A survey of peer-to-peer content distribution technologies

被引:698
作者
Androutsellis-Theotokis, S [1 ]
Spinellis, D [1 ]
机构
[1] Athens Univ Econ & Business, GR-10434 Athens, Greece
关键词
algorithms; design; performance; reliability; security; content distribution; DOLR; DHT; grid computing; p2p; peer-to-peer;
D O I
10.1145/1041680.1041681
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed computer architectures labeled "peer-to-peer" are designed for the sharing of computer resources ( content, storage, CPU cycles) by direct exchange, rather than requiring the intermediation or support of a centralized server or authority. Peer-to-peer architectures are characterized by their ability to adapt to failures and accommodate transient populations of nodes while maintaining acceptable connectivity and performance. Content distribution is an important peer-to-peer application on the Internet that has received considerable research attention. Content distribution applications typically allow personal computers to function in a coordinated manner as a distributed storage medium by contributing, searching, and obtaining digital content. In this survey, we propose a framework for analyzing peer-to-peer content distribution technologies. Our approach focuses on nonfunctional characteristics such as security, scalability, performance, fairness, and resource management potential, and examines the way in which these characteristics are reflected in - and affected by - the architectural design decisions adopted by current peer-to-peer systems. We study current peer-to-peer systems and infrastructure technologies in terms of their distributed object location and routing mechanisms, their approach to content replication, caching and migration, their support for encryption, access control, authentication and identity, anonymity, deniability, accountability and reputation, and their use of resource trading and management schemes.
引用
收藏
页码:335 / 371
页数:37
相关论文
共 122 条
[1]   P2P and the promise of Internet equality [J].
Agre, PE .
COMMUNICATIONS OF THE ACM, 2003, 46 (02) :39-42
[2]  
ANAGNOSTAKIS K, 2004, IN PRESS P 24 INT C
[3]  
ANDERSON R, 1998, P INT WORKSH INF HID
[4]  
Anderson Ross., 2001, SECURITY ENG GUIDE B
[5]  
[Anonymous], P 9 USENIX SEC S
[6]  
[Anonymous], P 1 INT WORKSH PEER
[7]  
[Anonymous], P 6 INT WORKSH WEB D
[8]  
[Anonymous], P 1 INT WORKSH PEER
[9]  
[Anonymous], 2003, P ATAPCC KARLSR BW G
[10]  
[Anonymous], SCALABILITY ISSUES L