Resource-Sharing Computer Communications Networks
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Will Sci-Hub Kill the Open Access Citation Advantage and (At Least for Now) Save Toll Access Journals?
Will Sci-Hub Kill the Open Access Citation Advantage and (at least for now) Save Toll Access Journals? David W. Lewis October 2016 © 2016 David W. Lewis. This work is licensed under a Creative Commons Attribution 4.0 International license. Introduction It is a generally accepted fact that open access journal articles enjoy a citation advantage.1 This citation advantage results from the fact that open access journal articles are available to everyone in the word with an Internet collection. Thus, anyone with an interest in the work can find it and use it easily with no out-of-pocket cost. This use leads to citations. Articles in toll access journals on the other hand, are locked behind paywalls and are only available to those associated with institutions who can afford the subscription costs, or who are willing and able to purchase individual articles for $30 or more. There has always been some slippage in the toll access journal system because of informal sharing of articles. Authors will usually send copies of their work to those who ask and sometime post them on their websites even when this is not allowable under publisher’s agreements. Stevan Harnad and his colleagues proposed making this type of author sharing a standard semi-automated feature for closed articles in institutional repositories.2 The hashtag #ICanHazPDF can be used to broadcast a request for an article that an individual does not have access to.3 Increasingly, toll access articles are required by funder mandates to be made publically available, though usually after an embargo period. -
Piracy of Scientific Papers in Latin America: an Analysis of Sci-Hub Usage Data
Developing Latin America Piracy of scientific papers in Latin America: An analysis of Sci-Hub usage data Juan D. Machin-Mastromatteo Alejandro Uribe-Tirado Maria E. Romero-Ortiz This article was originally published as: Machin-Mastromatteo, J.D., Uribe-Tirado, A., and Romero-Ortiz, M. E. (2016). Piracy of scientific papers in Latin America: An analysis of Sci-Hub usage data. Information Development, 32(5), 1806–1814. http://dx.doi.org/10.1177/0266666916671080 Abstract Sci-Hub hosts pirated copies of 51 million scientific papers from commercial publishers. This article presents the site’s characteristics, it criticizes that it might be perceived as a de-facto component of the Open Access movement, it replicates an analysis published in Science using its available usage data, but limiting it to Latin America, and presents implications caused by this site for information professionals, universities and libraries. Keywords: Sci-Hub, piracy, open access, scientific articles, academic databases, serials crisis Scientific articles are vital for students, professors and researchers in universities, research centers and other knowledge institutions worldwide. When academic publishing started, academies, institutions and professional associations gathered articles, assessed their quality, collected them in journals, printed and distributed its copies; with the added difficulty of not having digital technologies. Producing journals became unsustainable for some professional societies, so commercial scientific publishers started appearing and assumed printing, sales and distribution on their behalf, while academics retained the intellectual tasks. Elsevier, among the first publishers, emerged to cover operations costs and profit from sales, now it is part of an industry that grew from the process of scientific communication; a 10 billion US dollar business (Murphy, 2016). -
Practical Anonymous Networking?
gap – practical anonymous networking? Krista Bennett Christian Grothoff S3 lab and CERIAS, Department of Computer Sciences, Purdue University [email protected], [email protected] http://www.gnu.org/software/GNUnet/ Abstract. This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based on this new perspective it is possible to relax the requirements stated in traditional indirection schemes, allowing individual nodes to balance anonymity with efficiency according to their specific needs. 1 Introduction In this paper, we present the anonymity aspect of gnunet, a framework for secure peer-to-peer networking. The gnunet framework provides peer discovery, link encryption and message-batching. At present, gnunet’s primary application is anonymous file-sharing. The anonymous file-sharing application uses a content encoding scheme that breaks files into 1k blocks as described in [1]. The 1k blocks are transmitted using gnunet’s anonymity protocol, gap. This paper describes gap and how it attempts to achieve privacy and scalability in an environment with malicious peers and actively participating adversaries. The gnunet core API offers node discovery, authentication and encryption services. All communication between nodes in the network is confidential; no host outside the network can observe the actual contents of the data that flows through the network. Even the type of the data cannot be observed, as all packets are padded to have identical size. -
