BitTorrent ≈ BitTorrentBitTorrent
View article: Development of Data Lake Core
Development of Data Lake Core Open
This thesis detailed the development of a data lake core microservice in Java and Clojure, using IPFS as an append-only storage. It provides a HTTP interface for data ingestion, query and extraction, with a query abstract syntax tree denot…
View article
Measuring Ethereum Network Peers Open
Ethereum, the second-largest cryptocurrency valued at a peak of $138 billion in 2018, is a decentralized, Turing-complete computing platform. Although the stability and security of Ethereum---and blockchain systems in general---have been w…
View article
Caveat emptor, computational social science: Large-scale missing data in a widely-published Reddit corpus Open
As researchers use computational methods to study complex social behaviors at scale, the validity of this computational social science depends on the integrity of the data. On July 2, 2015, Jason Baumgartner published a dataset advertised …
View article
A Multi-perspective Analysis of Carrier-Grade NAT Deployment Open
As ISPs face IPv4 address scarcity they increasingly turn to network address translation (NAT) to accommodate the address needs of their customers. Recently, ISPs have moved beyond employing NATs only directly at individual customers and i…
View article
The Effect of Subscription Video-on-Demand on Piracy: Evidence from a Household-Level Randomized Experiment Open
We partner with a major multinational telecommunications provider to analyze the effect of subscription video-on-demand (SVoD) services on digital piracy. For a period of 45 consecutive days, a group of randomly selected households who use…
View article
CE-PBFT: A high availability consensus algorithm for large-scale consortium blockchain Open
The consortium blockchain has been widely applied in various fields such as agricultural product traceability, supply chain management, and logistics transportation. As an indispensable component of a consortium blockchain, the consensus a…
View article
EdgePier: P2P-based Container Image Distribution in Edge Computing Environments Open
Edge and fog computing architectures utilize container technologies in order\nto offer a lightweight application deployment. Container images are stored in\nregistry services and operated by orchestration platforms to download and start\nt…
View article
Blockchain-Based Decentralized Storage Systems for Sustainable Data Self-Sovereignty: A Comparative Study Open
In the digital age, data sovereignty has emerged as a critical concern due to the increasing demand for privacy, security, and user control. In this context, decentralized storage infrastructure is reshaping how data are stored and managed…
View article
Optimizing End-to-End Big Data Transfers over Terabits Network Infrastructure Open
While future terabit networks hold the promise of significantly improving big-data motion among geographically distributed data centers, significant challenges must be overcome even on today's 100 gigabit networks to realize end-to-end per…
View article
Evaluation Model and Approximate Solution to Inconsistent Max‐Min Fuzzy Relation Inequalities in P2P File Sharing System Open
Considering the requirement of biggest download speed of the terminals, a BitTorrent‐like Peer‐to‐Peer (P2P) file sharing system can be reduced into a system of max‐min fuzzy relation inequalities. In this paper we establish an evaluation …
View article
A mathematical model for file fragment diffusion and a neural predictor to manage priority queues over BitTorrent Open
BitTorrent splits the files that are shared on a P2P network into fragments and then spreads these by giving the highest priority to the rarest fragment. We propose a mathematical model that takes into account several factors such as the p…
View article
Overcoming Free-Riding Behavior in Peer-to-Peer Networks Using Points System Approach Open
Peer-to-peer (P2P) networks play an important role in communication and resource sharing. In recent years, the importance of(P2P) networks has increased due to their scalability and simple, cost-efficient model. P2P file-sharing systems wi…
View article
Hyperdimensional hashing Open
Most cloud services and distributed applications rely on hashing algorithms that allow dynamic scaling of a robust and efficient hash table. Examples include AWS, Google Cloud and BitTorrent. Consistent and rendezvous hashing are algorithm…
View article
IOTA-BT: A P2P File-Sharing System Based on IOTA Open
BitTorrent (BT) is the most popular peer-to-peer file-sharing system. According to official BT information, more than 100 million active users use BT for file transfers every month. However, BT mainly relies on either a central tracker (tr…
View article
Global P2P BitTorrent Real-Time Traffic Over SDN-Based Local-Aware NG-PON2 Open
File sharing is one of the most common uses in Peer-to-peer (P2P) networks and structured P2P systems, such as BitTorrent (BT), which may overcome the limitations of features such as improved scalability, efficiency, and deterministic data…
