Децентрализованные хранилища данных: технологии построения

 
Код статьиS013234740001212-8-1
DOI10.31857/S013234740001212-8
Тип публикации Статья
Статус публикации Опубликовано
Авторы
Аффилиация: Московский государственный университет им. М.В.Ломоносова
Адрес: Российская Федерация, Москва
Аффилиация: Научно-исследовательский институт ядерной физики им. Д.В.Скобельцына
Адрес: Российская Федерация, Москва
Название журналаПрограммирование
ВыпускВыпуск 5
Страницы12-30
Аннотация

В работе представлен сравнительный обзор децентрализованных хранилищ данных разных типов. Показано, что хотя они обладают рядом общих свойств, характерных для всех одноранговых (P2P) информационно-вычислительных сетей, решаемые задачи и, соответственно, используемые технологии построения хранилищ разных типов существенно различаются. 

Ключевые слова
Дата публикации28.10.2018
Кол-во символов341
Цитировать   Скачать pdf Для скачивания PDF необходимо авторизоваться
Размещенный ниже текст является ознакомительной версией и может не соответствовать печатной.

всего просмотров: 1093

Оценка читателей: голосов 0

1. Shen, X. S., Yu, H., Buford, J., and Akon, M., eds. Handbook of peer-to-peer networking. Berlin: Springer Science and Business Media, 2010, vol. 34, 1500 pp.

2. Daswani, N., Garcia-Molina, H., and Yang, B. Open problems in data-sharing peer-to-peer systems, Proceedings of the 9th International Conference on Database Theory (ICDTТ03), 2003, p. 1Ц15.

3. http://www.napster.com

4. The Gnutella Protocol Specification. http://rfc-gnutella.sourceforge.net/developer/stable

5. Good, N.S. and Krekelberg, A. Usability and privacy: a study of Kazaa P2P file-sharing, Procedings of the SIGCHI conference on Human factors in computing systems, 2003, p. 137Ц144.

6. Cohen, B. Incentives build robustness in BitTorrent, Proceedings of the Workshop on Economics of Peer-to-Peer systems, 2003, v. 6, pp. 68Ц72.

7. Rizzo, F., Spoto, G.L., Brizzi, P., Bonino, D., Di Bella, G., and Castrogiovanni, P. Beekup: A distributed and safe P2P storage framework for IoE applications, Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), 2017, pp. 44Ц51.

8. Meng, X. A churn-aware durable data storage scheme in hybrid P2P networks, The Journal of Supercomputing, 2018, v. 74, no. 1, pp. 183Ц204.

9. Osorio, M. and Buil-Aranda, C. Storage Balancing in P2P Based Distributed RDF Data Stores, 2017. https://openreview.net/pdf?id=rJn8cDtIb

10. Theyyampattil, M.R. and James, M. A Survey on Reputation Systems and Social Network Based Peer-to-Peer File Sharing Systems, International Journal of Computer Science and Engineering, 2017, v. 5, no. 3, pp. 1619Ц1626.

11. Ravichandran, C.G. and Xavier, J.L. A survey of data sharing and security issues in P2P networks, Advances in Natural and Applied Sciences, 2017, v. 11, no. 7, pp. 329Ц335.

12. √уркин ё.Ќ., —еменов ё.ј. ‘айлообменные сети P2P: основные принципы, протоколы, безопасность // —ети и системы св¤зи: электроннный журнал. 2012. http://www.ccc.ru/magazine/depot/06_11/ /read.html?0302.htm

13. Malatras, A. State-of-the-art survey on P2P overlay networks in pervasive computing environments, Journal of Network and Computer Applications, 2015, v. 55, pp. 1Ц23.

14. Meshkova, E., Riihijarvi, J., Petrova, M., and Mahonen, P. A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks, Computer networks, 2008, v. 52, no. 11, pp. 2097Ц2128.

15. Tsoumakos, D. and Roussopoulos, N. Adaptive probabilistic search in peer-to-peernetworks, Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPSТ03), 2003, pp. 102Ц109.

16. Yang, C. and Wu, J. A dominating-set-based routing in peer-to-peer networks, Proceedings of the 2nd International Workshop on Grid and Cooperative Computing Workshop (GCCТ03), 2003, pp. 332Ц339.

17. Mizrak, A. T., Cheng, Y., Kumar, V., and Savage, S. Structured superpeers: leveraging heterogeneity to provide constant-time lookup, Proceedings of the IEEE Workshop on Internet Applications (WIAPPТ03), 2003, pp. 104Ц111.

18. Li, J-S. and Chao, C-H. An efficient superpeer overlay construction and broadcasting scheme based on perfect difference graph, IEEE Transactions on Parallel and Distributed Systems, 2010, v. 21, no. 5, pp. 594Ц606.

