Skip to main content

ELISA: Extensible Layer for Internet Services and Applications

  • Conference paper
  • First Online:
  • 1422 Accesses

Abstract

Contemporary P2P services and applications often design and implement the entire system from the base ground or builds on low-level frameworks. This leads to significant development and maintenance efforts and often reinvention of the wheel. In this chapter we propose extensible layer that does not expose low-level implementation details to client application developers, while providing them with well-known services and communication mechanisms built on efficient and scalable substrates. Analysis and design of architecture for this extensible layer are described. Special attention is given to security concerns and manycast communication approach. Our preliminary implementation is emulated and evaluated to establish functional and performance possibilities of the prototype.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Castro M, Druschel P, Kermarrec A, Rowstron A (2002a) SCRIBE: a large-scale and decentralized application-level multicast infrastructure. IEEE J Sel Areas Commun 20(8):1489–1499

    Article  Google Scholar 

  2. Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS (2002b) Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper Syst Rev 36(SI):299–314. Available: http://doi.acm.org/10.1145/844128.844156 [online]

  3. Castro M, Druschel P, Kermarrec A-M, Rowstron A (2003a) Scalable application-level anycast for highly dynamic groups. Springer, Berlin, pp 47–57

    Google Scholar 

  4. Castro M, Druschel P, Kermarrec A-M, Nandi A, Rowstron A, Singh A (2003b) Splitstream: high-bandwidth multicast in cooperative environments. SIGOPS Oper Syst Rev 37(5):298–313. Available: http://doi.acm.org/10.1145/1165389.945474 [online]

  5. Cerny T, Jaromerska S, Praus P, Matl L, Donahoo J (2011) Cooperative web cache. In: 18th international conference on systems, signals and image processing

    Google Scholar 

  6. Cerny T, Praus P, Jaromeska S, Matl L, Donahoo M (2012) Towards a smart, self-scaling cooperative web cache. In: Bielikova M, Friedrich G, Gottlob G, Katzenbeisser S, Turen G (eds) SOFSEM 2012: theory and practice of computer science. Lecture notes in computer science, vol 7147. Springer, Berlin, pp 443–455. 10.1007/978-3-642-27660-6_36. Available: http://dx.doi.org/10.1007/978-3-642-27660-6_36 [online]

  7. Ciaccio G (2005) NEBLO: Anonymity in a Structured Overlay. DISI, Università di Genova, Technical Report DISI-TR-05-05, May 2005

    Google Scholar 

  8. Ciaccio G (2007) A pretty flexible api for generic peer-to-peer programming. In: IEEE international parallel and distributed processing symposium, 2007 (IPDPS 2007), pp 1–8

    Google Scholar 

  9. Clarke I, Sandberg O, Wiley B, Hong T (2001) Freenet: a distributed anonymous information storage and retrieval system. In: Designing privacy enhancing technologies. Springer, Berlin, pp 46–66

    Google Scholar 

  10. Cohen B (2003, June). Incentives build robustness in BitTorrent. In Workshop on Economics of Peer-to-Peer systems, vol. 6, pp. 68–72

    Google Scholar 

  11. Dabek F, Zhao B, Druschel P, Kubiatowicz J, Stoica I (2003a) Towards a common api for structured peer-to-peer overlays. In: Internationals workshop on peer-to-peer systems

    Google Scholar 

  12. Dabek F, Zhao B, Druschel P, Kubiatowicz J, Stoica I (2003b) Towards a common api for structured peer-to-peer overlays. In: Kaashoek M, Stoica I (eds) Peer-to-Peer systems II. Lecture notes in computer science, vol 2735. Springer, Berlin, pp 33–44. doi:10.1007/978-3-540-45172-3_3 Available: http://dx.doi.org/10.1007/978-3-540-45172-3_3 [online]

  13. Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) IPTPS. Lecture notes in computer science, vol 2429. Springer, Berlin, pp 251–260. Available: http://dblp.uni-trier.de/db/conf/iptps/iptps2002.html#Douceur02 [online]

  14. Doval D, O’Mahony D (2003) Overlay networks: a scalable alternative for p2p. IEEE Internet Comput 7:79–82

    Article  Google Scholar 

  15. Ganesh L, Zhao BY (2005, November). Identity theft protection in structured overlays. In Secure Network Protocols, 2005 (NPSec). 1st IEEE ICNP Workshop on (pp. 49–54). IEEE

    Google Scholar 

  16. Li D, Lu X, Wu J (2005) Fissione: a scalable constant degree and low congestion dht scheme based on kautz graphs. In: Proceedings of the IEEE 24th annual joint conference of the IEEE computer and communications societies (INFOCOM’05)., vol 3, pp 1677–1688

    Google Scholar 

  17. Nandi A, Ganjam A, Druschel P, Ng TSE, Stoica I, Zhang H, Bhattacharjee B (2007) Saar: a shared control plane for overlay multicast. In: Proceedings of the 4th USENIX conference on networked systems design & implementation, NSDI’07. USENIX Association, Berkeley, pp 5–5. Available: http://dl.acm.org/citation.cfm?id=1973430.1973435 [online]

  18. Rowstron AIT, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Proceedings of the IFIP/ACM international conference on distributed systems platforms Heidelberg, Middleware ’01. Springer, London, pp 329–350

    Google Scholar 

  19. Schollmeier R (2001) [16] a definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: Proceedings of the first international conference on peer-to-peer computing, P2P ’01. IEEE Computer Society, Washington, DC, p 101–102. Available: http://dl.acm.org/citation.cfm?id=882470.883282 [online]

  20. Shen R, Wang J, Zhang S, Shen S, Fan P (2009) A framework for constructing peer-to-peer overlay networks in java. In: Proceedings of the 7th international conference on principles and practice of programming in Java, PPPJ ’09. ACM, New York, pp 40–48. Available: http://doi.acm.org/10.1145/1596655.1596662 [online]

  21. Stoica I, Morris R, Liben-Nowell D, Karger D, Kaashoek M, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans Netw 11(1):17–32

    Article  Google Scholar 

  22. Venkataraman V, Yoshida K, Francis P (2006) Chunkyspread: heterogeneous unstructured end system multicast. In: Proceedings of the ICNP

    Google Scholar 

  23. Webb K, Hibler M, Ricci R, Clements A, Lepreau J (2004) Implementing the Emulab-PlanetLab portal: experience and lessons learned. Available: http://www.usenix.org/publications/library/proceedings/worlds04/tech/webb.html [online]

  24. Zhang X, Liu J, Li B, Yum TSP (2005) Coolstreaming/donet: a data-driven overlay network for peer-to-peer live media streaming. In: IEEE infocom

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lubos Matl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media, LLC

About this paper

Cite this paper

Matl, L., Kloucek, V., Bohdal, V.B., Kubr, J., Cerny, T. (2013). ELISA: Extensible Layer for Internet Services and Applications. In: Linger, H., Fisher, J., Barnden, A., Barry, C., Lang, M., Schneider, C. (eds) Building Sustainable Information Systems. Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-7540-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7540-8_24

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4614-7539-2

  • Online ISBN: 978-1-4614-7540-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics