Analyzing P2P Cloud Architectures: A Research Perspective

International Journal of Computer Science and Engineering
© 2019 by SSRG - IJCSE Journal
Volume 6 Issue 1
Year of Publication : 2019
Authors : Ms. Amruta Deshmukh, Dr. M. A. Pund

How to Cite?

Ms. Amruta Deshmukh, Dr. M. A. Pund, "Analyzing P2P Cloud Architectures: A Research Perspective," SSRG International Journal of Computer Science and Engineering , vol. 6,  no. 1, pp. 1-8, 2019. Crossref,


Peer to Peer (P2P) computing has come up as an interesting technique for design of distributed systems. These systems vary from block chain miners to general cloud computing architectures. P2P computing is distributed, secure, robust, scalable and economical due to the collaborative working of multiple computing nodes in synchronization to achieve any task. In this paper, we compare various techniques and architectures used for design of a P2P cloud, and the issues faced by these implementations. Such a study will be useful for researchers to carefully design and develop their own P2P version of cloud by studying the nuances of typical P2P cloud architectures.


Peer to Peer, cloud, robust, scalable, secure, and distributed.


[1] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G.,Patterson, D. A., Rabkin, A., Stoica, I. and Zanaria, I.: Above the Clouds: A Berkeley View of Cloud. In: Technical Report No. UCB/EECS-2009-28, University of California at Berkeley, Berkeley, CA, USA, (2009).
[2] Mell, P. and Grance, T.: The NIST Definition of Cloud Computing. In: Special publication 800-145 (draft), Gaithersburg, MD, USA, (2011).
[3] “Afuronto: A six hop peer-to-peer network of zillions of Nodes” Hrishikesh Dewan, R.C Hansdah 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications 1550- 445X/18/IEEE DOI 10.1109/AINA.2018.00151.
[4] Babaoglu, O., Marzolla, M. and Tamburini, M.. Design and implementation of a P2P cloud system. In: 27th Annual ACM Symposium on Applied Computing (SAC‟12), pp 412–417, Trento, Italy (2012).
[5] Sosinsky, B.: Cloud Computing Bible. In: Wiley Publishing Inc., Indianapolis, IN, USA (2011).
[6] Cunsolo, V., Distefano, S., Puliafito, A. and Scarpa, M.: Cloud@home: Bridging the gap between volunteer and cloud computing. In: 5th International Conference on Emerging Intelligent Computing Technology and Applications (ICIC‟09), Ulsan, South Korea, (2009).
[7] “Escape From the Data Center: The Promise of Peer-to-Peer Cloud Computing” By Ozalp Babaoglu and Moreno Marzolla IEEE spectrum 22 Sep 2014:
[8] Xu, K., Song, M., Zhang, X. and Song, J.: A Cloud Computing Platform based on P2P. In: IEEE International Symposium on IT in Medicine Education (ITME ‟09), pp. 427-432, Shandong, China, (2009).
[9] C. Elliott, “GENI: exploring networks of the future,” Mar. 2009, Available:
[10] I. A. Kash, J. K. Lai, H. Zhang, and A. Zohar, “Economics of BitTorrent communities,” In Proc. 6th Workshop on Economics of Networks, Systems, and Computation (NetEcon „11), June 2011.
[11] M. Meulpolder et al., “Public and private BitTorrent communities: a measurement study,” In Proc. 9th Int. Conf. on Peer-to-Peer Systems, Apr. 2010.
[12] “Effective High Performance Computing using Peer To Peer Networks” Nunziato Cassavia, Sergio Flesca, Michele Ianni, Elio Masciari, Giuseppe Papuzzo and Chiara Pulice 2017 International Conference on High Performance Computing Simulation.
[13] H. Shen, Z. Li, T. Li, and Y. Zhu, “PIRD: P2P-based intelligent resource discovery in Internet-based distributed
