Abstract
Peer-to-peer systems have been an exciting area of research. Challenges in building them have included scalability, reliability, security, and—of particular interest to these authors—search functionality. This paper surveys some of the history of the field, looks at the lasting impacts of peer-to-peer research, and provides at least one view of where we go from here.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
The Apache Cassandra Project, http://cassandra.apache.org/ (accessed August 16, 2013)
Ares, http://aresgalaxy.sourceforge.net/ (accessed August 16, 2013)
Russia internet blacklist law takes effect. BBC News (October 2012)
US government orders removal of Defcad 3D-gun designs. BBC News (May 2013)
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422–426 (1970)
BOINC, http://boinc.berkeley.edu/ (accessed August 16, 2013)
Reporters Without Borders War still having serious impact on freedom of expression (October 2010), http://bit.ly/14mTqDm (accessed August 16, 2013)
Chen, S., Huo, L., Fu, Q., Guo, R., Gao, W.: FBSA: a self-adjustable multi-source data scheduling algorithm for P2P media streaming. In: Sebe, N., Liu, Y., Zhuang, Y.-t., Huang, T.S. (eds.) MCAM 2007. LNCS, vol. 4577, pp. 325–333. Springer, Heidelberg (2007)
Clarke, I.: A distributed decentralised information storage and retrieval system. Master’s thesis, University of Edinburgh (1999)
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Proceedings of the ICSI Workshop on Design Issues in Anonymity and Unobservability (2000)
Cohen, B.: Incentives build robustness in BitTorrent. In: Proceedings of the Workshop on Economics of Peer-to-Peer Systems, vol. 6, pp. 68–72 (2003)
Content ID disputes - YouTube, https://www.youtube.com/yt/copyright/content-id-disputes.html (accessed August 16, 2013)
Cuenca-Acuna, F.M., Peery, C., Martin, R.P., Nguyen, T.D.: PlanetP: Using gossiping to build content addressable peer-to-peer information sharing communities. In: Proceedings of the International Symposium on High Performance Distributed Computing (HPDC), pp. 236–246 (2003)
Dabek, F., Frans Kaashoek, M., Karger, D., Morris, R., Stoica, I.: Wide-area cooperative storage with CFS. In: Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) (October 2001)
Druschel, P., Rowstron, A.: PAST: A large-scale, persistent peer-to-peer storage utility. In: Proceedings of Hot Topics in Operating Systems (HotOS), pp. 75–80. IEEE (2001)
Eggerton, J.: NBC, Obama campaign spar over YouTube video (October 2008), http://bit.ly/13GPgWW (accessed August 16, 2013)
Elmer-Dewitt, P.: First nation in cyberspace. TIME International (December 1993)
Evangelista, B.: Napster files for bankruptcy. San Francisco Chronicle (June 2004)
Fan, L., Cao, P., Almeida, J., Broder, A.: Summary cache: A scalable wide-area web cache sharing protocol. In: Proceedings of ACM SIGCOMM, pp. 254–265 (1998)
Funshion online - about us, http://www.funshion.com/english/about_us.html (accessed August 16, 2013)
Gallagher, R.: Skype won’t say whether it can eavesdrop on your conversations. Slate (July 2012)
Gallagher, S.: Express to Internet hate: Bus company threatens redditor with lawsuit. Ars Technica (April 2013)
Gillett, M.: What does Skype’s architecture do? (July 2012), http://blogs.skype.com/2012/07/26/what-does-skypes-architecture-do/ (accessed August 16, 2013)
Goodin, D.: Skype replaces P2P supernodes with Linux boxes hosted by Microsoft. Ars Technica (May 2012)
Healey, J.: StreamCast’s undoing (May 2008), http://opinion.latimes.com/bitplayer/2008/05/streamcasts-und.html (accessed August 16, 2013)
Huebsch, R., Hellerstein, J.M., Lanham, N., Loo, B.T., Shenker, S., Stoica, I.: Querying the Internet with PIER. In: Proceedings of the International Conference on Very Large Data Bases (VLDB), pp. 321–332 (2003)
Killock, J.: Sleepwalking into censorship (July 2013), https://www.openrightsgroup.org/blog/2013/sleepwalking-into-censorship (accessed August 16, 2013)
Kravets, D.: Local newscast uses DMCA to erase air crash reporting blunder (July 2013), http://www.wired.com/threatlevel/2013/07/youtube-newscast-asiana/ (accessed August 16, 2013)
Kreitz, G., Niemelä, F.: Spotify—large scale, low latency, P2P music-on-demand streaming. In: Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P), pp. 1–10. IEEE (2010)
Kulbak, Y., Bickson, D.: The eMule protocol specification. eMule project (2005), http://emule-project.net
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4(3), 382–401 (1982)
Lee, T.B.: ICE admits year-long seizure of music blog was a mistake. Ars Technica (December 2011)
Lee, T.B.: UMG claims right to block or remove YouTube videos it doesn’t own. Ars Technica (December 2011)
Leeds, J.: Grokster calls it quits on sharing music files. New York Times (November 2005)
Liang, J., Kumar, R., Ross, K.W.: The KaZaA overlay: A measurement study. In: Proceedings of the IEEE Annual Computer Communications Workshop, pp. 2–9. IEEE (2004)
Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)
Mullin, J.: Optimal semijoins for distributed database systems. IEEE Transactions on Software Engineering 16(5), 558–560 (1990)
Napster, http://opennap.sourceforge.net/napster.txt (accessed August 16, 2013)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network. In: Proceedings of ACM SIGCOMM (2001)
Reynolds, P., Vahdat, A.: Efficient peer-to-peer keyword searching. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol. 2672, pp. 21–40. Springer, Heidelberg (2003)
Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: Proceedings of the International Conference on Peer-to-Peer Computing, pp. 99–100. IEEE (2001)
Rogers, P.: Streisand’s home becomes hit on Web. Mercury News (January 2003)
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)
Selgelid, M.J.: Governance of dual-use research: an ethical dilemma. Bulletin of the World Health Organization (June 2009)
Skype FAQ: What are P2P communications? https://support.skype.com/en/faq/FA10983/what-are-p2p-communications (accessed August 16, 2013)
Stoica, I., Morris, R., Karger, D., Frans Kaashoek, M., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for Internet applications. In: Proceedings of ACM SIGCOMM (2001)
Stribling, J.: OverCite: A cooperative digital research library. Master’s thesis, Massachusetts Institute of Technology (2005)
Tahoe-LAFS, https://tahoe-lafs.org (accessed August 16, 2013)
Torchinsky, J.: VW demands British court censor scientific paper about car security (July 2013), http://bit.ly/1c75SPx (accessed August 16, 2013)
Microsoft DMCA notice mistakenly targets BBC, Techcrunch, Wikipedia, and U.S. govt (October 2012), http://bit.ly/QVArtf (accessed August 16, 2013)
Microsoft censors OpenOffice download links (August 2013), http://bit.ly/1a5Tu1J (accessed August 16, 2013)
Sandvine Inc. ULC. Global Internet phenomena report, 1H (2013)
von Lohmann, F.: McCain campaign feels DMCA sting (October 2008), https://www.eff.org/deeplinks/2008/10/mccain-campaign-feels-dmca-sting (accessed August 16, 2013)
Web hosting now vs 10 years ago (February 2008), http://royal.pingdom.com/2008/02/19/web-hosting-now-vs-10-years-ago/ (accessed August 16, 2013)
Woody, T.: The race to kill Kazaa. Wired (February 2003)
Zhang, X., Liu, J., Li, B., Yum, T.-S.P.: CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming. In: Proceedings of IEEE INFOCOM, vol. 3, pp. 2102–2111. IEEE (2005)
Zhao, B., Kubiatowicz, J., Joseph, A.: Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01-1141, Computer Science Division (EECS), University of California, Berkeley (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Reynolds, P., Vahdat, A. (2013). Peer-to-Peer Keyword Search: A Retrospective. In: Eyers, D., Schwan, K. (eds) Middleware 2013. Middleware 2013. Lecture Notes in Computer Science, vol 8275. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45065-5_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-45065-5_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-45064-8
Online ISBN: 978-3-642-45065-5
eBook Packages: Computer ScienceComputer Science (R0)