Skip to main content

Private Peer-to-Peer Networks

  • Chapter
  • First Online:
Book cover Handbook of Peer-to-Peer Networking

Abstract

This chapter offers a survey of the emerging field of private peer-to-peer networks, which can be defined as internet overlays in which the resources and infrastructure are provided by the users, and which new users may only join by personal invitation. The last few years have seen rapid developments in this field. We describe deployed systems, classify them architecturally, and identify some technical and social tradeoffs in the design of private peer-to-peer networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 449.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adar, E., Huberman, B.: Free riding on Gnutella. First Monday 5(10) (2000). URL http://firstmonday.org/issues/issue5_10/adar/

    Google Scholar 

  2. URL http://web.archive.org/web/20010801151157/aimster.com/. Aimster website, archived August 2001, available from http://web.archive.org/web/20010801151157/aimster.com/

  3. URL http://www.alliancep2p.com/. Alliance website, http://www.alliancep2p.com/

  4. URL http://anonet.org/. AnoNet website, http://anonet.org/

  5. Banerjee, A., Faloutsos, M., Bhuyan, L.: P2P: Is Big Brother watching you? Tech. Rep. UCR-CS-2006-06201, Department of Computer Science and Engineering, University of California, Riverside (2006). URL http://www1.cs.ucr.edu/store/techreports/UCR-CS-2006-06201.pdf

    Google Scholar 

  6. Bennett, K., Grothoff, C.: GAP - practical anonymous networking. In: Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003), Dresden, Germany, Lecture Notes in Computer Science, vol. 2760, pp. 141–160 (2003). URL http://gnunet.org/download/aff.ps

    Article  Google Scholar 

  7. Biddle, P., England, P., Peinado, M., Willman, B.: The darknet and the future of content protection. In: Proceedings of the 2nd International Workshop on Digital Rights Management (DRM 2002), Washington, DC, USA, Lecture Notes in Computer Science, vol. 2696, pp. 155–176 (2003). http://msl1.mit.edu/ESD10/docs/darknet5.pdf

    Google Scholar 

  8. Bricklin, D.: Friend-to-friend networks (2000). URL http://www.bricklin.com/f2f.htm. Available from http://www.bricklin.com/f2f.htm

  9. Bustamante, F., Qiao, Y.: Friendships that last: Peer lifespan and its role in P2P protocols. In: 8th International Workshop on Web Content Caching and Distribution, Hawthorne, NY, USA (2003). URL http://2003.iwcw.org/papers/bustamante.pdf

    Google Scholar 

  10. Cederlöf, J.: Web of trust statistics and pathfinder. URL http://www.lysator.liu.se/˜jc/wotsap/. Available from http://www.lysator.liu.se/˜jc/wotsap/

  11. Christin, N., Weigend, A., Chuang, J.: Content availability, pollution and poisoning in file sharing peer-to-peer networks. In: ACM Conference on Electronic Commerce, Vancouver, Canada (2005). URL http://www.weigend.com/ChristinWeigendChuang2005.pdf

  12. Clarke, I.: Project status update, and request for your help (2005). URL http://archives.freenetproject.org/message/20050914.103042.4b8aac35.en.html. Available from http://archives.freenetproject.org/message/20050914.103042.4b8aac35.en.html

  13. Clarke, I., Sandberg, O.: Routing in the dark: Scalable searches in dark P2P networks. In: DefCon 13, Las Vegas, NV, USA (2005). URL http://www.math.chalmers.se/˜ossa/defcon13/vegas1_print.pdf

  14. Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: A distributed anonymous information storage and retrieval system. In: Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, Lecture Notes in Computer Science, vol. 2009, pp. 46–66 (2001). URL http://www.cl.cam.ac.uk/˜twh25/academic/papers/icsi-revised.pdf

    Article  Google Scholar 

  15. URL http://cryptic6.sourceforge.net/. Cryptic6 website, http://cryptic6.sourceforge.net/

  16. URL http://www.cspace.in/. CSpace website, http://www.cspace.in/

  17. Danezis, G., Lesniewski-Laas, C., Kaashoek, M., Anderson, R.: Sybil-resistant DHT routing. In: 10th European Symposium on Research in Computer Security (ESORICS 2005), Milan, Italy (2005). URL http://www.cl.cam.ac.uk/users/gd216/sybildht.pdf

    Google Scholar 

  18. URL http://dcplusplus.sourceforge.net/. DC++ website, http://dcplusplus.sourceforge.net/

  19. Deibert, R., Palfrey, J., Rohozinski, R., Zittrain, J. (eds.): Access Denied: The Practice and Policy of Global Internet Filtering. MIT Press (2008)