19. Lv, Q., Cao, P., Cohen, E., Li, K., and Shenker, S. Search and replication in unstructured peer-to-peer networks, Proceedings of the 16th ACM International Conference on Supercomputing (ACM ICSТ02), 2002, pp. 84Ц95.

20. Barjini, H., Othman, M., Ibrahim, H., and Udzir, N. Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured p2p networks, Peer-to-Peer Network Applications, 2012, v. 5, pp. 1Ц13.

21. Brocco, A., Malatras, A., and Hirsbrunner, B. Enabling efficient information discovery in a selfstructured grid, Future Generation Computer Systems, 2010, v. 26, no. 6, pp. 838Ц846.

22. Ciancaglini, V., Liquori, L., and Hoang, G. Towards a common architecture to interconnect heterogeneous overlay networks, Proceedings of the 17th international conference on parallel and distributed systems, 2011, pp. 817Ц822.

23. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., and Balakrishnan, H. Chord: A scalable peer-topeer lookup service for internet applications, IEEE/ACM Transactions on Networking (TON), 2003, v. 11, no. 1, pp. 17Ц32.

24. ¬арламов ћ.»., “урдаков ƒ.ё. ќбзор методов извлечени¤ информации из веб-ресурсов // ѕрограммирование. 2016. є 5. C. 30Ц48.

25. Clarke, I., Sandberg, O., Wiley, B., and Hong, T.W. Freenet: A distributed anonymous information storage and retrieval system, In Designing privacy enhancing technologies, 2001, pp. 46Ц66.

26. Manku, G.S., Bawa, M., and Raghavan, P. Symphony: Distributed hashing in a small world, Proceedings of the 4th USENIX Symposium on Internet Technology and Systems (USITSТ03), 2003, p. 10Ц25.

27. Gupta, I., Birman, K., Linga, P., Demers, A., and Renesse, R.V. Kelips: building an efficient and stable P2P DHT through increased memory and background overhead, Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPSТ03), 2003, pp. 160Ц169.

28. Demirci, M. and Ammar, M. Fair allocation of substrate resources among multiple overlay networks, Proceedings of the 2010 IEEE international symposium on modeling, analysis and simulation of computer and telecommunication systems (MASCOTSТ10), 2010, pp. 121Ц130.

29. Hsu, C-J., Chung, W-C., Lai, K-C., Li, K-C., and Chung, Y-C. A novel approach for cooperative overlay-maintenance in multi-overlay environments, Proceedings of the 2010 IEEE second international conference on cloud computing technology and science (CloudCom), 2010, pp. 81Ц88.

30. Peng, F., Malatras, A., Hirsbrunner, B., and Courant, M. Antom: constructing multi-layer overlays for pervasive environments, Proceedings of the eighth international workshop on mobile P2P computing (MP2PТ12), 2012, pp. 1Ц6.

31. Buford, J., Yu, H., and Lua, E.K. P2P Networking and Applications. San Francisco: Morgan Kaufmann, 2008, 406 p.

32. Serbu, S., Felber, P., and Kropf, P. Hypeer: structured overlay with flexible-choice routing, Comuter Networks, 2011, v. 55, no. 1, pp. 300Ц313.

33. Balakrishnan, H., Kaashoek, M. F., Karger, D., Morris, R., and Stoica, I. Looking up data in P2P systems, Communications of ACM, 2003, v. 46, no. 2, pp. 43Ц48.

34. Ratnasamy, S., Francis, P., Handley, M., Karp, R., and Shenker, S. A scalable contentaddressable network, ACM SIGCOMM Computer Communication Review, Proceedings of the 2001 SIGCOMM conference, 2001, v. 31, pp. 161Ц172.

35. Rowstron, A. and Druschel, P. Pastry: scalable, decentralized object location, and routing for largescale peer-to-peer systems, Proceedings of the IFIP/ACM international conference on distributed systems platforms, 2001, pp. 329Ц350.

36. Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., and Kubiatowicz, J.D. Tapestry: a resilient global-scale overlay for service deployment, IEEE Journal on selected areas in communications, 2004, v. 22, no. 1, pp. 41Ц53.

37. Maymounkov, P. and Mazieres, D. Kademlia: a peer-to-peer information system based on the XOR metric, Proceedings of first international workshop on peer-to-peer systems (IPTPSТ01), 2002, pp. 53Ц65.

38. Malkhi, D., Naor, M., and Ratajczak, D. Viceroy: a scalable and dynamic emulation of the butterfly, Proceedings of the 21st symposium on principles of distributed computing (PODCТ02), 2002, pp. 183Ц192.

39. Aberer, K., Cudre-Mauroux, P., Datta, A., Despotovic, Z., Hauswirth, M., and Punceva, M. P-grid: a self-organizing structured p2p system, SIGMOD Record, 2003, v. 32, no. 3, pp. 29Ц33.

