Reference Hub15
Blogracy: A Peer-to-Peer Social Network

Blogracy: A Peer-to-Peer Social Network

Enrico Franchi, Agostino Poggi, Michele Tomaiuolo
Copyright: © 2016 |Volume: 7 |Issue: 2 |Pages: 20
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781466692138|DOI: 10.4018/IJDST.2016040103
Cite Article Cite Article

MLA

Franchi, Enrico, et al. "Blogracy: A Peer-to-Peer Social Network." IJDST vol.7, no.2 2016: pp.37-56. http://doi.org/10.4018/IJDST.2016040103

APA

Franchi, E., Poggi, A., & Tomaiuolo, M. (2016). Blogracy: A Peer-to-Peer Social Network. International Journal of Distributed Systems and Technologies (IJDST), 7(2), 37-56. http://doi.org/10.4018/IJDST.2016040103

Chicago

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Blogracy: A Peer-to-Peer Social Network," International Journal of Distributed Systems and Technologies (IJDST) 7, no.2: 37-56. http://doi.org/10.4018/IJDST.2016040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The current approach to build social networking systems is to create huge centralized systems owned by a single company. However, such strategy has many drawbacks, e.g., lack of privacy, lack of anonymity, risks of censorship and operating costs. In this paper the authors propose a novel P2P system that leverages existing, widespread and stable technologies such as DHTs and BitTorrent. In particular, they introduce a key-based identity system and a model of social relations for distributing content efficiently among interested readers. The system they propose, Blogracy, is a micro-blogging social networking system focused on: (i) anonymity and resilience to censorship; (ii) authenticatable content; (iii) semantic interoperability using activity streams. The authors have implemented the system and conducted various experiments to study its behaviour. The results are presented here, regarding (i) communication delays for some simulations of node churn, (ii) delays measured in test operations over PlanetLab, in direct communication, and (iii) through the I2P anonymizing network.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.