    Google Scholar 

  20. Deri, L., Andrews, R.: N2N: A layer two peer-to-peer VPN. In: Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008), Bremen, Germany, Lecture Notes in Computer Science, vol. 5127, pp. 53–64 (2008). URL http://luca.ntop.org/n2n.pdf

    Article  Google Scholar 

  21. Douceur, J.: The Sybil attack. In: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS ’02), Cambridge, MA, USA, Lecture Notes in Computer Science, vol. 2429, pp. 251–260 (2002). URL http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf

    Article  Google Scholar 

  22. URL http://easta.sourceforge.net/. Easter website, http://easta.sourceforge.net/

  23. Ek, M., Hultin, F., Lindblom, J.: WASTE peer-to-peer protocol (2005). URL http://prdownloads.sourceforge.net/j-waste/waste_documentation-1.1.pdf?download. Reverse-engineered protocol documentation, available from http://prdownloads.sourceforge.net/j-waste/waste_documentation-1.1.pdf? download

  24. Electronic Frontier Foundation: RIAA v. the people: Four years later (2007). URL http://w2.eff.org/IP/P2P/riaa_at_four.pdf. Available from http://w2.eff.org/IP/P2P/riaa_at_four.pdf

  25. Electronic Privacy Information Center, Privacy International: Privacy and Human Rights 2006: An International Survey of Privacy Laws and Developments. Washington, DC: Electronic Privacy Information Center (2007). URL http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-559458

  26. Figueiredo, R., Boykin, O., St. Juste, P., Wolinsky, D.: Social VPNs: Integrating overlay and social networks for seamless P2P networking. In: Workshop on Collaborative Peer-to-Peer Systems (COPS), Rome, Italy (2008). URL http://ast-deim.urv.cat/wwiki/images/1/18/Socialvpn-cops08.pdf

  27. Ford, B., Srisuresh, P., Kegel, D.: Peer-to-peer communication across network address translators. In: USENIX Annual Technical Conference, Anaheim, CA, USA (2005). URL http://www.usenix.org/events/usenix05/tech/general/full_papers/ford/ford.pdf

  28. Fredriksen, L.: Securing private peer-to-peer networks. Master’s thesis, University of Tromsø (2007). URL http://www.ub.uit.no/munin/handle/10037/1197

  29. Freedman, M., Morris, R.: Tarzan: A peer-to-peer anonymizing network layer. In: 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, USA (2002). URL http://pdos.csail.mit.edu/tarzan/docs/tarzan-ccs02.pdf

  30. Friedman, E., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy 10(2), 173–199 (2001). URL http://www.si.umich.edu/˜presnick/papers/identifiers/081199.pdf

    Article  Google Scholar 

  31. URL http://galet.sourceforge.net/. Galet website, http://galet.sourceforge.net/

  32. URL http://www.lugato.net/gazzera/. Gazzera website, http://www.lugato.net/gazzera/

  33. URL http://www.gigatribe.com/. GigaTribe website, http://www.gigatribe.com/

  34. Gonze, L.: Friendnet (2002). URL http://www.oreillynet.com/pub/wlg/2428. Available from http://www.oreillynet.com/pub/wlg/2428

  35. URL http://www.groove.net/. Groove Networks website, http://www.groove.net/

  36. Grothoff, C., Grothoff, K., Horozov, T., Lindgren, J.: An encoding for censorship-resistant sharing (2005). URL http://gnunet.org/download/ecrs.ps. GNUnet white paper, available from http://gnunet.org/download/ecrs.ps

  37. Guha, S., Daswani, N., Jain, R.: An experimental study of the Skype peer-to-peer VoIP system. In: Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS ’06), Santa Barbara, CA, USA, pp. 1–6 (2006). URL http://saikat.guha.cc/pub/iptps06-skype.pdf

  38. Guha, S., Francis, P.: Characterization and measurement of TCP traversal through NATs and firewalls. In: Internet Measurement Conference (IMC 2005), Berkeley, CA, USA (2005)

    Google Scholar 

  39. URL http://hybrid-share.sourceforge.net/. Hybrid Share website, http://hybrid-share.sourceforge.net/

  40. URL http://www.i2p2.de/. I2P website, http://www.i2p2.de/

  41. Kugler, D.: An analysis of GNUnet and the implications for anonymous, censorship-resistant networks. In: Proceedings of the 3rd International Workshop on Privacy Enhancing Technologies (PET 2003), Dresden, Germany, Lecture Notes in Computer Science, vol. 2760, pp. 161–176 (2003). URL http://gnunet.org/papers/GNUnet_pet.pdf

