Corpus ID: 5824

The Darknet and the Future of Content Distribution

@inproceedings{Biddle2003TheDA,
  title={The Darknet and the Future of Content Distribution},
  author={Peter Biddle and Paul England and Marcus Peinado and Bryan Willman},
  year={2003}
}
We investigate the darknet – a collection of networks and technologies used to share digital content. [...] Key Result In view of this hypothesis, we examine the relevance of content protection and content distribution architectures.Expand
An investigation into darknets and the content available via anonymous peer-to-peer file sharing
TLDR
Which Darknets are easily discovered, the technical designs and methods used to hide content on the networks, the tools needed to join, and ultimately what type and quantities of files can be found on anonymous peer-to-peer file sharing networks are investigated. Expand
An investigation into darknets and the content available via anonymous peer-to-peer file sharing
Media sites, both technical and non-technical, make references to Darknets as havens for clandestine file sharing. They are often given an aura of mystique; where content of any type is just a mouseExpand
EXTENDING DARKNETS VIA MOBILE AD HOC NETWORKS
The future of darknets, for good or ill, depends on their ability to adapt to new technologies designed both to defeat them and to facilitate them. One of the best ways to strengthen and extendExpand
Measurement-driven characterization of emerging trends in Internet content delivery
Torres Guerra, Ruben Dario Ph.D., Purdue University, December 2011. MeasurementDriven Characterization of Emerging Trends in Internet Content Delivery . Major Professor: Sanjay G. Rao. In the lastExpand
Characterization of community based-P2P systems and implications for traffic localization
TLDR
The results suggest that (i) in ISPs with heterogeneous access technologies, the performance benefits to users on localizing P2P traffic is largely dependent on the degree of seed-like behavior of peers behind high-bandwidth access technologies; and (ii) while localization can reduce the traffic on Internet peering links, it has the potential to cause a significant increase in traffic on internal links of providers, potentially requiring upgrades of network links. Expand
The design and implementation of a security and containment platform for peer-to-peer media distribution
TLDR
An existing video streaming peer-to-peer protocol is used as the primary distribution mechanism, but users are allowed to share video over other protocols and services, which can include BitTorrent, DC++ and users sharing hard drives with one another. Expand
Splash: Data synchronization in unmanaged, untrusted peer-to-peer networks
Peer-to-peer networks rely on gossip algorithms to spread information about the peer activity and the network status. State-of-the-art gossip algorithms are not sufficient to spread the informationExpand
P2P commercial digital content exchange
TLDR
The concept of cascading Payments to ensure all participants in a P2P content exchange network are compensated is described, followed by a detailed description of the CasPaCE framework, which enables cascading payments and ensures that transactions are carried out in a trusted and secure manner. Expand
Private Communication Through a Network of Trusted Connections : The Dark Freenet
Freenet is a distributed, Internet-wide peer-to-peer overlay network designed to allow anonymized and censorship resistant publication and distribution of information. The system functions as aExpand
Leveraging Social Networks for Increased BitTorrent Robustness
TLDR
This paper addresses the problem of non-cooperative nodes in BitTorrent by leveraging the trust latent in the social networks and explicitly incorporating the social links as part of the BitTorrent content distribution infrastructure and finds that a hybrid solution has the highest robustness to freeriding, shortest download completion times and the most balanced upload bandwidth utilization. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 26 REFERENCES
Free Riding on Gnutella
TLDR
It is argued that free riding leads to degradation of the system performance and adds vulnerability to the system, and copyright issues might become moot compared to the possible collapse of such systems. Expand
Mnemosyne: Peer-to-Peer Steganographic Storage
TLDR
Mnemosyne provides a high level of privacy and plausible deniability by using a large amount of shared distributed storage to hide data by using secure hashing, and loss codes used for resiliency. Expand
Chord: A scalable peer-to-peer lookup service for internet applications
TLDR
Results from theoretical analysis, simulations, and experiments show that Chord is scalable, with communication cost and the state maintained by each node scaling logarithmically with the number of Chord nodes. Expand
Small-World Phenomena and the Dynamics of Information
TLDR
It is found that short chains are pervasive, and that people are able to find them, and this latter point is concerned precisely with a type of decentralized navigation in a social network, consisting of people as nodes and links joining. Expand
Internet: Diameter of the World-Wide Web
TLDR
The World-Wide Web becomes a large directed graph whose vertices are documents and whose edges are links that point from one document to another, which determines the web's connectivity and consequently how effectively the authors can locate information on it. Expand
Building peer-to-peer systems with chord, a distributed lookup service
We argue that the core problem facing peer-to-peer Systems is locating documents in a decentralized network and propose Chord, a distributed lookup primitive. Chord provides an efficient method ofExpand
Random evolution in massive graphs
  • W. Aiello, F. Graham, L. Lu
  • Mathematics, Computer Science
  • Proceedings 2001 IEEE International Conference on Cluster Computing
  • 2001
TLDR
This paper gives three increasingly general directed graph models and one general undirected graph model for generating power law graphs by adding at most one node and possibly one or more edges at a time and describes a method for scaling the time in the evolution model such that the power law of the degree sequences remains invariant. Expand
Collective dynamics of ‘small-world’ networks
TLDR
Simple models of networks that can be tuned through this middle ground: regular networks ‘rewired’ to introduce increasing amounts of disorder are explored, finding that these systems can be highly clustered, like regular lattices, yet have small characteristic path lengths, like random graphs. Expand
Random graph models of social networks
  • M. Newman, D. Watts, S. Strogatz
  • Computer Science, Medicine
  • Proceedings of the National Academy of Sciences of the United States of America
  • 2002
TLDR
It is found that in some cases, the models are in remarkable agreement with the data, whereas in others the agreement is poorer, perhaps indicating the presence of additional social structure in the network that is not captured by the random graph. Expand
Small Worlds: The Structure of Social Networks
Experimentally it has been found that any two people in the world, chosen at random, are connected to one another by a short chain of intermediate acquaintances, of typical lenth about six. ThisExpand
...
1
2
3
...