Abstract
In distributed computing, the peer-to-peer paradigm enables two or more entities to collaborate spontaneously in an overlay network of equals (peers) by using appropriate information and communication schemes without the necessity for central coordination. The key concept of the peer-to-peer paradigm is leveraging idle resources to do something useful, based on a collaborative approach. The increasing academic and industrial interest is resulting in the definition of standards and writing of patents. In this paper we propose a categorization for the peer-to-peer overlay schemes and a survey of the most popular ones, comparing each other with respect to effectiveness and security. Most of them have been or are being used in content sharing systems, that over the last few years have enjoyed explosive popularity. Others are used in parallel and distributed computing, massively multi-player gaming, Internet streaming, ambient intelligence, etc. Considering such a wide range of applications, we discuss the importance of reputation management in supporting trust management among peer participants.
Keywords: Peer-to-peer, resource sharing, overlay network, security
Recent Patents on Computer Science
Title: A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security
Volume: 2 Issue: 3
Author(s): Michele Amoretti
Affiliation:
Keywords: Peer-to-peer, resource sharing, overlay network, security
Abstract: In distributed computing, the peer-to-peer paradigm enables two or more entities to collaborate spontaneously in an overlay network of equals (peers) by using appropriate information and communication schemes without the necessity for central coordination. The key concept of the peer-to-peer paradigm is leveraging idle resources to do something useful, based on a collaborative approach. The increasing academic and industrial interest is resulting in the definition of standards and writing of patents. In this paper we propose a categorization for the peer-to-peer overlay schemes and a survey of the most popular ones, comparing each other with respect to effectiveness and security. Most of them have been or are being used in content sharing systems, that over the last few years have enjoyed explosive popularity. Others are used in parallel and distributed computing, massively multi-player gaming, Internet streaming, ambient intelligence, etc. Considering such a wide range of applications, we discuss the importance of reputation management in supporting trust management among peer participants.
Export Options
About this article
Cite this article as:
Amoretti Michele, A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security, Recent Patents on Computer Science 2009; 2 (3) . https://dx.doi.org/10.2174/2213275910902030195
DOI https://dx.doi.org/10.2174/2213275910902030195 |
Print ISSN 2213-2759 |
Publisher Name Bentham Science Publisher |
Online ISSN 1874-4796 |