View article
The networked record industry: How blockchain technology could transform the consumption and monetisation of recorded music Open
Following the emergence of file-sharing networks such as Napster and BitTorrent, the record industry has tended to regard peer-to-peer networks in a negative light. This is hardly surprising: in the terms of Yochai Benkler, such networks p…
View article
Adaptive Capacity Partitioning in Cooperative Computing to Maximize Received Resources Open
Users in a cooperative computing environment always have a tendency to free-ride. One can employ incentive mechanisms to prevent such behavior. Some of the cooperative computing scenarios have the same access link shared between upload and…
View article
Torrente, a micropayment based Bittorrent extension to mitigate free riding Open
We propose Torrente, a distributed file-sharing solution with economic incentives. Its implementation is built as an extension of BitTorrent protocol, in such a manner that user access to file-sharing swarms is controlled by peers that ver…
View article
Internet archeology: estimating individual application trends in incomplete historic traffic traces Open
Public traffic traces are often obfuscated for privacy reasons, leaving network historians with only port numbers from which to identify past application traffic trends. However, it is misleading to make assumptions based on default port n…
View article
A Novel Massive Deployment Solution Based on the Peer-to-Peer Protocol Open
The BitTorrent (BT) is a peer-to-peer (P2P) file sharing protocol that was developed approximately 20 years ago, is becoming increasingly popular, and has been widely accepted. The BT-based mass deployment system can be used to improve per…
View article
Share-Ratio-Based Incentive Mechanism for File Sharing With BitTorrent Protocol Open
Several P2P file-sharing networks were successfully deployed and are used by millions of Internet users globally to share files (such as movies, video clips, software systems, e-books, etc.) cooperatively over the Internet. These networks …
View article
Peer-to-Peer Data Sharing in Named Data Networking Open
Peer-to-peer file sharing applications envision a world, where peers will communicate in terms of the data that they are looking for. In this world, peers will be able to retrieve the desired data from any other peer that can provide it, w…
View article
A Multimode Network Steganography for Covert Wireless Communication Based on BitTorrent Open
Network steganography is a hidden communication technique, which utilizes the legitimate traffic as the vehicle to transfer the secret information covertly over the untrusted network. BitTorrent (BT) is one of the most prevalent P2P servic…
View article
Experimental Analysis of Bittorrent Traffic based on Heavy-Tailed Probability Distributions Open
Complexity involved in measuring and analyzing the BitTorrent traffic has led to various studies in this direction.Challenges involved are related to storage, data retrieval, location of content, topological features, privacy, copyright is…
View article
VPN0: A Privacy-Preserving Decentralized Virtual Private Network Open
Distributed Virtual Private Networks (dVPNs) are new VPN solutions aiming to solve the trust-privacy concern of a VPN's central authority by leveraging a distributed architecture. In this paper, we first review the existing dVPN ecosystem …
View article
A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client Open
The BitTorrent client application is a popular utility for sharing large files over the Internet. Sometimes, this powerful utility is used to commit cybercrimes, like sharing of illegal material or illegal sharing of legal material. In ord…
View article
5G-EECC: Energy-Efficient Collaboration-Based Content Sharing Strategy in Device-to-Device Communication Open
In the past few years, mobile data traffic has seen exponential growth due to the emergence of smart applications. Although throughput enhancement techniques such as macro- and femtocells reduce cell size, they are relatively expensive to …
View article
XGet: a highly scalable and efficient file transfer tool for clusters Open
As clusters rapidly grow in size, transferring files between nodes can no longer be solved by the traditional transfer utilities due to their inherent lack of scalability. In this paper, we describe a new file transfer utility called XGet,…
View article
Mistrustful P2P: Privacy-preserving file sharing over untrustworthy Peer-to-Peer networks Open
Peer-to-Peer networks are extensively used for largescale file sharing. As more information flows through these networks, people are becoming increasingly concerned about their privacy. Traditional P2P file sharing systems provide performa…
View article
Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence Open
This research uses data collected from a university campus network via Deep Packet Inspection (DPI) monitoring and from the largest public BitTorrent tracker to characterize the extent of unauthorized transfers of copyrighted content using…