40. Harvey, N., Jones, M., Saroiu, S., Theimer, M., and Wolman, A. Skipnet: a scalable overlay network with practical locality properties, Proceedings of the fourth USENIX symposium on Internet technologies and systems (USITSТ03), 2003, pp. 1Ц38.

41. Albert, R. and Barabasi, A.-L. Statistical mechanics of complex networks, Review Modern Physics, 2002, v. 74, pp 47Ц98.

42. Estrada, E. The Structure of Complex Networks: Theory and Applications, Oxford: Oxford University Press, 2011, 480 p.

43. Cohen, R. and Havlin, S. Complex Networks. Structure, Robustness and Function, Cambridge: Cambridge University Press, 2010, 248 p.

44. Ciancaglini, V., Gaeta, R., Loti, R., and Liquori, L. Interconnection of large scale unstructured p2p networks: modeling and analysis, Lecture notes in computer science. Analytical and stochastic modeling techniques and applications, 2013, v. 7984, pp. 183Ц197.

45. Leitao, J., Marques, J.P., Pereira, J., and Rodrigues, L. X-bot: a protocol for resilient optimization of unstructured overlay networks, IEEE Transactions on Parallel and Distributed Systems, 2012, v. 23, no. 11, pp. 2175Ц2188.

46. Matos, R., Marques, C., and Sargento, S. Distributed approach to control and manage contextbased multi-virtual networks, Mobile Networks Applications, 2012, v. 17, no. 4, pp. 447Ц462.

47. Liang, J., Kumar, R., and Ross, K.W. The fasttrack overlay: a measurement study, Computer Networks, 2006, v. 50, no. 6, pp. 842Ц858.

48. Cohen, B. Incentives build robustness in BitTorrent, Proceedings of the Workshop on Economics of Peer-to-Peer systems, 2003, v. 6, pp. 68Ц72.

49. Ripeanu, M., Iamnitchi, A., Foster, I., and Rogers, A. In search of simplicity: a self-organizing group communication overlay, Concurrency and Computation: Practice and Experience, 2010, v. 22, pp. 788Ц815.

50. Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., and Shenker, S. Making gnutellalike p2p systems scalable, Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMMТ03), 2003, pp. 407Ц418.

51. Wouhaybi, R.H. and Campbell, A.T. Phenix: supporting resilient low-diameter peer-to-peer topologies, Proceedings of the 23rd joint conference of the IEEE computer and communications societies (INFOCOMТ04), 2004, pp. 1Ц12.

52. Carchiolo, V., Malgeri, M., Mangioni, G., and Nicosia, V. An adaptive overlay network inspired by social behaviour, Journal of Parallel and Distributed Computing, 2010, v. 70, no. 3, pp. 282Ц295.

53. Babaoglu, O., Canright, G., Deutsch, A., di Caro, G.A., Ducatelle, F., and Gambardella, L.M. Design patterns from biology for distributed computing, ACM Transactions on Autonomous and Adaptive Systems, 2006, v. 1, no. 1, pp. 26Ц66.

54. Balasubramaniam, S., Leibnitz, K., Lio, P., Botvich, D., and Murata, M. Biological principles for future Internet architecture design, IEEE Communications Magazine, 2011, v. 49, no. 7, pp. 44Ц52.

55. Brocco, A. and Baumgart, I. A framework for a comprehensive evaluation of ant-inspired peer-to-peer protocols, Proceedings of the 20th Euromicro international conference on parallel, distributed and network-based processing (PDP), 2012, pp. 303Ц310.

56. Dressler, F. and Akan, O.B. Bio-inspired networking: from theory to practice, IEEE Communications Magazine, 2010, v. 48, no. 11, pp. 176Ц183.

57. Brocco, A., Malatras, A., Hirsbrunner, B. Enabling efficient information discovery in a self-structured grid, Future Generation Computer Systems, 2010, v. 26, no. 6, pp. 838Ц846.

58. Peng, F., Malatras, A., Hirsbrunner, B., and Courant, M. Antom: constructing multi-layer overlays for pervasive environments, Proceedings of the Eighth international workshop on mobile P2P computing (MP2PТ12), 2012, pp. 1Ц6.

59. Forestiero, A., Leonardi, E., Mastroianni, C., and Meo, M. Self-chord: a bio-inspired p2p framework for self-organizing distributed systems, IEEE/ACM Transactions on Networking (TON), 2010, v. 18, no. 5, pp. 1651Ц1664.

60. Barthelemy, M. Spatial Networks, Physics Reports, 2011, v. 499, pp. 1Ц101.

61. Wallach, D. A survey of peer-to-peer security issues, Proceedings of the International Symposium on Software Security Ч Theories and Systems. 2002. pp. 42Ц57.