Measuring Freenet in the Wild: Censorship-Resilience Under Observation
Measuring Freenet in the Wild: Censorship-resilience under Observation Stefanie Roosy, Benjamin Schillerz, Stefan Hackerz, Thorsten Strufey yTechnische Universität Dresden, <firstname.lastname>@tu-dresden.de zTechnische Universität Darmstadt, <lastname>@cs.tu-darmstadt.de Abstract. Freenet, a fully decentralized publication system designed for censorship-resistant communication, exhibits long delays and low success rates for finding and retrieving content. In order to improve its perfor- mance, an in-depth understanding of the deployed system is required. Therefore, we performed an extensive measurement study accompanied by a code analysis to identify bottlenecks of the existing algorithms and obtained a realistic user model for the improvement and evaluation of new algorithms. Our results show that 1) the current topology control mechanisms are suboptimal for routing and 2) Freenet is used by several tens of thousands of users who exhibit uncharacteristically long online times in comparison to other P2P systems. 1 Introduction Systems that allow users to communicate anonymously, and to publish data without fear of retribution, have become ever more popular in the light of re- cent events1. Freenet [1–3] is a widely deployed completely decentralized system focusing on anonymity and censorship-resilience. In its basic version, the Open- net mode, it provides sender and receiver anonymity but establishes connections between the devices of untrusted users. In the Darknet mode, nodes only con- nect to nodes of trusted parties. Freenet aims to achieve fast message delivery over short routes by arranging nodes in routable small-world network. However, Freenet’s performance has been found to be insufficient, exhibiting long delays and frequent routing failures [4]. -
Sharing Music Files: Tactics of a Challenge to the Industry Brian Martin University of Wollongong, [email protected]
University of Wollongong Research Online Faculty of Arts - Papers (Archive) Faculty of Law, Humanities and the Arts 2010 Sharing music files: tactics of a challenge to the industry Brian Martin University of Wollongong, [email protected] Christopher L. Moore Deakin University, [email protected] Colin Salter McMaster University, [email protected] Publication Details Martin, B., Moore, C. L. & Salter, C. 2010, 'Sharing music files: tactics of a challenge to the industry', First Monday, vol. 15, no. 12. Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] First Monday, Volume 15, Number 12 - 6 December 2010 HOME ABOUT LOG IN REGISTER SEARCH CURRENT ARCHIVES SUBMISSIONS Home > Volume 15, Number 12 - 6 December 2010 > Martin The sharing of music files has been the focus of a massive struggle between representatives of major record companies and artists in the music industry, on one side, and peer–to–peer (p2p) file–sharing services and their users, on the other. This struggle can be analysed in terms of tactics used by the two sides, which can be classified into five categories: cover–up versus exposure, devaluation versus validation, interpretation versus alternative interpretation, official channels versus mobilisation, and intimidation versus resistance. It is valuable to understand these tactics because similar ones are likely to be used in ongoing struggles between users of p2p services and representatives of the content industries. Contents Introduction The backfire model Cover–up versus exposure Devaluation versus validation Interpretation struggles Official channels versus mobilisation Intimidation versus resistance Levels of strategy Conclusion Introduction Until the 1990s, the music industry played a leading role in the distribution of recorded music. -
An Introductory Historical Contextualization of Online Creation Communities for the Building of Digital Commons: the Emergence of a Free Culture Movement
An Introductory Historical Contextualization of Online Creation Communities for the Building of Digital Commons: The Emergence of a Free Culture Movement Mayo Fuster Morell Autonomous University of Barcelona [email protected] Abstract. Online Creation Communities (OCCs) are a set of individ- uals that communicate, interact and collaborate; in several forms and degrees of participation which are eco-systemically integrated; mainly via a platform of participation on the Internet, on which they depend; and aiming at knowledge-making and sharing. The paper will first pro- vide an historical contextualization OCCs. Then, it will show how the development of OCCs is fuelled by and contributes to, the rise of a free culture movement defending and advocating the creation of digital com- mons, and provide an empirically grounded definition of free culture movement. The empirical analyses is based content analysis of 80 in- terviews to free culture practitioners, promoters and activists with an international background or rooted in Europe, USA and Latino-America and the content analysis of two seminar discussions. The data collection was developed from 2008 to 2010. 1 Introduction Online Creation Communities (OCCs) are a set of individuals that communicate, interact and collaborate; in several forms and degrees of participation which are eco-systemically integrated; mainly via a platform of participation on the In- ternet, on which they depend; and aiming at knowledge-making and sharing (Fuster Morell, 2010). OCCs based on certain governance conditions result on the building of a digital commons. Digital commons are defined as an informa- tion and knowledge resources that are collectively created and owned or shared between or among a community and that tend to be non-exclusivedible, that is, be (generally freely) available to third parties. -
