Efficient, self-contained handling of identity in peer-to-peer systems

被引:15
|
作者
Aberer, K [1 ]
Datta, A [1 ]
Hauswirth, M [1 ]
机构
[1] Swiss Fed Inst Technol, Sch Comp & Commun Sci, Distributed Informat Syst Lab, CH-1015 Lausanne, Switzerland
关键词
peer-to-peer systems; identity handling; self-maintaining; decentralized directory service; distributed hash tables; dynamic resilience;
D O I
10.1109/TKDE.2004.1318567
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identification is an essential building block for many services in distributed information systems. The quality and purpose of identification may differ, but the basic underlying problem is always to bind a set of attributes to an identifier in a unique and deterministic way. Name/directory services, such as DNS, X.500, or UDDI, are a well-established concept to address this problem in distributed information systems. However, none of these services addresses the specific requirements of peer-to-peer systems with respect to dynamism, decentralization, and maintenance. We propose the implementation of directories using a structured peer-to-peer overlay network and apply this approach to support self-contained maintenance of routing tables with dynamic IP addresses in structured P2P systems. Thus, we can keep routing tables intact without affecting the organization of the overlay networks, making it logically independent of the underlying network infrastructure. Even though the directory is self-referential, since it uses its own service to maintain itself, we show that it is robust due to a self-healing capability. For security, we apply a combination of PGP-like public key distribution and a quorum-based query scheme. We describe the algorithm as implemented in the P-Grid P2P lookup system (http://www.p-grid.org/) and give a detailed analysis and simulation results demonstrating the efficiency and robustness of our approach.
引用
收藏
页码:858 / 869
页数:12
相关论文
共 50 条
  • [31] The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems
    Azzedin, Farag
    Ridha, Ahmad
    SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, : 145 - +
  • [32] Load balancing in peer-to-peer systems using a diffusive approach
    Ying Qiao
    Gregor v. Bochmann
    Computing, 2012, 94 : 649 - 678
  • [33] Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks
    Canali, Claudia
    Renda, Maria Elena
    Santi, Paolo
    Burresi, Simone
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (03) : 333 - 347
  • [34] Building a large and efficient hybrid peer-to-peer Internet caching system
    Xiao, L
    Zhang, XD
    Andrzejak, A
    Chen, SQ
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (06) : 754 - 769
  • [35] Efficient range queries in spatial databases over Peer-to-Peer Networks
    Kamel, Ibrahim
    Al Aghbari, Zaher
    Mustafa, Ahmed
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2009, 4 (02) : 79 - 90
  • [36] Skyframe: a framework for skyline query processing in peer-to-peer systems
    Wang, Shiyuan
    Vu, Quang Hieu
    Ooi, Beng Chin
    Tung, Anthony K. H.
    Xu, Lizhen
    VLDB JOURNAL, 2009, 18 (01) : 345 - 362
  • [37] An incentive mechanism for message relaying in unstructured peer-to-peer systems
    Li, Cuihong
    Yu, Bin
    Sycara, Katia
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2009, 8 (06) : 315 - 326
  • [38] Ad hoc, self-supervising peer-to-peer search networks
    Cooper, BF
    Garcia-Molina, H
    ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2005, 23 (02) : 169 - 200
  • [39] A contribution-based service differentiation scheme for peer-to-peer systems
    Loubna Mekouar
    Youssef Iraqi
    Raouf Boutaba
    Peer-to-Peer Networking and Applications, 2009, 2 : 146 - 163
  • [40] Feedback behavior and its role in trust assessment for peer-to-peer systems
    Azzedin, Farag
    Ridha, Ahmad
    TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) : 253 - 266