62. Marmol, F.G. and Perez, G.M. State of the art in trust and reputation models in P2P networks, Handbook of Peer-to-Peer Networking. 2010. pp. 761Ц784.

63. Urdaneta, G., Pierre, G., and van Steen, M. A survey of DHT security techniques, ACM Computer Survey, 2011, v. 43, no. 2, pp. 1Ц49.

64. “ормасов ј., Ћысов ј., ћазур Ё. –аспределенные системы хранени¤ данных: анализ, классификаци¤ и варианты выбора // “руды »—ѕ –јЌ. 2015. “. 27. є 6. —. 225Ц252.

65.  узнецов —., ѕосконин ј. —истемы управлени¤ данными категории NoSQL // ѕрограммирование. 2014. “. 40. є 6. C. 34Ц47.

66. Rabin, M.O. Efficient dispersal of information for security, load balancing and fault tolerance, Journal of the ACM, 1989, v. 36, no. 2, pp. 335Ц348.

67. Dimakis, A.G., Ramchandran, K., Wu, Y., and Suh, C. A survey on network codes for distributed storage, Proceedings of the IEEE, 2011, v. 99, є 3, pp. 476Ц489.

68. Weatherspoon, H. and Kubiatowicz, J.D. Erasure coding vs. replication: a quantitiative comparison, Proceedings of the InInternational Workshop on Peer-to-Peer Systems (IPTPS), 2002, pp. 328Ц337.

69. ѕитерсон ”., ”элдон Ё.  оды, исправл¤ющие ошибки. ћ.: ћир, 1976. 596 с.

70. Ateniese G., Burns R., Curtmola R., Herring J., Kissner L., Peterson Z., and Song D. Provable data possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 598Ц609.

71. Ateniese, G., Pietro, R.D., Mancini, L.V., and Tsudik, G. Scalable and efficient provable data possession, Proceedings of the 4th international conference on Security and privacy in communication networks, 2008, p. 9.

72. Wang, C., Ren, K. and Wang, J. Secure and practical outsourcing of linear programming in cloud computing, Proceedings of IEEE INFOCOM, 2011, pp. 820Ц828.

73. Juels, A. and Kaliski, B.S. PORs: Proofs of retrievability for large files, Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 584Ц597.

74. Dodis, Y., Vadhan, S. and Wichs, D. Proofs of retrievability via hardness implication, Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, 2009, pp. 109Ц127.

75. Sookhak, M., Talebian, H., Ahmed, E., Gani, A., and Khan, M.K. A review on remote data auditing in single cloud server: Taxonomy and open issues, Journal of Network and Computer Applications, 2014, v. 43, pp. 121Ц141.

76. ћао, ¬. —овременна¤ криптографи¤: “еори¤ и практика. ћ.: ¬иль¤мс, 2005. 768 с.

77. Szabo, N. The Idea of Smart Contracts. 1997. http://www.fon.hum.uva.nl/rob/Courses/ InformationInSpeech/CDROM/Literature/ LOTwinterschool2006/szabo.best.vwh.net/ smart_contracts_idea.html

78. BitFury Group. Public versus Private Blockchains. 2015. http://bitfury.com/content/5-white-papersresearch/ public-vs-private-pt1-1.pdf

79. Buterin, V. Ethereum White Paper. 2016. https://github.com/ethereum/wiki/wiki/White- Paper

80. Wood, G. Ethereum: A secure decentralised generalised transaction ledger, 2015. http://gavwood.com/paper.pdf

81. Franco, P. Understanding Bitcoin. Cryptography, engineering, and economics. West Sussex: John Wiley and Sons, 2015. 288 p.

82. Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M., and Morris, R. Designing a DHT for low latency and high throughput, Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI), 2004, v. 4, pp. 85Ц98.

83. Flocchini, P., Nayak, A. and Xie, M. Enhancing Peer-to-Peer Systems Through Redundancy, IEEE Journal on selected areas in communications, 2007, v. 25, no. 1, pp. 15Ц24.

84. Giordanelli, R., Mastroianni, C., and Meo, M. Bioinspired p2p systems: the case of multidimensional overlay, ACM Transactions on Autonomous and Adaptive Systems (TAAS), 2012, v. 7, no. 4, pp. 1Ц28.

85. Clarke, I., Sandberg, O., Wiley, B., and Hong, T.W. Freenet: a distributed anonymous information storage and retrieval system, Proceedings of the International workshop on designing privacy enhancing technologies: design issues in anonymity and unobservability, 2001, pp. 46Ц66.

86. Wilkinson, S., Boshevski, T., Brandoff, J., and Buterin, V. Storj. A peer-to-peer cloud storage network, 2014. https://storj.io/storj.pdf

87. Vorick, D. and Champine, L. Sia: Simple Decentralized Storage. Technical Report, 2014. https://sia.tech/sia.pdf

Система Orphus

Загрузка...
Вверх