    Article  Google Scholar 

  42. Lesniewski-Laas, C.: A Sybil-proof one-hop DHT. In: 1st International Workshop on Social Network Systems (SocialNets 2008), Glasgow, Scotland (2008). URL http://pdos.csail.mit.edu/papers/sybil-dht-socialnets08.pdf

  43. Li, J., Dabek, F.: F2F: Reliable storage in open networks. In: 5th International Workshop on Peer-to-Peer Systems (IPTPS ’06), Santa Barbara, CA, USA (2006). URL http://pdos.csail.mit.edu/˜jinyang/pub/iptps-f2f.pdf

  44. Liang, J., Kumar, R., Xi, Y., Ross, K.: Pollution in P2P file sharing systems. In: IEEE Infocom, Miami, FL, USA (2005). URL http://cis.poly.edu/˜ross/papers/pollution.pdf

  45. Liebowitz, S., Margolis, S.: Network externalities (effects). In: New Palgrave Dictionary of Economics and the Law, MacMillan (1998). URL http://wwwpub.utdallas.edu/∼liebowit/palgrave/network.html

  46. Lua, E., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials 7(2) (2005). URL http://www.cl.cam.ac.uk/users/ekl25/lua.pdf

  47. Marti, S., Ganesan, P., Garcia-Molina, H.: SPROUT: P2P routing with social networks. In: Proceedings of the 9th International Conference on Extending Database Technology (EDBT 2004), Heraklion, Crete, Greece, Lecture Notes in Computer Science, vol. 3268, pp. 425–435 (2004). URL http://home.comcast.net/˜sergiomarti/papers/2004-5.pdf

    Article  Google Scholar 

  48. Matějka, P.: Security in peer-to-peer networks. Master’s thesis, Department of Software Engineering, Charles University, Prague (2004). URL http://www.turtle4privacy.org/documents/masterThesis.pdf

    Google Scholar 

  49. Nagaraja, S.: Anonymity in the wild: Mixes on unstructured networks. In: Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, pp. 254–272 (2007). URL http://www.cl.cam.ac.uk/˜sn275/papers/unstructured-mixes.pdf

  50. URL http://web.archive.org/web/20050627012020/www.neo-modus.com/. NeoModus Direct Connect website, archived June 2005, available from http://web.archive.org/web/20050627012020/www.neo-modus.com/

  51. URL http://sysnet.ucsd.edu/octopod/. Octopod website, http://sysnet.ucsd.edu/octopod/

  52. URL http://www.phex.org/. Phex website, http://www.phex.org/

  53. Phex wiki: Creating a private network. URL http://www.phex.org/wiki/index.php/Creating_a_private_Network. Available from http://www.phex.org/wiki/index.php/Creating_a_private_Network

  54. Popescu, B., Crispo, B., Tanenbaum, A.: Safe and private data sharing with Turtle: Friends team-up and beat the system. In: 12th International Workshop on Security Protocols, Cambridge, UK (2004). URL http://www.cs.vu.nl/˜bpopescu/papers/sec_prot04/sec_prot04.pdf

  55. Pouwelse, J., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., Epema, D., Reinders, M., van Steen, M., Sips, H.: Tribler: A social-based peer-to-peer system. In: 5th International Workshop on Peer-to-Peer Systems (IPTPS ’06), Santa Barbara, CA, USA (2006). URL http://iptps06.cs.ucsb.edu/papers/Pouw-Tribler06.pdf

  56. URL http://www.powerfolder.com/. PowerFolder website, http://www.powerfolder.com/

  57. Quercia, D., Hailes, S., Capra, L.: TATA: Towards anonymous trusted authentication. In: Proceedings of the 4th International Conference on Trust Management (iTrust 2006), Pisa, Italy, pp. 313–323 (2006). URL http://www.cs.ucl.ac.uk/staff/D.Quercia/publications/querciaTATA06.pdf

    Google Scholar 

  58. Rennhard, M., Plattner, B.: Practical anonymity for the masses with MorphMix. In: Proceedings of the 8th International Financial Cryptography Conference (FC 2004), Key West, FL, USA, Lecture Notes in Computer Science, vol. 3110, pp. 233–250 (2004). URL http://www.tik.ee.ethz.ch/˜rennhard/publications/FC2004.pdf

