networks. In Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video. ACM, 144--152. Google ScholarDigital Library
- Ahsan Habib and John Chuang. 2004. Incentive mechanism for peer-to-peer media streaming. In 12th IEEE International Workshop on Quality of Service (IWQOS’04). IEEE, 171--180.Google ScholarCross Ref
- Sudheendra Hangal, Diana Maclean, Monica S. Lam, and Jeffery Heer. 2010. All friends are not equal: Using weights in social graphs to improve search. In In 4th ACM Workshop on SONAM.Google Scholar
- Jianming He, Wesley W. Chu, and Zhenyu Victor Liu. 2006. Inferring privacy information from social networks. In Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics (ISI’06), 154--165. Google ScholarDigital Library
- Mohamed Hefeeda. 2004. Peer-to-Peer Systems: A Comprehensive Survey. Technical Report. School of Computing Science, Simon Fraser University.Google Scholar
- Xiaojun Hei, Chao Liang, Jian Liang, Yon Liu, and Keith W. Ross. 2007. A measurement study of a large-scale P2P IPTV system. IEEE Transactions on Multimedia 9, 8 (2007), 1672--1687. Google ScholarDigital Library
- Todd Herberlein and Matt Bishop. 1996. Attack class: Address spoofing. In Proceedings of the 19th National Information Systems Security Conference. 371--377.Google Scholar
- Cheng Huang, Jin Li, and Keith W. Ross. 2007. Can internet video-on-demand be profitable? ACM SIGCOMM Computer Communication Review 37, 4 (2007), 133--144. Google ScholarDigital Library
- Jiaqing Huang, Qingyuan Liu, Zhibin Lei, and Dah Ming Chiu. 2012. Applications of social networks in peer-to-peer networks. In Computational Social Networks. Springer, 301--327.Google Scholar
- Daniel Hughes, Geoff Coulson, and James Walkerdine. 2005. Free riding on Gnutella revisited: The bell tolls? IEEE Distributed Systems Online 6, 6 (June 2005), 1541--4922. Google ScholarDigital Library
- Adriana Iamnitchi, Jeremy Blackburn, and Nicolas Kourtellis. 2012. The social hourglass: An infrastructure for socially aware applications and services. IEEE Internet Computing 16 (2012), 13--23. Google ScholarDigital Library
- Adriana Iamnitchi, Matei Ripeanu, Elizeu Santos-Neto, and Ian Foster. 2011. The small world of file sharing. IEEE Transactions on Parallel and Distributed Systems 22, 7 (2011), 1120--1134. Google ScholarDigital Library
- Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, and Thomas Anderson. 2010. Privacy-preserving P2P data sharing with OneSwarm. In ACM SIGCOMM Computer Communication Review, Vol. 40. ACM, 111--122. Google ScholarDigital Library
- David Jurgens. 2013. That’s what friends are for: Inferring location in online social media platforms based on social relationships. In ICWSM.Google Scholar
- Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. Incentives for combatting freeriding on P2P networks. In Euro-Par 2003 Parallel Processing. Springer, 1273--1279.Google Scholar
- David Karger, Eric Lehman, Tom Leighton, Rina Panigrahy, Matthew Levine, and Daniel Lewin. 1997. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing. ACM, 654--663. Google ScholarDigital Library
- Imrul Kayes and Adriana Iamnitchi. 2013. Out of the wild: On generating default policies in social ecosystems. In IEEE ICC’13—Workshop on Beyond Social Networks: Collective Awareness.Google Scholar
- Peter D. Killworth, Eugene C. Johnsen, H. Russell Bernard, Gene Ann Shelley, and Christopher McCarty. 1990. Estimating the size of personal networks. Social Networks 12, 4 (1990), 289--312.Google ScholarCross Ref
- Jon Kleinberg. 2000. The small-world phenomenon: An algorithmic perspective. In Proceedings of the 32nd Annual ACM Symposium on Theory of Computing. ACM, 163--170. Google ScholarDigital Library
- Bjorn Knutsson, Honghui Lu, Wei Xu, and Bryan Hopkins. 2004. Peer-to-peer support for massively multiplayer games. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’04), Vol. 1. IEEE.Google ScholarCross Ref
- Nicolas Kourtellis. 2012. On the Design of Socially-Aware Distributed Systems. Ph.D. Dissertation. University of South Florida. Google ScholarDigital Library
- Nicolas Kourtellis, Jeremy Blackburn, Cristian Borcea, and Adriana Iamnitchi. 2013. Enabling social applications via decentralized social data mangement. ACM Transactions on Internet Technology (2013). Google ScholarDigital Library
- Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn, Cristian Borcea, and Adriana Iamnitchi. 2010. Prometheus: User-controlled P2P social data management for socially-aware applications. In Proceedings of the USENIX 11th International Middleware Conference. Google ScholarDigital Library
- Ramayya Krishnan, Michael D. Smith, Zhulei Tang, and Rahul Telang. 2004. The impact of free-riding on peer-to-peer networks. In Proceedings of the 37th Hawaii International Conference on System Sciences. Google ScholarDigital Library
- Yoram Kulbak and Danny Bickson. 2005. The eMule Protocol Specification. eMule project. Retrieved from http://sourceforge. net.Google Scholar
- Nathaniel Leibowitz, Matei Ripeanu, and Adam Wierzbicki. 2003. Deconstructing the kazaa network. In Proceedings of the 3rd IEEE Workshop on Internet Applications (WIAPP’03). IEEE, 112--120. Google ScholarDigital Library
- Jure Leskovec, Kevin Lang, Anirban Dasgupta, and Michael Mahoney. 2009. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics 6, 1 (2009), 29--123.Google ScholarCross Ref
- Chris Lesniewski-Laas and M. Frans Kaashoek. 2010. Whanau: A sybil-proof distributed hash table. In Proceedings of the Symposium on Networked System Design and Implementation. Google ScholarDigital Library
- Jinyang Li and Frank Dabek. 2006. F2F: Reliable storage in open networks. In Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS’06).Google Scholar
- Ze Li and Haiying Shen. 2012. Social-P2P: Social network-based P2P file sharing system. In Proceedings of the 20th IEEE International Conference on Network Protocols (ICNP’12). 1--10. DOI:http://dx.doi.org/10.1109/ICNP.2012.6459983 Google ScholarDigital Library
- Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yafei Dai, and Xiaoming Li. 2007. An empirical study of collusion behavior in the Maze P2P file-sharing system. In 27th International Conference on Distributed Computing Systems (ICDCS’07). IEEE, 56. Google ScholarDigital Library
- Marcello Lioy. 2011. Peer-to-Peer Technology Driving Innovative User Experiences in Mobile. Retrieved from http://cdn.oreillystatic.com/en/assets/1/event/61/Peer-to-Peer%20Technology%20Driving%20Innovative%20User%20Experiences%20in%20Mobile%20Presentation.pdf.Google Scholar
- Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma, Steven Lim, and others. 2005. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials 7, 1--4 (2005), 72--93. Google ScholarDigital Library
- Dahlia Malkhi, Moni Naor, and David Ratajczak. 2002. Viceroy: A scalable and dynamic emulation of the butterfly. In Proceedings of the 21st Annual Symposium on Principles of Distributed Computing. ACM, 183--192. Google ScholarDigital Library
- Sergio Marti, Prasanna Ganesan, and Hector Garcia-Molina. 2004a. DHT routing using social links. In Proceedings of the 3rd International Workshop on Peer-to-Peer Systems. Google ScholarDigital Library
- Serigo Marti, Prasanna Ganesan, and Hector Garcia-Molina. 2004b. SPROUT: P2P routing with social networks. In Proceedings of the 2004 International Conference on Current Trends in Database Technology (EDBT’04). 425--435. Google ScholarDigital Library
- Miller McPherson, Lynn Smith-Lovin, and James Cook. 2001. Birds of a feather: Homophily in social networks. Annual Review of Sociology (2001), 415--444.Google Scholar
- Alan Mislove, Krishna P. Gummadi, and Peter Druschel. 2006. Exploiting social networks for internet search. In Proceedings of the 5th Workshop on Hot Topics in Networks (HotNets’06).Google Scholar
- Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, and Bobby Bhattacharjee. 2007. Measurement and analysis of online social networks. In Proceedings of the 5th ACM/USENIX Internet Measurement Conference (IMC’07). Google ScholarDigital Library
- Alan Mislove, Ansley Post, Peter Druschel, and Krishna P. Gummadi. 2008. Ostra: Leveraging trust to thwart unwanted communication. In Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI). Google ScholarDigital Library
- Prateek Mittal. 2012. Trustworthy and Scalable Anonymous Communication. Ph.D. Dissertation. University of Illinois at Urbana-Champaign. Google ScholarDigital Library
- Prateek Mittal, Matthew Caesar, and Nikita Borisov. 2012. X-Vine: Secure and pseudonymous routing in DHTs using social networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS).Google Scholar
- Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim. 2010. Measuring the mixing time of social graphs. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC’10). 383--389. Google ScholarDigital Library
- Anirban Mondal, Kazuo Goda, and Masaru Kitsuregawa. 2003. Effective load-balancing of peer-to-peer systems. In Proceedings of the Data Engineering Workshop.Google Scholar
- Space Monkey. 2014. Space Monkey. Retrieved from https://www.spacemonkey.com.Google Scholar
- Adrián Moreno-Martínez, Raúl Gracia-Tinedo, Marc Sánchez-Artigas, and Pedro Garcia-Lopez. 2012. Friendbox: A cloudified F2F storage application. In Proceedings of the 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P). IEEE, 75--76.Google ScholarCross Ref
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Consulted 1, 2012 (2008).Google Scholar
- LLC Napster. 2001. Napster. Retrieved from http://www.napster.com.Google Scholar
- Mark Newman. 2010. Networks: An Introduction. Oxford University Press. Google ScholarCross Ref
- Anh Tuan Nguyen, Baochun Li, Michael Welzl, and F. Eliassen. 2011. Stir: Spontaneous social peer-to-peer streaming. In Proceedings of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 816--821. DOI:http://dx.doi.org/10.1109/INFCOMW.2011.5928925Google ScholarCross Ref
- Shirin Nilizadeh, Naveed Alam, Nathaniel Husted, and Apu Kapadia. 2011. Pythia: A privacy aware, peer-to-peer network for social search. In Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society (WPES’11). ACM, New York, NY, 43--48. DOI:http://dx.doi.org/10.1145/2046556.2046562 Google ScholarDigital Library
- J. P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, and A. L. Barabasi. 2007. Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences 104, 18 (2007), 7332--7336.Google ScholarCross Ref
- Andrea Passarella. 2012. A survey on content-centric technologies for the current Internet: CDN and P2P solutions. Computer Communications 35, 1 (2012), 1--32. Google ScholarDigital Library
- Thomas Paul, Antonino Famulari, and Thorsten Strufe. 2014. A survey on decentralized online social networks. Computer Networks 75, Part A (2014), 437--452. DOI:http://dx.doi.org/10.1016/j.comnet.2014.10.005Google Scholar
- PeerCDN. 2013. PeerCDN. Retrieved from https://peercdn.com/.Google Scholar
- C. Greg Plaxton, Rajmohan Rajaraman, and Andrea W. Richa. 1999. Accessing nearby copies of replicated objects in a distributed environment. Theory of Computing Systems 32, 3 (1999), 241--280.Google ScholarCross Ref
- Bogdan C. Popescu, Bruno Crispo, and Andrew S. Tanenbaum. 2004. Safe and private data sharing with turtle: Friends team-up and beat the system. In Proceedings of the 12th International Conference on Security Protocols (SP’04). Google ScholarDigital Library
- Johan A. Pouwelse, Pawel Garbacki, Jun Wang, Arno Bakker, Jie Yang, Alexandru Iosup, Dick H. J. Epema, Marcel Reinders, Maarten R. Van Steen, and Henk J. Sips. 2008. TRIBLER: A social-based peer-to-peer system. Concurrency and Computation: Practice and Experience 20, 2 (2008), 127--138. Google ScholarDigital Library
- Yi Qiao and Fabián E. Bustamante. 2005. Elders know best-handling churn in less structured p2p systems. In Proceedings of the 5th IEEE International Conference on Peer-to-Peer Computing (P2P’05). IEEE, 77--86. Google ScholarDigital Library
- Vignesh Ramachandran. 2013. Space Monkey Brings Peer-to-Peer Storage to the Cloud. Retrieved from http://mashable.com/2013/04/26/space-monkey-peer-to-peer-cloud-storage/.Google Scholar
- Venugopalan Ramasubramanian and Emin Gün Sirer. 2004a. Beehive: Exploiting power law query distributions for O (1) lookup performance in peer to peer overlays. In Proceedings of the Symposium on Networked Systems Design and Implementation.Google Scholar
- Venugopalan Ramasubramanian and Emin Gün Sirer. 2004b. The design and implementation of a next generation name service for the internet. ACM SIGCOMM Computer Communication Review 34, 4 (2004), 331--342. Google ScholarDigital Library
- Lakshmish Ramaswamy, Bugra Gedik, and Ling Liu. 2005. A distributed approach to node clustering in decentralized peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems 16, 9 (2005), 814--829. Google ScholarDigital Library
- Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Schenker. 2001. A scalable content-addressable network. In SIGCOMM’01. Google ScholarDigital Library
- Gracia Tinedo Raúl, Marc Sánchez Artigas, and Pedro García López. 2012. Analysis of data availability in F2F storage systems: When correlations matter. In Peer-to-Peer Computing. 225--236.Google Scholar
- Sean Rhea, Brighten Godfrey, Brad Karp, and John Kubiatowicz. 2005. OpenDHT: A public DHT service and its uses. In Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communications. Google ScholarDigital Library
- Rodrigo Rodrigues and Peter Druschel. 2010. Peer-to-peer systems. ACM Magazine of Communications 53, 10 (2010). Google ScholarDigital Library
- Hosam Rowaihy, William Enck, Patrick McDaniel, and Tom La Porta. 2007. Limiting sybil attacks in structured p2p networks. In Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007). IEEE, 2596--2600. Google ScholarDigital Library
- Antony Rowstron and Peter Druschel. 2001a. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Middleware 2001. Springer, 329--350. Google ScholarDigital Library
- Antony Rowstron and Peter Druschel. 2001b. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP). Google ScholarDigital Library
- Atul Saini. 2002. Super-peer architectures for distribtuted computing. http://www.fiorano.com/whitepapers/superpeer.pdf. (2002).Google Scholar
- Stefan Saroiu, Krishna Gummadi, and Steven Gribble. 2001. Measurement study of peer-to-peer file sharing systems. In Electronic Imaging 2002. International Society for Optics and Photonics, 156--170.Google Scholar
- Rajesh Sharma, Anwitaman Datta, Matteo Dell Amico, and Pietro Michiardi. 2011. An empirical study of availability in friend-to-friend storage systems. In Peer-to-Peer Computing. 348--351.Google Scholar
- Thomas Silverston and Olivier Fourmaux. 2007. Measuring p2p iptv systems. In Proceedings of NOSSDAV, Vol. 7.Google Scholar
- Skype. 2015. https://www.skype.com/. (2015).Google Scholar
- Daniel A. Spielman. 2006. Random walks on graphs. (2006). http://www.cs.yale.edu/homes/spielman/462/2006/lect4.pdf.Google Scholar
- Moritz Steiner, Taoufik En-Najjary, and Ernst W Biersack. 2007. Exploiting KAD: Possible uses and misuses. ACM SIGCOMM Computer Communication Review 37, 5 (2007), 65--70. Google ScholarDigital Library
- Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Google ScholarDigital Library
- Daniel Stutzbach and Reza Rejaie. 2006. Understanding churn in peer-to-peer networks. In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. ACM, 189--202. Google ScholarDigital Library
- Mika Suvanto. 2005. Privacy in peer-to-peer networks. In Helsinki University of Technology T-110.551 Seminar on Internetworking. Citeseer.Google Scholar
- Symform. 2014. Symform. (2014). http://www.symform.com/.Google Scholar
- Dinh Nguyen Tran, Frank Chiang, and Jinyang Li. 2008. Friendstore: Cooperative online backup using trusted nodes. In Proceedings of the 1st Workshop on Social Network Systems. 37--42. Google ScholarDigital Library
- Nguyen Tran, Frank Chiang, and Jinyang Li. 2012. Efficient cooperative back with decentralized trust management. ACM Transactions on Storage 8, 8 (September 2012), 1--25. Google ScholarDigital Library
- Nguyen Tran, Jinyang Li, Lakshminarayanan Subramanian, and Sherman S. M. Chow. 2011. Optimal sybil-resilient node admission control. In Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM’11).Google Scholar
- John C. Turner. 1991. Social Influence. Thomson Brooks/Cole Publishing Co.Google Scholar
- Roelof Van Zwol. 2007. Flickr: Who is looking? In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence. IEEE Computer Society, 184--190. Google ScholarDigital Library
- Bimal Viswanath, Alan Mislove, Meeyoung Cha, and Krishna P. Gummadi. 2009. On the evolution of user interaction in Facebook. In Proceedings of the 2nd ACM Workshop on Online Social Networks (WOSN’09). Google ScholarDigital Library
- Bimal Viswanath, Ansley Post, Krishna P. Gumadi, and Alan Mislove. 2010. An analysis of social network-based sybil defenses. In Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM’10). Google ScholarDigital Library
- Luis Von Ahn, Manuel Blum, and John Langford. 2003. CAPTCHA: Telling humans and computers apart. In IACR Eurocrypt.Google Scholar
- Dan S. Wallach. 2002. A survey of peer-to-peer security issues. In Proceedings of the 2002 Mext-NSF-JSPS International Conference on Software Security: Theories and Systems (ISSS’02). 42--57. Google ScholarDigital Library
- Duncan J. Watts and Steven H. Strogatz. 1998. Collective dynamics of ‘small-world’ networks. Nature 393, 6684 (1998), 440--442.Google Scholar
- Barry Wellman. 1988. Structural analysis: From method and metaphor to theory and substance. Social Structures: A Network Approach. (1988), 19--61.Google Scholar
- Barry Wellman and Scot Wortley. 1990. Different strokes from different folks: Community ties and social support. American Journal of Sociology 96, 3 (1990), 558.Google ScholarCross Ref
- Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Y. Zhao. 2009. User interactions in social networks and their implications. In Proceedings of the 4th ACM European Conference on Computer Systems. Google ScholarDigital Library
- Nick Wingfield. 2013. Bitcoin Pursues the Mainstream. The New York Times. (November 2013).Google Scholar
- Amir Yahyavi and Bettina Kemme. 2013. Peer-to-peer architectures for massively multiplayer online games: A survey. ACM Computing Surveys (CSUR) 46, 1 (2013), 9. Google ScholarDigital Library
- Beverly Yang and Hector Garcia-Molina. 2003. Designing a super-peer network. In 19th International Conference on Data Engineering. IEEE.Google Scholar
- Stephen J. H. Yang, Jia Zhang, Leon Lin, and Jeffrey J. P. Tsai. 2009. Improving peer-to-peer search performance through intelligent social search. Expert Systems with Applications 36, 7 (2009), 10312--10324. DOI:http://dx.doi.org/10.1016/j.eswa.2009.01.045 Google ScholarDigital Library
- Haifeng Yu. 2011. Sybil defenses via social networks: A tutorial and survey. ACM SIGACT News Distributed Computing Column 42, 3 (2011), 80--101. Google ScholarDigital Library
- Haifeng Yu, Phillip Gibbons, Michael Kaminsky, and Feng Xiao. 2008. SybilLimit: A near-optimal social network defense against sybil attacks. In Proceedings of the IEEE Symposium on Security and Privacy. 3--17. Google ScholarDigital Library
- Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. 2006. Sybilguard: Defending against sybil attacks via social networks. In Proceedings of the SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 267--278. Google ScholarDigital Library
- Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu. 2013. Distributed Hash Table: Theory, Platforms and Applications. Springer. Google ScholarDigital Library
- Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John D. Kubiatowicz. 2004. Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications 22, 1 (2004), 41--53. Google ScholarDigital Library
- Yingwu Zhu, Honghao Wang, and Yiming Hu. 2003. A super-peer based lookup in structured peer-to-peer systems. In ISCA PDCS. 465--470.Google Scholar
- Xiang Zuo, Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, and Adriana Iamnitchi. 2014a. The influence of indirect ties on social network dynamics. In Social Informatics. Springer, 50--65.Google Scholar
- Xiang Zuo, Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, and Adriana Iamnitchi. 2014b. The power of indirect ties in friend-to-friend storage systems. In Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, 1--5.Google Scholar
- Xiang Zuo, Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, and Adriana Iamnitchi. 2016. The power of indirect ties. Computer Communications 73 (2016), 188--199. Google ScholarDigital Library
Index Terms
- A Survey of Socially Aware Peer-to-Peer Systems
Recommendations
An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing
Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected ...
On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover objects of interest and thus introduce ...
Using locality of reference to improve performance of peer-to-peer applications
WOSP '04: Proceedings of the 4th international workshop on Software and performancePeer-to-peer, or simply P2P, systems have recently emerged as a popular paradigm for building distributed applications. One key aspect of the P2P system design is the mechanism used for content location. A number of different approaches are currently in ...
Comments