systems,” In Proc. 28th Int. Conf. on Distributed Computing Systems, June 2008, pp. 858–865.
[14] “Improving the Performance of Data Sharing in Dynamic Peer-to-Peer Mobile Cloud” Wenhua Xiao, Weidong Bao, Xiaomin Zhu, Wen Zhou and Peizhong Lu 2016 IEEE 22nd International Conference on Parallel and Distributed Systems
[15] H. M. N. D. Bandara and A. P. Jayasumana, “Characteristics of multiattribute resources/queries and implications on P2P resource discovery,” In Proc 9th ACS/IEEE Int. Conf. on Computer Systems and Applications (AICCSA „11), Dec. 2011.
[16] J. Albrecht, D. Oppenheimer, D. Patterson, and A. Vahdat, “Design and implementation tradeoffs for widearea resource discovery,” ACM Trans. Internet Technol., vol. 8, no. 4, Sep. 2008.
[17] Y-S . Kee, K. Yocum, A. Chien, and H. Casanova, “Improving grid resource allocation via integrated selection and binding,” In Proc. Supercomputing, Nov. 2006.
[18] D. Irwin, N. Sharma, P. Shenoy, and M. Zink, “Towards a virtualized sensing environment,” In Proc. 6th Int.Conf. on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom „10), May 2010.
[19] Y. Tan, J. Han, and Y. Lu, “Agent-based intelligent resource discovery scheme in P2P networks,” In Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Dec. 2008, pp. 752–756.
[20] X. Sun, Y. Tian, Y. Liu, and Y. He, “An unstructured P2P network model for efficient resource discovery,” In Proc. Int. Conf. on Applications of Digital Information and Web Technologies, Aug. 2008, pp. 156–161.
[21] A. R. Bharambe, M. Agrawal, and S. Seshan, “Mercury: Supporting scalable multi-attribute range queries,” In Proc. ACM SIGCOMM „04, Aug./Sep. 2004.
[22] H. Shen, A. Apon, and C. Xu, “LORM: Supporting low-overhead P2Pbased range-query and multi-attribute resource management in grids,” In Proc. 13th Int. Conf. on Parallel and Distributed Systems, Dec. 2007.
[23] M. Cai, M. Frank, J. Chen, and P. Szekely, “MAAN: A multi-attribute addressable network for grid information services,” J. of Grid Computing, Jan. 2004.
[24] P. Ganesan, B. Yang, and H. Garcia-Molina, “One torus to rule them all: Multi-dimensional queries in P2P systems,” In Proc. 7th Int. Workshop on Web and Databases (WebDB „04), June 2004.
[25] P. Costa, J. Napper, G. Pierre, and M. Steen, “Autonomous resource selection for decentralized utility computing,” In Proc. 29th Int. Conf. on Distributed Computing Systems, June 2009.
[26] R. Ranjan, A. Harwood, and R. Buyya, “Peer-to-peer based resource discovery in global grids: a tutorial,” IEEE Commun. Surv., vol. 10, no. 2.
[27] P. Trunfio, “Peer-to-Peer resource discovery in Grids: Models and systems,” Future Generation Computer Systems archive, vol. 23, no. 7, Aug. 2007.
[28] E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, “A survey and comparison of peer-to-peer overlay network schemes,” IEEE Commun. Surv. Tutor., Mar 2004.
[29] K. Park and V. S. Pai, “CoMon: a mostly-scalable monitoring system for PlanetLab,” ACM SIGOPS Operating Systems Review, vol. 40, no. 1, Jan 2006.
[30] S. Kwan, and J. K. Muppala, “Bag-of-tasks applications scheduling on volunteer desktop grids with adaptive information dissemination,” In Proc. 35th IEEE Conf. on Local Computer Networks (LCN „10), Oct. 2010, pp.560–567.
[31] M. Liu, T. Koskela, Z. Ou, J. Zhou, J. Riekki, and M. Ylianttila, “Superpeer-based coordinated service provision,” J. Network and Computer Applications, vol. 34, pp. 1210–1224, doi:10.1016/j.jnca.2011.01.007