The Impact of Digital File Sharing on the Music Industry: an Empirical Analysis
Topics in Economic Analysis & Policy Volume 6, Issue 1 2006 Article 18 The Impact of Digital File Sharing on the Music Industry: An Empirical Analysis Norbert J. Michel∗ ∗Nicholls State University, [email protected] Copyright c 2006 The Berkeley Electronic Press. All rights reserved. The Impact of Digital File Sharing on the Music Industry: An Empirical Analysis∗ Norbert J. Michel Abstract The first file-sharing software, Napster, was shut down in 2001, but the copying technology’s impact on the music industry is still passionately debated. This paper uses micro-level data from the Consumer Expenditure Survey to examine the impact of Internet file sharing on music sales. Music industry representatives argue that the practice decreases CD sales, while supporters of file-sharing allege the practice could actually increase sales. Using household-level data from the Consumer Expenditure Survey, we find support for the claim that file-sharing has decreased sales. KEYWORDS: file sharing, copyright, music industry ∗This paper is based on Chapter 6 of my Ph.D. dissertation (University of New Orleans, Dept. of Economics and Finance). I thank my co-chairs, Arja Turunen-Red and Oscar Varela, as well as Gerald Whitney, Stan Liebowitz, and my committee members for their helpful suggestions and comments. I also thank Tracy Foertsch and several anonymous referees. Any errors are solely my responsibility. Norbert J. Michel, Nicholls State University, 310 B Powell, Thibodaux, LA. 70310, [email protected] , 985-448-4223. Michel: The Impact of Digital File Sharing on the Music Industry INTRODUCTION The impact of new copying technology on the music industry has been hotly debated since the launch of the first file-sharing software, Napster, in 1999. -
Sharing Files on Peer-To-Peer Networks Based on Social Network
Sharing Files on Peer-to-Peer Networks based on Social Network Fabrice Le Fessant INRIA Saclay-Île de France 23 Février 2009 1 / 14 Social networks are less vulnerable to attacks by spies ) peer-to-peer network + social network ) less vulnerable to censorship... maybe Fighting Censorship Standard peer-to-peer networks are vulnerable ! Spies can locate content providers States and Big Companies already have spies on P2P networks 2 / 14 Fighting Censorship Standard peer-to-peer networks are vulnerable ! Spies can locate content providers States and Big Companies already have spies on P2P networks Social networks are less vulnerable to attacks by spies ) peer-to-peer network + social network ) less vulnerable to censorship... maybe 3 / 14 Peer-to-Peer + Social Network Each user allows his computer to connect only to his friends' computers What can we do with such a network ? 4 / 14 My main requirement: • Content providers should remain unknown • while Links (friends) are not hidden • ISP must share such information with spies File-Sharing Three main operations: Resource discovery: nd which resources exist Resource localization: nd which resources are available and where Resource access: download the resources 5 / 14 File-Sharing Three main operations: Resource discovery: nd which resources exist Resource localization: nd which resources are available and where Resource access: download the resources My main requirement: • Content providers should remain unknown • while Links (friends) are not hidden • ISP must share such information with -
Privacy-Preserving P2P Data Sharing with Oneswarm
Privacy-Preserving P2P Data Sharing with OneSwarm Tomas Isdal Michael Piatek Arvind Krishnamurthy Thomas Anderson University of Washington ABSTRACT On one side, protocols like BitTorrent are high performance and Privacy—the protection of information from unauthorized disclo- robust, but participants are easily monitored by anyone who cares sure—is increasingly scarce on the Internet. The lack of privacy to look [33, 30, 29]. On the other, anonymization networks (e.g., is particularly true for popular peer-to-peer data sharing applica- Tor [14] and Freenet [12]) emphasize privacy, but offer compara- tions such as BitTorrent where user behavior is easily monitored by tively poor performance. third parties. Anonymizing overlays such as Tor and Freenet can In this paper, we explore a new design point in this tradeoff be- improve user privacy, but only at a cost of substantially reduced tween privacy and performance. We describe the design and imple- performance. Most users are caught in the middle, unwilling to mentation of a file-sharing protocol called OneSwarm, intended to sacrifice either privacy or performance. provide much better performance than Tor and Freenet, and much In this paper, we explore a new design point in this tradeoff be- better privacy than BitTorrent. Our goal is to provide good enough tween privacy and performance. We describe the design and imple- performance that users turn on privacy by default for all of their mentation of a new P2P data sharing protocol, called OneSwarm, non-public data sharing. To this end, data objects shared via One- that provides users much better privacy than BitTorrent and much Swarm are located and transferred using disposable, temporary ad- better performance than Tor or Freenet. -