    Google Scholar 

  59. URL http://retroshare.sourceforge.net/. Retroshare website, http://retroshare.sourceforge.net/

  60. Rhea, S., Godfrey, B., Karp, B., Kubiatowicz, J., Ratnasamy, S., Shenker, S., Stoica, I., Yu, H.: OpenDHT: A public DHT service and its uses. In: SIGCOMM 2005, Philadelphia, PA, USA (2005). URL http://berkeley.intel-research.net/sylvia/f230-rhea.pdf

  61. Risson, J., Moors, T.: Survey of research towards robust peer-to-peer networks: Search methods. Tech. Rep. UNSW-EE-P2P-1-1, University of New South Wales (2004). URL http://uluru.ee.unsw.edu.au/˜john/tr-unsw-ee-p2p-1-1.pdf

  62. Rosenberg, J., Weinberger, J., Huitema, C., Mahy, R.: RFC 3489:STUN - simple traversal of user datagram protocol (UDP) through network address translators (NATs) (2003). URL http://www.ietf.org/rfc/rfc3489.txt

  63. Sandberg, O.: Distributed routing in small-world networks. In: 8th Workshop on Algorithm Engineering and Experiments (ALENEX06), Miami, FL, USA (2006). URL http://www.math.chalmers.se/˜ossa/swroute.pdf

  64. Sandberg, O., Clarke, I.: The evolution of navigable small-world networks. Tech. Rep. 2007:14, Department of Computer Science and Engineering, Chalmers University of Technology (2007). URL http://www.math.chalmers.se/˜ossa/evolution.pdf

  65. Saroiu, S., Gummadi, P.K., Gribble, S.: A measurement study of peer-to-peer file sharing systems. In: Multimedia Computing and Networking (MMCN ’02) (2002). URL http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf

  66. URL http://shinkuro.com/. Shinkuro website, http://shinkuro.com/

  67. URL http://code.google.com/p/sneakernet/. Sneakernet website, http://code.google.com/p/sneakernet/

  68. URL http://www.ziggy.speedhost.com/bdsock.html. SockeToome website, http://www.ziggy.speedhost.com/bdsock.html

  69. Strufe, T., Reschke, D.: Efficient content distribution in semi-decentralized peer-to-peer networks. In: Proceedings of the 8th International Netties Conference, Ilmenau, Germany, pp. 33–38 (2002). URL http://eris.prakinf.tu-ilmenau.de/pub/papers/strufe02efficient.pdf

  70. Stutzbach, D., Rejaie, R.: Towards a better understanding of churn in peer-to-peer networks. Tech. Rep. UO-CIS-TR-04-06, Department of Computer Science, University of Oregon (2004). URL http://www.barsoom.org/˜agthorr/papers/tr04-06.pdf

  71. Svensson, P.: Comcast blocks some internet traffic. Associated Press (2007). URL http://www.msnbc.msn.com/id/21376597/

  72. Udell, J., Asthagiri, N., Tuvell, W.: Security. In: A. Oram (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies, chap. 18. O’Reilly (2001). This chapter describes Groove.

    Google Scholar 

  73. Veiga, A.: Music labels tap downloading networks. Associated Press (2003). URL http://www.usatoday.com/tech/webguide/music/2003-11-14-sharestats_x.htm

  74. URL http://waste.sourceforge.net/. WASTE website, http://waste.sourceforge.net/

  75. Wright, M., Adler, M., Levine, B., Shields, C.: An analysis of the degradation of anonymous protocols. In: ISOC Symposium on Network and Distributed System Security, San Diego, CA, USA (2002). URL http://www.freehaven.net/anonbib/cache/wright02.pdf

  76. Yu, H., Gibbons, P., Kaminsky, M., Xiao, F.: SybilLimit: A near-optimal social network defense against Sybil attacks. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA (2008). URL http://www.comp.nus.edu.sg/∼yuhf/yuh-sybillimit.pdf

  77. Yu, H., Kaminsky, M., Gibbons, P., Flaxman, A.: SybilGuard: Defending against Sybil attacks via social networks. In: SIGCOMM 2006, Pisa, Italy (2006). URL http://sigcomm06.stanford.edu/discussion/getpaper.php?paper_id=26

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Rogers .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Rogers, M., Bhatti, S. (2010). Private Peer-to-Peer Networks. In: Shen, X., Yu, H., Buford, J., Akon, M. (eds) Handbook of Peer-to-Peer Networking. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09751-0_28

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-09751-0_28

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-09750-3

  • Online ISBN: 978-0-387-09751-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics