A Survey of Socially Aware Peer-to-Peer Systems

Peer-to-peer technologies have proven their strength in large-scale resource sharing and data transfer. Such systems, however, still need to address a variety of issues, including efficient routing, security, quality of service, incentives, and reputation. Recent research started leveraging social information to develop new and effective techniques to improve the performance of peer-to-peer systems. However, using social information is a double-edged sword, which can bring benefits as well as new challenges. This survey presents and classifies the types of social information that have been used so far in the design of peer-to-peer systems, how the social fabric has been used to facilitate transactions in the system, and some challenges caused by using social information.

[1]  Krishna P. Gummadi,et al.  Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.

[2]  John C.-I. Chuang,et al.  Incentive mechanism for peer-to-peer media streaming , 2004, Twelfth IEEE International Workshop on Quality of Service, 2004. IWQOS 2004..

[3]  Peter Druschel,et al.  Peer-to-peer systems , 2010, Commun. ACM.

[4]  David Jurgens,et al.  That's What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships , 2013, ICWSM.

[5]  Aleksandar Kuzmanovic,et al.  Denial-of-service resilience in peer-to-peer file sharing systems , 2005, SIGMETRICS '05.

[6]  Antony I. T. Rowstron,et al.  Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.

[7]  Matt Bishop,et al.  Attack class: address spoofing , 1997 .

[8]  Moni Naor,et al.  Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.

[9]  Alon Y. Halevy,et al.  Crowdsourcing systems on the World-Wide Web , 2011, Commun. ACM.

[10]  Pinar Yilgor Super-peer architectures for distributed computing , 2002 .

[11]  Venugopalan Ramasubramanian,et al.  Beehive: Exploiting Power Law Query Distributions for O(1) Lookup Performance in Peer to Peer Overlays , 2003 .

[12]  Jun Wang,et al.  TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.

[13]  Hector Garcia-Molina,et al.  Designing a super-peer network , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[14]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[15]  Krishna P. Gummadi,et al.  Exploiting Social Networks for Internet Search , 2006, HotNets.

[16]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[17]  Diego Suarez Touceda,et al.  Privacy in Peer-to-Peer Networks , 2015 .

[18]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[19]  Adam Wierzbicki,et al.  Deconstructing the Kazaa network , 2003, Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003.

[20]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[21]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[22]  Cheng Huang,et al.  Can internet video-on-demand be profitable? , 2007, SIGCOMM '07.

[23]  Ramayya Krishnan,et al.  The impact of free-riding on peer-to-peer networks , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[24]  Thorsten Strufe,et al.  A survey on decentralized Online Social Networks , 2014, Comput. Networks.

[25]  Honghui Lu,et al.  Peer-to-peer support for massively multiplayer games , 2004, IEEE INFOCOM 2004.

[26]  Adriana Iamnitchi,et al.  Out of the wild: On generating default policies in social ecosystems , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[27]  Ed H. Chi,et al.  Towards a model of understanding social search , 2008, SSM '08.

[28]  Fabián E. Bustamante,et al.  Elders know best - handling churn in less structured P2P systems , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[29]  Cristian Borcea,et al.  Special Issue on Foundations of Social Computing , 2015, ACM Trans. Internet Techn..

[30]  Zhibin Lei,et al.  Applications of Social Networks in Peer-to-Peer Networks , 2012 .

[31]  Ben Y. Zhao,et al.  An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[32]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[33]  David R. Karger,et al.  Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.

[34]  Andrea Passarella,et al.  A survey on content-centric technologies for the current Internet: CDN and P2P solutions , 2012, Comput. Commun..

[35]  Adriana Iamnitchi,et al.  The power of indirect ties in friend-to-friend storage systems , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.

[36]  Ralf Steinmetz,et al.  LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[37]  Pascal Felber,et al.  Efficient search in unstructured peer-to-peer networks , 2004, SPAA '04.

[38]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[39]  Hector Garcia-Molina,et al.  Open Problems in Data-Sharing Peer-to-Peer Systems , 2003, ICDT.

[40]  Prateek Mittal,et al.  X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks , 2012, NDSS.

[41]  Paul Anderson,et al.  Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications , 2010, Middleware.

[42]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[43]  Ben Y. Zhao,et al.  Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.

[44]  Santo Fortunato,et al.  Community detection in graphs , 2009, ArXiv.

[45]  Nenghai Yu,et al.  Distributed Hash Table , 2013, SpringerBriefs in Computer Science.

[46]  B. Wellman Structural analysis: From method and metaphor to theory and substance. , 1988 .

[47]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[48]  共立出版株式会社 コンピュータ・サイエンス : ACM computing surveys , 1978 .

[49]  Lakshmish Ramaswamy,et al.  A distributed approach to node clustering in decentralized peer-to-peer networks , 2005, IEEE Transactions on Parallel and Distributed Systems.

[50]  A-L Barabási,et al.  Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.

[51]  Prateek Mittal,et al.  Trustworthy and scalable anonymous communication , 2012 .

[52]  W. Hamilton,et al.  The evolution of cooperation. , 1984, Science.

[53]  TranNguyen,et al.  Efficient cooperative backup with decentralized trust management , 2012 .

[54]  J. Delvenne,et al.  Random walks on graphs , 2004 .

[55]  Jinyang Li,et al.  F2F: Reliable Storage in Open Networks , 2006, IPTPS.

[56]  Pietro Michiardi,et al.  An empirical study of availability in friend-to-friend storage systems , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[57]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[58]  Rajmohan Rajaraman,et al.  Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1999, Theory of Computing Systems.

[59]  D. Dolinski,et al.  Social Influence , 2007 .

[60]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[61]  Zhenyu Liu,et al.  Inferring Privacy Information from Social Networks , 2006, ISI.

[62]  Ehrhard Behrends Introduction to Markov Chains With Special Emphasis on Rapid Mixing , 2013 .

[63]  Yazan Boshmaf,et al.  A Quick Survey of Social Network-based Sybil Defenses , 2012 .

[64]  Florian Schintke,et al.  Peer-to-Peer Computing , 2010, Euro-Par.

[65]  Thomas F. La Porta,et al.  Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[66]  M. Lam,et al.  All Friends are Not Equal : Using Weights in Social Graphs to Improve Search , 2010 .

[67]  Konstantin Beznosov,et al.  Graph-based Sybil Detection in social and information systems , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[68]  Hector Garcia-Molina,et al.  SPROUT: P2P Routing with Social Networks , 2004, EDBT Workshops.

[69]  Ben Leong,et al.  Hydra: a massively-multiplayer peer-to-peer architecture for the game developer , 2007, NetGames '07.

[70]  Rainer Alt,et al.  IEEE/WIC/ACM International Conference on Web Intelligence , 2015, WI-IAT.

[71]  Roelof van Zwol,et al.  Author Index , 2007, Web Intelligence.

[72]  Anjali Gupta,et al.  Efficient Routing for Peer-to-Peer Overlays , 2004, NSDI.

[73]  F. Göbel,et al.  Random walks on graphs , 1974 .

[74]  Stefan Saroiu,et al.  A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .

[75]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[76]  Ralf Steinmetz,et al.  Enabling resilient P2P video streaming: survey and analysis , 2011, Multimedia Systems.

[77]  Jinyang Li,et al.  Friendstore: cooperative online backup using trusted nodes , 2008, SocialNets '08.

[78]  Bettina Kemme,et al.  Peer-to-peer architectures for massively multiplayer online games: A Survey , 2013, CSUR.

[79]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[80]  Haifeng Yu,et al.  Sybil defenses via social networks: a tutorial and survey , 2011, SIGA.

[81]  Jinyang Li,et al.  Efficient cooperative backup with decentralized trust management , 2012, TOS.

[82]  Krishna P. Gummadi,et al.  An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.

[83]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM 2001.

[84]  Thomas E. Anderson,et al.  Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.

[85]  Nenghai Yu,et al.  Distributed Hash Table: Theory, Platforms and Applications , 2013 .

[86]  Adriana Iamnitchi,et al.  Vulnerability in socially-informed peer-to-peer systems , 2011, SNS '11.

[87]  Olivier Fourmaux,et al.  Measuring P2P IPTV Systems , 2007 .

[88]  Jia Zhang,et al.  Improving peer-to-peer search performance through intelligent social search , 2009, Expert Syst. Appl..

[89]  Adriana Iamnitchi,et al.  The power of indirect ties , 2016, Comput. Commun..

[90]  Mika Suvanto,et al.  Privacy In Peer-to-Peer Networks , .

[91]  Raúl Gracia Tinedo,et al.  Analysis of data availability in F2F storage systems: When correlations matter , 2012, P2P.

[92]  Brighten Godfrey,et al.  OpenDHT: a public DHT service and its uses , 2005, SIGCOMM '05.

[93]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[94]  Aziz Mohaisen,et al.  Measuring the mixing time of social graphs , 2010, IMC '10.

[95]  Altruism with Social Roots: An Emerging Literature , 2006 .

[96]  Eric Gilbert,et al.  Predicting tie strength with social media , 2009, CHI.

[97]  Jure Leskovec,et al.  Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..

[98]  Mehdi Mani,et al.  socP2P: P2P content discovery enhancement by considering social networks characteristics , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).

[99]  Nathaniel Husted,et al.  Pythia: a privacy aware, peer-to-peer network for social search , 2011, WPES '11.

[100]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[101]  Adriana Iamnitchi,et al.  On the Design of Socially-Aware Distributed Systems , 2012 .

[102]  Keith W. Ross,et al.  A Measurement Study of a Large-Scale P2P IPTV System , 2007, IEEE Transactions on Multimedia.

[103]  Srinivasan Seshan,et al.  A case for end system multicast , 2002, IEEE J. Sel. Areas Commun..

[104]  Adriana Iamnitchi,et al.  The Social Hourglass: An Infrastructure for Socially Aware Applications and Services , 2012, IEEE Internet Computing.

[105]  Taoufik En-Najjary,et al.  Exploiting KAD: possible uses and misuses , 2007, CCRV.

[106]  Hector Garcia-Molina,et al.  DHT Routing Using Social Links , 2004, IPTPS.

[107]  Anirban Mondal,et al.  Effective load-balancing of peer-to-peer systems , 2003 .

[108]  Alhussein A. Abouzeid,et al.  Modeling and analysis of random walk search algorithms in P2P networks , 2005, Second International Workshop on Hot Topics in Peer-to-Peer Systems.

[109]  David Mazières,et al.  Democratizing Content Publication with Coral , 2004, NSDI.

[110]  Hector Garcia-Molina,et al.  Incentives for Combatting Freeriding on P2P Networks , 2003, Euro-Par.

[111]  Alexandru Iosup,et al.  TRIBLER: a social-based peer-to-peer system: Research Articles , 2008 .

[112]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[113]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[114]  John Langford,et al.  Telling humans and computers apart automatically , 2004, CACM.

[115]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[116]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[117]  Jiangchuan Liu,et al.  Exploring interest correlation for peer-to-peer socialized video sharing , 2012, TOMCCAP.

[118]  Konstantin Beznosov,et al.  The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.

[119]  Yiming Hu,et al.  A Super-Peer Based Lookup in Structured Peer-to-Peer Systems , 2003, ISCA PDCS.

[120]  Geoff Coulson,et al.  Free Riding on Gnutella Revisited: The Bell Tolls? , 2005, IEEE Distributed Syst. Online.

[121]  Frank Eliassen,et al.  Stir: Spontaneous social peer-to-peer streaming , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[122]  Adriana Iamnitchi,et al.  The Influence of Indirect Ties on Social Network Dynamics , 2014, SocInfo.

[123]  Raúl Gracia Tinedo,et al.  FRIENDBOX: A cloudified F2F storage application , 2012, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P).

[124]  Noah E. Friedkin,et al.  Horizons of Observability and Limits of Informal Control in Organizations , 1983 .

[125]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[126]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[127]  B. Wellman,et al.  Different Strokes from Different Folks: Community Ties and Social Support , 1990, American Journal of Sociology.

[128]  Matteo Dell Amico A Measurement of Mixing Time in Social Networks , 2009 .

[129]  Jon M. Kleinberg,et al.  The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.

[130]  Dan S. Wallach,et al.  A Survey of Peer-to-Peer Security Issues , 2002, ISSS.

[131]  Haiying Shen,et al.  Social-P2P: Social network-based P2P file sharing system , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[132]  Andrew S. Tanenbaum,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.

[133]  Indranil Gupta,et al.  Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut , 2005, ArXiv.

[134]  M. Frans Kaashoek,et al.  Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.

[135]  Indranil Gupta,et al.  Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead , 2003, IPTPS.

[136]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[137]  J. Chuang,et al.  Designing incentive mechanisms for peer-to-peer systems , 2004, 1st IEEE International Workshop on Grid Economics and Business Models, 2004. GECON 2004..

[138]  H. Russell Bernard,et al.  Estimating the size of personal networks , 1990 .

[139]  Lakshminarayanan Subramanian,et al.  Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.

[140]  Rajmohan Rajaraman,et al.  Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1997, SPAA '97.

[141]  Bobby Bhattacharjee,et al.  Scalable application layer multicast , 2002, SIGCOMM '02.

[142]  Emin Gün Sirer,et al.  The design and implementation of a next generation name service for the internet , 2004, SIGCOMM '04.

[143]  Danny Bickson,et al.  The eMule Protocol Specification , 2005 .