[32] H. M. N. D. Bandara and A. P. Jayasumana, “Evaluation of P2P resource discovery architectures using real-life multi-attribute resource and query characteristics,” In Proc. IEEE Consumer Communications and Networking Conf. (CCNC „12), Jan. 2012.
[33] T. Zahn, and J. Schiller, “MADPastry: a DHT substrate for practicably sized MANETs,” In Proc. 5th Workshop Applications and Services in Wireless Networks, June/July 2005.
[34] L. Dekar and H. Kheddouci, “A resource discovery scheme for large scale ad hoc networks using a hypercubebased backbone,” In Proc Int. Conf. on Advanced Information Networking and Applications, May 2009, pp. 293–300.
[35] P. Golle, K. Leyton-Brown, and I. Mironov, “Incentives for sharing in peer-to-peer networks,” In Proc. 3rd ACM Conf. on Electronic Commerce (EC ‟01), Oct. 2001, pp. 264–267.
[36] B. Q. Zhao, J. C. S. Lui, and D-M. Chiu, “A mathematical framework for analyzing adaptive incentive protocols in P2P networks,” IEEE/ACM Trans. Network, vol. 20, no. 2, Apr. 2012, pp. 367-380
[37] V. Vishnumurthy, S. Chandrakumar, and E. G. Sirer, “KARMA: A secure economic framework for peer-to-peer resource sharing,” In Proc. Workshop on the Economics of Peer-to-Peer Systems, June 2003.
[38] S. Kamvar, M. Schlosser, and H. Garcia-Molina, “The Eigentrust algorithm for reputation management in P2P networks,” In Proc. ACM World Wide Web Conf. (WWW „03), May 2003.
[39] R. Zhou and K. Hwang, “PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing,” IEEE Trans. on Parallel and Distributed Sys., vol. 18, no. 4, 2007, pp. 460–473.
[40] L. Xiong and L. Liu, “PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities,” IEEE Trans. on Knowledge and Data Engineering, vol. 16, no. 7, 2004, pp. 843–857.
[41] R. Gupta and A. K. Somani, “Reputation management framework and its use as currency in large-scale peer-to-peer networks,” In Proc. 4th IEEE Int. Conf. on Peer-to-Peer Computing (P2P „04), 2004, pp. 124–132.
[42] X. Zhao, L. Li, and G. Xue, “Authenticating strangers in fast mixing online social networks,” In Proc. IEEE GLOBECOM „11, Dec. 2011.
[43] T. Choi, H. B. Acharya, and M. G. Gouda, “Is that you? Authentication in a network without identities,” In Proc. IEEE GLOBECOM „11, Dec. 2011.
[44] D. S. Milojicic, “Peer-to-peer computing,” HP Laboratories Palo Alto. Tech. Rep. HPL-2002-57, July 2002.
[45] H. Shen and C. Xu, “Performance analysis of DHT algorithms for rangequery and multi-attribute resource discovery in grids,” In Proc. Int. Conf. on Parallel Processing, Sep. 2009. pp. 246–253.
[46] F. Dabek, R. Cox, F. Kaashoek, and R. Morris, “Vivaldi: A decentralized network coordinate system,” In Proc. ACM SIGCOMM „04, Aug. 2004.
[47] J. Ledlie, P. Gardner, and M. Seltzer, “Network coordinates in the wild,” In Proc. USENIX NSDI „07, Apr. 2007.
[48] R. Beverly, K. Sollins, and A. Berger, “SVM learning of IP address structure for latency prediction,” ACM SIGCOMM Workshop on Mining Network Data, Sep. 2006, pp. 299–304.
[49] H. Xie, Y. R. Yang, A. Krishnamurthy, Y. G. Liu, and A. Silberschatz, “P4P: Provider portal for applications,”ACM SIGCOMM Computer Communication Review, vol. 38, no. 4. Oct. 2008, pp. 351–362.
[50] J. Seedorf, S. Kiesel, and M. Stiemerling, “Traffic localization for P2Papplications: the ALTO approach,” In Proc. 9th IEEE Int. Conf. on Peerto-Peer Computing (P2P ‟09). Sept. 2009, pp.171–177.
[51] M. S. Artigas and B. Herrera, “Social Helpers: Introducing social trust to ameliorate churn in P2P reputation systems,” In
Proc. IEEE Int. Conf. on Peer-to-Peer Computing, Aug.-Sep. 2011, pp. 328–337.