The Gnunet System Christian Grothoff
The GNUnet System Christian Grothoff To cite this version: Christian Grothoff. The GNUnet System. Networking and Internet Architecture [cs.NI]. Université de Rennes 1, 2017. tel-01654244 HAL Id: tel-01654244 https://hal.inria.fr/tel-01654244 Submitted on 3 Dec 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License 1 Th`esed'habilitation `adiriger des recherches Universit´eede Rennes 1 Mention: Informatique The GNUnet System Christian Grothoff Soutenue le 10 octobre 2017 devant le jury compos´ede Messieurs les Professeurs: Anne-Marie Kermarrec (Universit´ede Rennes 1) Tanja Lange (Technische Universiteit Eindhoven) George Danezis (University College London) Joe Cannataci (University of Groningen) Saddek Bensalem (University of Grenoble) Au vu des rapports de Messieurs les Professeurs: Tanja Lange (Technische Universiteit Eindhoven) George Danezis (University College London) Saddek Bensalem (University of Grenoble) Revision 1.0 2 Abstract GNUnet is an alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Our goal is to replace the old inse- cure Internet protocol stack. Starting from an application for secure publication of files, it has grown to include all kinds of basic protocol components and ap- plications towards the creation of a GNU internet. -
An Introduction to Sci-Hub and Its Ethical Dilemmas
Number 3 LOEX Quarterly An Introduction to Sci-Hub and its Ethical Dilemmas Chris Sweet, Illinois Wesleyan University We significantly influence or control the selection, organ- of teaching (or refusing to teach) Sci-Hub. It should be ization, preservation, and dissemination of information. noted that within this article, teaching is construed broad- In a political system grounded in an informed citizenry, ly—encompassing both library instruction in the class- we are members of a profession explicitly committed to room and one-on-one reference transactions with students intellectual freedom and the freedom of access to infor- and faculty. When faced with an ethical dilemma, one mation. We have a special obligation to ensure the free should strive for a deep understanding of all the possible choices and how those choices interface with all relevant flow of information and ideas to present and future gen- codes of ethics. Understanding how Sci-Hub works and erations. how it came to be is the first step in this process. Code of Ethics of the American Library Association (2008) The Serials Crisis Introduction To understand why Sci-Hub is thriving, it is neces- The ALA Code of Ethics, explicitly tells librarians sary to look back to the 1990s when electronic books and that “We have a special obligation to ensure the free flow journals were in their infancy. Digital resources held the of information and ideas.” At face value, this statement promise of significant cost savings for libraries since they seems unambiguous and perhaps even noble (note that incurred no printing costs, required no paper, and did not we have a special obligation). -
Content Addressed, Versioned, P2P File System (DRAFT 3)
IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet [email protected] ABSTRACT parties invested in the current model. But from another per- The InterPlanetary File System (IPFS) is a peer-to-peer dis- spective, new protocols have emerged and gained wide use tributed file system that seeks to connect all computing de- since the emergence of HTTP. What is lacking is upgrading vices with the same system of files. In some ways, IPFS design: enhancing the current HTTP web, and introducing is similar to the Web, but IPFS could be seen as a sin- new functionality without degrading user experience. gle BitTorrent swarm, exchanging objects within one Git Industry has gotten away with using HTTP this long be- repository. In other words, IPFS provides a high through- cause moving small files around is relatively cheap, even for put content-addressed block storage model, with content- small organizations with lots of traffic. But we are enter- addressed hyper links. This forms a generalized Merkle ing a new era of data distribution with new challenges: (a) DAG, a data structure upon which one can build versioned hosting and distributing petabyte datasets, (b) computing file systems, blockchains, and even a Permanent Web. IPFS on large data across organizations, (c) high-volume high- combines a distributed hashtable, an incentivized block ex- definition on-demand or real-time media streams, (d) ver- change, and a self-certifying namespace. IPFS has no single sioning and linking of massive datasets, (e) preventing ac- point of failure, and nodes do not need to trust each other.