I. Roy, S. Setty, A. Kilzer, V. Shmatikov, E. Witchel. Airavat: Security and Privacy for MapReduce. NSDI 2010. [abstract]
http://www.cs.utexas.edu/~shmat/shmat_nsdi10.pdf
Tarzan: A peer-to-peer anonymizing network layer - Freedman - Cited by 580 and Robert Morris!
CCS’02, November 18–22, 2002, Washington, DC, USA
|
ASHWIN MACHANAVAJJHALA, DANIEL KIFER, JOHANNES GEHRKE,
and MUTHURAMAKRISHNAN VENKITASUBRAMANIAM
Cornell University
Cited by 844 - Related articles - All 36 versions
Scalable distributed stream processing - Cherniack - Cited by 323
The design of the borealis stream processing engine - Abadi - Cited by 557
xxxx,
When we use words in writing, we need to make sure they are precise in what they mean.
You said you "evaluate the papers". But I only see you "listed the papers". There are big difference.
An evaluation should include your assessment on how good or bad the papers are.
You need provide the rationale on why they are good about or why they are bad.
Be critical on what you said and what others said. Same treatment:-)
Phase is not a good word to use here. Phase typically refers to timing or period of a sequence of events.
Set of paper is a better word to use here. You have three sets of papers or three groups of papers.
I like you to give me your own opinion and analysis on these three sets of papers.
Let me try analyze first paper.
It focus on SIS for JXTA networks in p2p environment. (JINI, and JXTA are Java terms). Here it picks JXTA instead of JINI due to the use of XML.
Therefore it is important to understand the important research issues in p2p systems.
See good concise discussion on adv vs. disadv/social and economic impact in http://en.wikipedia.org/wiki/Peer-to-peer
I like the concept of " several P2P applications started implementing protocol obfuscation" and you may want to explore technique to defend against protocol obfuscation.
In the past this has happened for example to the FastTrack network when anti P2P companies managed to introduce faked chunks into downloads and downloaded files (mostly MP3 files) were unusable afterwards or even contained malicious code.[citation needed] Consequently, the P2P networks of today have seen an enormous increase of their security and file verification mechanisms.
It has the following big claim that needs to be carefully examined and see if they provide proof or evidences that is the case:
"web service-based information system less robust and also does not help to reduce and share the cost amongst peers"
There are various p2p applications. Focus on the improvement of security will be an excellent area of research.
Just some initial thoughts.
Edward