{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T14:28:13Z","timestamp":1777991293954,"version":"3.51.4"},"reference-count":250,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T00:00:00Z","timestamp":1599782400000},"content-version":"vor","delay-in-days":10,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003484","name":"Heinrich-Heine-Universit\u00e4t D\u00fcsseldorf","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003484","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2020,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The use of online social networks, such as Facebook and Twitter, has grown at a phenomenal rate. These platforms offer services that support interactions via messaging, chatting or audio\/video conferencing, and also sharing of content. Most, if not all, of these platforms use centralized computing systems; therefore, the control and management of the systems lies entirely in the hands of one provider, who must be trusted to treat the data and communication traces securely. As a zero-trust alternative, peer-to-peer (P2P) technologies promise to support end-to-end communication, uncompromising access control, anonymity and resilience against censorship and massive data leaks through misused trust. The goals of this survey are threefold. First, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user\/identity management, reliable data storage, secure communication, access control and general-purpose extensibility, which are not properly addressed in other P2P surveys. As a third point, it gives a comprehensive analysis of proposed P2P-based online social network applications, frameworks and architectures by exploring the technical details, inter-dependencies and maturity of these solutions.<\/jats:p>","DOI":"10.1007\/s42979-020-00315-8","type":"journal-article","created":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T16:02:49Z","timestamp":1599840169000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Peer-to-Peer-Based Social Networks: A Comprehensive Survey"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2578-4361","authenticated-orcid":false,"given":"Newton","family":"Masinde","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kalman","family":"Graffi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,9,11]]},"reference":[{"issue":"8","key":"315_CR1","first-page":"1","volume":"11","author":"R Ajami","year":"2011","unstructured":"Ajami R, Ramadan N, Mohamed N, Al-Jaroodi J. Security challenges and approaches in online social networks: a survey. Int J Comput Sci Netw Secur (IJCSNS). 2011;11(8):1\u201312.","journal-title":"Int J Comput Sci Netw Secur (IJCSNS)"},{"issue":"18","key":"315_CR2","doi-asserted-by":"crossref","first-page":"3866","DOI":"10.1016\/j.comnet.2012.08.009","volume":"56","author":"J Heidemann","year":"2012","unstructured":"Heidemann J, Klier M, Probst F. Online social networks: a survey of a global phenomenon. Comput Netw. 2012;56(18):3866\u201378.","journal-title":"Comput Netw"},{"issue":"4","key":"315_CR3","first-page":"325","volume":"9","author":"L Caviglione","year":"2014","unstructured":"Caviglione L, Coccoli M, Merlo A. A taxonomy-based model of security and privacy in online social networks. Int J Comput Sci Eng. 2014;9(4):325\u201338.","journal-title":"Int J Comput Sci Eng"},{"issue":"2","key":"315_CR4","doi-asserted-by":"crossref","first-page":"40:1","DOI":"10.1145\/2968216","volume":"49","author":"T Maqsood","year":"2016","unstructured":"Maqsood T, Khalid O, Irfan R, Madani SA, Khan SU. Scalability issues in online social networks. ACM Comput Surv. 2016;49(2):40:1\u201342.","journal-title":"ACM Comput Surv"},{"key":"315_CR5","first-page":"1","volume":"3\u20134","author":"I Kayes","year":"2017","unstructured":"Kayes I, Iamnitchi A. Privacy and security in online social networks: a survey. Online Soc Netw Media. 2017;3\u20134:1\u201321.","journal-title":"Online Soc Netw Media"},{"issue":"2","key":"315_CR6","first-page":"326","volume":"12","author":"Y Chen","year":"2017","unstructured":"Chen Y, Cheung ASY. The transparent self under big data profiling: privacy and chinese legislation on the social credit system. J Comparat Law. 2017;12(2):326\u201378 (University of Hong Kong Faculty of Law Research Paper No. 2017\/011).","journal-title":"J Comparat Law"},{"issue":"4","key":"315_CR7","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1002\/poi3.183","volume":"10","author":"F Liang","year":"2018","unstructured":"Liang F, Das V, Kostyuk N, Hussain MM. Constructing a data-driven society: China\u2019s social credit system as a state surveillance infrastructure. Policy Internet. 2018;10(4):415\u201353.","journal-title":"Policy Internet"},{"key":"315_CR8","doi-asserted-by":"crossref","unstructured":"Li M, Zhu H, Gao Z, Chen S, Yu L, Hu S, Ren K. All your location are belong to us: breaking mobile social networks for automated user location tracking. In: Proceedings of the 15th ACM international symposium on mobile ad hoc networking and computing, MobiHoc \u201914; 2014, pp. 43\u201352.","DOI":"10.1145\/2632951.2632953"},{"issue":"1","key":"315_CR9","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1186\/s13673-019-0185-6","volume":"9","author":"S Ahmad","year":"2019","unstructured":"Ahmad S, Asghar MZ, Alotaibi FM, Awan I. Detection and classification of social media-based extremist affiliations using sentiment analysis techniques. Hum-Centric Comput Inf Sci. 2019;9(1):24.","journal-title":"Hum-Centric Comput Inf Sci"},{"issue":"5","key":"315_CR10","doi-asserted-by":"crossref","first-page":"87:1","DOI":"10.1145\/3342101","volume":"52","author":"M Almoqbel","year":"2019","unstructured":"Almoqbel M, Xu S. Computational mining of social media to Curb terrorism. ACM Comput Surv. 2019;52(5):87:1\u201325.","journal-title":"ACM Comput Surv"},{"key":"315_CR11","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/978-3-642-17551-0_8","volume":"1","author":"G Pallis","year":"2011","unstructured":"Pallis G, Zeinalipour-Yazti D, Dikaiakos MD. Online social networks: status and trends. New Direct Web Data Manag. 2011;1:213\u201334.","journal-title":"New Direct Web Data Manag"},{"key":"315_CR12","unstructured":"Juste PS. A peer-to-peer architecture for social networking applications. In: Ph.D. thesis, University of Florida, Herbert Wertheim College of Engineering, Department of Electrical and Computer Engineering; 2014."},{"key":"315_CR13","doi-asserted-by":"crossref","unstructured":"Guidi B, Conti M, Ricci L: P2P architectures for distributed online social networks. In: International conference on high performance computing & simulation, HPCS 2013, Helsinki, Finland; 2013, pp. 678\u2013681.","DOI":"10.1109\/HPCSim.2013.6641493"},{"issue":"4","key":"315_CR14","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s12083-013-0200-z","volume":"7","author":"D Korzun","year":"2014","unstructured":"Korzun D, Gurtov A. Hierarchical architectures in structured peer-to-peer overlay networks. Peer-to-Peer Netw Appl. 2014;7(4):359\u201395.","journal-title":"Peer-to-Peer Netw Appl"},{"key":"315_CR15","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.comnet.2014.10.005","volume":"75","author":"T Paul","year":"2014","unstructured":"Paul T, Famulari A, Strufe T. A survey on decentralized Online Social Networks. Comput Netw. 2014;75:437\u201352.","journal-title":"Comput Netw"},{"key":"315_CR16","doi-asserted-by":"crossref","unstructured":"Greschbach B, Kreitz G, Buchegger S: The devil is in the metadata\u2014new privacy challenges in Decentralised Online Social Networks. In: 2012 IEEE international conference on pervasive computing and communications workshops; 2012, pp. 333\u2013339.","DOI":"10.1109\/PerComW.2012.6197506"},{"key":"315_CR17","doi-asserted-by":"crossref","unstructured":"Taheri-Boshrooyeh S, K\u00fcp\u00e7\u00fc A, \u00d6zkasap \u00d6: Security and privacy of distributed online social networks. In: 2015 IEEE 35th international conference on distributed computing systems workshops; 2015, pp. 112\u2013119.","DOI":"10.1109\/ICDCSW.2015.30"},{"key":"315_CR18","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.cosrev.2018.01.001","volume":"27","author":"A De Salve","year":"2018","unstructured":"De Salve A, Mori P, Ricci L. A survey on privacy in decentralized online social networks. Comput Sci Rev. 2018;27:154\u201376.","journal-title":"Comput Sci Rev"},{"issue":"3","key":"315_CR19","doi-asserted-by":"crossref","first-page":"60:1","DOI":"10.1145\/3321481","volume":"52","author":"S Oukemeni","year":"2019","unstructured":"Oukemeni S, Rif\u00e0-Pous H, Puig JMM. Privacy analysis on microblogging online social networks: a survey. ACM Comput Surv. 2019;52(3):60:1\u201336.","journal-title":"ACM Comput Surv"},{"issue":"3","key":"315_CR20","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/s12083-014-0258-2","volume":"8","author":"SR Chowdhury","year":"2015","unstructured":"Chowdhury SR, Roy AR, Shaikh M, Daudjee K. A taxonomy of decentralized online social networks. Peer-to-Peer Netw Appl. 2015;8(3):367\u201383.","journal-title":"Peer-to-Peer Netw Appl"},{"key":"315_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2015.04.014","volume":"55","author":"A Malatras","year":"2015","unstructured":"Malatras A. State-of-the-art survey on P2P overlay networks in pervasive computing environments. J Netw Comput Appl. 2015;55:1\u201323.","journal-title":"J Netw Comput Appl"},{"key":"315_CR22","doi-asserted-by":"crossref","unstructured":"Spaho E, Barolli L, Xhafa F. Data replication strategies in P2P systems: a survey. In: 2014 17th international conference on network-based information systems; 2014. pp. 302\u2013309.","DOI":"10.1109\/NBiS.2014.74"},{"key":"315_CR23","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/978-3-319-09177-8_6","volume-title":"Modeling and processing for next-generation big-data technologies: with applications and case studies","author":"E Spaho","year":"2015","unstructured":"Spaho E, Barolli A, Xhafa F, Barolli L. P2P data replication: techniques and applications. In: Xhafa F, Barolli L, Barolli A, Papajorgji P, editors. Modeling and processing for next-generation big-data technologies: with applications and case studies. Cham: Springer International Publishing; 2015. p. 145\u201366."},{"issue":"17","key":"315_CR24","doi-asserted-by":"crossref","first-page":"3485","DOI":"10.1016\/j.comnet.2006.02.001","volume":"50","author":"J Risson","year":"2006","unstructured":"Risson J, Moors T. Survey of research towards robust peer-to-peer networks: search methods. Comput Netw. 2006;50(17):3485\u2013521.","journal-title":"Comput Netw"},{"issue":"3","key":"315_CR25","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s12083-010-0082-2","volume":"4","author":"C Kang","year":"2011","unstructured":"Kang C. Survey of search and optimization of P2P networks. Peer-to-Peer Netw Appl. 2011;4(3):211\u20138.","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"12","key":"315_CR26","doi-asserted-by":"crossref","first-page":"2348","DOI":"10.1016\/j.jss.2011.07.027","volume":"84","author":"C Zhang","year":"2011","unstructured":"Zhang C, Xiao W, Tang D, Tang J. P2P-based multidimensional indexing methods: a survey. J Syst Softw. 2011;84(12):2348\u201362.","journal-title":"J Syst Softw"},{"issue":"4","key":"315_CR27","first-page":"470","volume":"6","author":"Z Trifa","year":"2012","unstructured":"Trifa Z, Khemakhem M. Taxonomy of structured P2P overlay networks security attacks. Int J Comput Electr Autom Control Inf Eng. 2012;6(4):470\u20136.","journal-title":"Int J Comput Electr Autom Control Inf Eng"},{"key":"315_CR28","doi-asserted-by":"crossref","unstructured":"Trifa Z, Khemakhem M. Mitigation of sybil attacks in structured P2P overlay networks. In: 2012 Eighth international conference on semantics, knowledge and grids; 2012. pp. 245\u2013248.","DOI":"10.1109\/SKG.2012.36"},{"key":"315_CR29","doi-asserted-by":"crossref","unstructured":"Germanus D, Roos S, Strufe T, Suri N. Mitigating eclipse attacks in peer-to-peer networks. In: 2014 IEEE conference on communications and network security; 2014. pp. 400\u2013408.","DOI":"10.1109\/CNS.2014.6997509"},{"key":"315_CR30","volume-title":"Handbook of Peer-to-Peer networking","year":"2010","unstructured":"Shen X, Yu H, Buford J, Akon M, editors. Handbook of Peer-to-Peer networking. Boston: Springer; 2010."},{"key":"315_CR31","volume-title":"Peer-to-Peer ccomputing: applications, architecture, protocols, and challenges","author":"YKR Kwok","year":"2012","unstructured":"Kwok YKR. Peer-to-Peer ccomputing: applications, architecture, protocols, and challenges. Boca Raton: CRC Press; 2012."},{"key":"315_CR32","first-page":"75","volume":"3","author":"L Garton","year":"1997","unstructured":"Garton L, Haythornthwaite C, Wellman B. Studying online social networks. J Comput-Mediat Commun. 1997;3:75\u2013105.","journal-title":"J Comput-Mediat Commun"},{"key":"315_CR33","doi-asserted-by":"crossref","unstructured":"Marin A, Wellman B. Social network analysis: an introduction. In: Scott J, Carrington PJ (eds) The SAGE handbook of social network analysis, chap.\u00a02, pp. 11\u201325. SAGE Publications; 2011.","DOI":"10.4135\/9781446294413.n2"},{"key":"315_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-1-4419-8462-3","volume-title":"Social network data analytics","author":"CC Aggarwal","year":"2011","unstructured":"Aggarwal CC. An introduction to social network data analytics. In: Aggarwal CC, editor. Social network data analytics. Boston: Springer; 2011. p. 1\u201315."},{"issue":"1","key":"315_CR35","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D Boyd","year":"2007","unstructured":"Boyd D, Ellison NB. Social network sites: definition, history, and scholarship. J Comput-Mediat Commun. 2007;13(1):210\u201330.","journal-title":"J Comput-Mediat Commun"},{"issue":"3","key":"315_CR36","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.bushor.2011.01.005","volume":"54","author":"JH Kietzmann","year":"2011","unstructured":"Kietzmann JH, Hermkens K, McCarthy IP, Silvestre BS. Social media? Get serious! Understanding the functional building blocks of social media. Bus Horiz. 2011;54(3):241\u201351 (Special issue: social media).","journal-title":"Bus Horiz"},{"issue":"5","key":"315_CR37","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1080\/03014460902960289","volume":"36","author":"RIM Dunbar","year":"2009","unstructured":"Dunbar RIM. The social brain hypothesis and its implications for social evolution. Ann Hum Biol. 2009;36(5):562\u201372.","journal-title":"Ann Hum Biol"},{"key":"315_CR38","volume-title":"Mastering the requirements process: getting requirements right","author":"S Robertson","year":"2012","unstructured":"Robertson S, Robertson J. Mastering the requirements process: getting requirements right. 3rd ed. Boston: Addison-Wesley; 2012.","edition":"3"},{"key":"315_CR39","volume-title":"The requirements engineering handbook","author":"RR Young","year":"2004","unstructured":"Young RR. The requirements engineering handbook. Norwood: Artech House; 2004."},{"key":"315_CR40","volume-title":"Software requirements","author":"K Wiegers","year":"2013","unstructured":"Wiegers K, Beatty J. Software requirements. 3rd ed. Washington, DC: Microsoft Press; 2013.","edition":"3"},{"issue":"4","key":"315_CR41","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MNET.2010.5510913","volume":"24","author":"C Zhang","year":"2010","unstructured":"Zhang C, Sun J, Zhu X, Fang Y. Privacy and security for online social networks: challenges and opportunities. Netw IEEE. 2010;24(4):13\u20138.","journal-title":"Netw IEEE"},{"issue":"1","key":"315_CR42","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.comcom.2010.12.006","volume":"35","author":"LM Aiello","year":"2012","unstructured":"Aiello LM, Ruffo G. Lotusnet: tunable privacy for distributed online social network services. Comput Commun. 2012;35(1):75\u201388.","journal-title":"Comput Commun"},{"key":"315_CR43","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-642-20149-3_2","volume-title":"Database systems for advanced applications","author":"D Agrawal","year":"2011","unstructured":"Agrawal D, El Abbadi A, Das S, Elmore AJ. Database scalability, elasticity, and autonomy in the cloud. In: Yu JX, Kim MH, Unland R, editors. Database systems for advanced applications. Berlin, Heidelberg: Springer; 2011. p. 2\u201315."},{"issue":"2","key":"315_CR44","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/1773912.1773922","volume":"44","author":"A Lakshman","year":"2010","unstructured":"Lakshman A, Malik P. Cassandra: a decentralized structured storage system. SIGOPS Oper Syst Rev. 2010;44(2):35\u201340.","journal-title":"SIGOPS Oper Syst Rev"},{"issue":"5","key":"315_CR45","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/2596624","volume":"57","author":"W Lloyd","year":"2014","unstructured":"Lloyd W, Freedman MJ, Kaminsky M, Andersen DG. Don\u2019t settle for eventual consistency. Commun ACM. 2014;57(5):61\u20138.","journal-title":"Commun ACM"},{"key":"315_CR46","unstructured":"Beaver D, Kumar S, Li HC, Sobel J, Vajgel P. Finding a Needle in Haystack: Facebook\u2019s Photo Storage. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201910, pp. 47\u201360. USENIX Association, Berkeley, CA, USA 2010."},{"issue":"2","key":"315_CR47","doi-asserted-by":"crossref","first-page":"4:1","DOI":"10.1145\/1365815.1365816","volume":"26","author":"F Chang","year":"2008","unstructured":"Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrows M, Chandra T, Fikes A, Gruber RE. Bigtable: a distributed storage system for structured data. ACM Trans Comput Syst. 2008;26(2):4:1\u201326.","journal-title":"ACM Trans Comput Syst"},{"key":"315_CR48","unstructured":"Baker J, Bond C, Corbett JC, Furman J, Khorlin A, Larson J, Leon JM, Li Y, Lloyd A, Yushprakh V. Megastore: Providing scalable, highly available storage for interactive services. In: Proceedings of the Conference on Innovative Data system Research (CIDR). Google; 2011. pp. 223\u2013234."},{"issue":"3","key":"315_CR49","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1177\/1948550612455931","volume":"4","author":"L Brandimarte","year":"2013","unstructured":"Brandimarte L, Acquisti A, Loewenstein G. Misplaced confidences: privacy and the control paradox. Soc Psychol Personal Sci. 2013;4(3):340\u20137.","journal-title":"Soc Psychol Personal Sci"},{"issue":"2","key":"315_CR50","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s12525-015-0191-0","volume":"25","author":"S Spiekermann","year":"2015","unstructured":"Spiekermann S, Acquisti A, B\u00f6hme R, Hui KL. The challenges of personal data markets and privacy. Electron Markets. 2015;25(2):161\u20137.","journal-title":"Electron Markets"},{"issue":"24","key":"315_CR51","doi-asserted-by":"crossref","first-page":"8788","DOI":"10.1073\/pnas.1320040111","volume":"111","author":"ADI Kramer","year":"2014","unstructured":"Kramer ADI, Guillory JE, Hancock JT. Experimental evidence of massive-scale emotional contagion through social networks. Proc Nat Acad Sci. 2014;111(24):8788\u201390.","journal-title":"Proc Nat Acad Sci"},{"issue":"2","key":"315_CR52","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1080\/21670811.2017.1345645","volume":"6","author":"V Bakir","year":"2018","unstructured":"Bakir V, McStay A. Fake news and the economy of emotions. Digit Journal. 2018;6(2):154\u201375.","journal-title":"Digit Journal"},{"issue":"4","key":"315_CR53","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/j.giq.2013.05.024","volume":"30","author":"V Bekkers","year":"2013","unstructured":"Bekkers V, Edwards A, de Kool D. Social media monitoring: responsive governance in the shadow of surveillance? Govern Inf Q. 2013;30(4):335\u201342.","journal-title":"Govern Inf Q"},{"issue":"2","key":"315_CR54","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1177\/1077699016630255","volume":"93","author":"E Stoycheff","year":"2016","unstructured":"Stoycheff E. Under surveillance: examining Facebook?s spiral of silence effects in the Wake of NSA internet monitoring. Journal Mass Commun Q. 2016;93(2):296\u2013311.","journal-title":"Journal Mass Commun Q"},{"key":"315_CR55","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-3-319-78378-9_4","volume-title":"Digital India: reflections and practice","author":"R Roy","year":"2018","unstructured":"Roy R, Gupta N. Digital Capitalism and Surveillance on Social Networking Sites: A Study of Digital Labour, Security and Privacy for Social Media Users. In: Kar AK, Sinha S, Gupta MP, editors. Digital India: reflections and practice. Berlin: Springer International Publishing; 2018. p. 67\u201381."},{"key":"315_CR56","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/ACCESS.2017.2656635","volume":"5","author":"M Al-Qurishi","year":"2017","unstructured":"Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS. Sybil defense techniques in online social networks: a survey. IEEE Access. 2017;5:1200\u201319.","journal-title":"IEEE Access"},{"issue":"4","key":"315_CR57","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MIC.2011.50","volume":"15","author":"H Gao","year":"2011","unstructured":"Gao H, Hu J, Huang T, Wang J, Chen Y. Security issues in online social networks. IEEE Internet Comput. 2011;15(4):56\u201363.","journal-title":"IEEE Internet Comput"},{"key":"315_CR58","doi-asserted-by":"crossref","unstructured":"NaliniPriya G, Asswini M. A survey on vulnerable attacks in online social networks. In: International confernce on innovation information in computing technologies; 2015, pp. 1\u20136.","DOI":"10.1109\/ICIICT.2015.7396102"},{"key":"315_CR59","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/978-1-4419-7142-5_17","volume-title":"Handbook of social network technologies and applications","author":"A Datta","year":"2010","unstructured":"Datta A, Buchegger S, Vu LH, Strufe T, Rzadca K. Decentralized online social networks. In: Furht B, editor. Handbook of social network technologies and applications. Boston: Springer; 2010. p. 349\u201378."},{"key":"315_CR60","doi-asserted-by":"crossref","unstructured":"Buchegger S, Datta A. A case for P2P infrastructure for social networks-opportunities & challenges. In: Proceedings of the Sixth International Conference on Wireless On-Demand Network Systems and Services, 2009. WONS 2009; 2009. pp. 161\u2013168.","DOI":"10.1109\/WONS.2009.4801862"},{"key":"315_CR61","unstructured":"Paul T, Buchegger S, Strufe T. Decentralizing social networking services. In: International tyrrhenian workshop on digital communications; 2010. pp. 1\u201310."},{"key":"315_CR62","doi-asserted-by":"crossref","unstructured":"Graffi K, Podrajanski S, Mukherjee P, Kovacevic A, Steinmetz R. A distributed platform for multimedia communities. In: Proceedings of the IEEE international symposium on multimedia (ISM\u201908), pp. 208\u2013213. IEEE; 2008.","DOI":"10.1109\/ISM.2008.11"},{"key":"315_CR63","doi-asserted-by":"crossref","unstructured":"Janiuk J, M\u00e4cker A, Graffi K. Secure distributed data structures for peer-to-peer-based social networks. In: 2014 International Conference on Collaboration Technologies and Systems, CTS 2014, Minneapolis, MN, USA; 2014, pp. 396\u2013405.","DOI":"10.1109\/CTS.2014.6867595"},{"key":"315_CR64","doi-asserted-by":"crossref","unstructured":"Al-Aaridhi R, Graffi K. Sets, lists and trees: distributed data structures on distributed hash tables. In: 35th IEEE international performance computing and communications conference, IPCCC 2016, Las Vegas, NV, USA; 2016. pp. 1\u20138.","DOI":"10.1109\/PCCC.2016.7820639"},{"key":"315_CR65","unstructured":"Al-Aaridhi R, Yuksektepe A, Amft T, Graffi K. Distributed data structures improvement for collective retrieval time. In: 19th international symposium on wireless personal multimedia communications, WPMC 2016, Shenzhen, China, pp. 85\u201390. IEEE; 2016."},{"key":"315_CR66","doi-asserted-by":"publisher","unstructured":"Drozd O, Fabian B. Sharing operational costs in business peer-to-peer systems with a centralized clarke-groves service. 2017. https:\/\/ssrn.com\/abstract=3005370 or https:\/\/doi.org\/10.2139\/ssrn.3005370.","DOI":"10.2139\/ssrn.3005370"},{"issue":"2","key":"315_CR67","doi-asserted-by":"crossref","first-page":"20:1","DOI":"10.1145\/2431211.2431219","volume":"45","author":"T Koskela","year":"2013","unstructured":"Koskela T, Kassinen O, Harjula E, Ylianttila M. P2P group management systems: a conceptual analysis. ACM Comput Surv. 2013;45(2):20:1\u201325.","journal-title":"ACM Comput Surv"},{"key":"315_CR68","doi-asserted-by":"crossref","unstructured":"Buford JF, Yu H. Peer-to-peer networking and applications: synopsis and research directions. In: Shen X, Yu H, Buford J, Akon M (eds.) Handbook of peer-to-peer networking, chap.\u00a01, pp. 3\u201345. Springer; 2010.","DOI":"10.1007\/978-0-387-09751-0_1"},{"issue":"4","key":"315_CR69","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis S, Spinellis D. A survey of peer-to-peer content distribution technologies. ACM Comput Surv (CSUR). 2004;36(4):335\u201371.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"315_CR70","doi-asserted-by":"crossref","unstructured":"Harjula E, Ylianttila M, Ala-Kurikka J, Riekki J, Sauvola J. Plug-and-play application platform: towards mobile peer-to-peer. In: Proceedings of the 3rd international conference on mobile and ubiquitous multimedia, MUM \u201904; 2004. pp. 63\u201369.","DOI":"10.1145\/1052380.1052390"},{"key":"315_CR71","unstructured":"Nhat BM. Searching in P2P networks: a survey. in: Tech. Rep. TKK T-110. 5190, Department of Computer Science and Engineering, School of Science and Technology, Aalto University; 2009."},{"key":"315_CR72","doi-asserted-by":"crossref","unstructured":"Cooper BF. Trading off Resources Between Overlapping Overlays. In: Steen Mv, Henning M (eds) Middleware 2006, ACM\/IFIP\/USENIX 7th International Middleware Conference, Melbourne, Australia, Proceedings, lecture notes in computer science, vol. 4290; 2006. pp. 101\u2013120.","DOI":"10.1007\/11925071_6"},{"issue":"1","key":"315_CR73","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.comnet.2011.08.006","volume":"56","author":"Y Mao","year":"2012","unstructured":"Mao Y, Loo BT, Ives Z, Smith JM. MOSAIC: declarative platform for dynamic overlay composition. Comput Netw. 2012;56(1):64\u201384.","journal-title":"Comput Netw"},{"key":"315_CR74","unstructured":"Artigas MS, Lopez PG, Ahullo JP, Skarmeta AFG: Cyclone: a novel design schema for hierarchical dhts. In: Fifth IEEE international conference on peer-to-peer computing (P2P\u201905); 2005. pp. 49\u201356."},{"issue":"1","key":"315_CR75","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1152934.1152937","volume":"1","author":"O Babaoglu","year":"2006","unstructured":"Babaoglu O, Canright G, Deutsch A, Caro GAD, Ducatelle F, Gambardella LM, Ganguly N, Jelasity M, Montemanni R, Montresor A, Urnes T. Design patterns from biology for distributed computing. ACM Trans Auton Adapt Syst. 2006;1(1):26\u201366.","journal-title":"ACM Trans Auton Adapt Syst"},{"issue":"7","key":"315_CR76","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MCOM.2011.5936154","volume":"49","author":"S Balasubramaniam","year":"2011","unstructured":"Balasubramaniam S, Leibnitz K, Lio P, Botvich D, Murata M. Biological principles for future internet architecture design. IEEE Commun Mag. 2011;49(7):44\u201352.","journal-title":"IEEE Commun Mag"},{"key":"315_CR77","unstructured":"Amft T. The impact of resource sharing on coexisting P2P overlays and stacked overlay modules. In: Ph.D. thesis, Department of Computer Science, Faculty of Mathematics and Natural Sciences; 2017."},{"key":"315_CR78","doi-asserted-by":"crossref","unstructured":"Gross C, Stingl D, Richerzhagen B, Hemel A, Steinmetz R, Hausheer D. Geodemlia: a robust peer-to-peer overlay supporting location-based search. In: 2012 IEEE 12th international conference on peer-to-peer computing (P2P); 2012, pp. 25\u201336.","DOI":"10.1109\/P2P.2012.6335806"},{"key":"315_CR79","doi-asserted-by":"crossref","unstructured":"Amft T, Graffi K. Moving peers in distributed, location-based peer-to-peer overlays. In: 2017 international conference on computing, networking and communications (ICNC); 2017. pp. 906\u2013911.","DOI":"10.1109\/ICCNC.2017.7876253"},{"key":"315_CR80","doi-asserted-by":"crossref","unstructured":"Amft T, Guidi B, Graffi K, Ricci L. FRoDO: Friendly routing over dunbar-based overlays. In: 2015 IEEE 40th conference on local computer networks (LCN); 2015. pp. 356\u2013364.","DOI":"10.1109\/LCN.2015.7366330"},{"key":"315_CR81","doi-asserted-by":"crossref","unstructured":"Singh A, Ngan TW, Druschel P, Wallach DS. Eclipse attacks on overlay networks: threats and defenses. In: INFOCOM 2006. 25th ieee international conference on computer communications. Proceedings. IEEE, Barcelona, Spain; 2006.","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"315_CR82","unstructured":"Giuli TJ, Maniatis P, Baker M, Rosenthal DS, Roussopoulos M. Attrition defenses for a peer-to-peer digital preservation system. In: Proceedings of the 2005 USENIX Annual Technical Conference, Anaheim, CA, USA, pp. 163\u2013178. USENIX Association; 2005."},{"issue":"10","key":"315_CR83","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1109\/TPDS.2008.241","volume":"20","author":"KP Puttaswamy","year":"2009","unstructured":"Puttaswamy KP, Zheng H, Zhao BY. Securing structured overlays against identity attacks. IEEE Trans Parallel Distrib Syst. 2009;20(10):1487\u201398.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"315_CR84","doi-asserted-by":"crossref","unstructured":"Stutzbach D, Rejaie R. Understanding Churn in Peer-to-peer Networks. In: Proceedings of the 6th ACM SIGCOMM conference on internet measurement, IMC \u201906; 2006, pp. 189\u2013202.","DOI":"10.1145\/1177080.1177105"},{"key":"315_CR85","unstructured":"Cohen B. The bittorrent protocol specification; 2008."},{"key":"315_CR86","doi-asserted-by":"crossref","unstructured":"Rowstron A. Druschel P. Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Middleware 2001, IFIP\/ACM International Conference on Distributed Systems Platforms Heidelberg, Germany, Proceedings, Lecture Notes in Computer Science, vol. 2218; 2001. pp. 329\u2013350.","DOI":"10.1007\/3-540-45518-3_18"},{"key":"315_CR87","unstructured":"Zhao BY, Kubiatowicz J, Joseph AD. Tapestry: an infrastructure for fault-tolerant wide-area location and routing. In: Technical report, University of California at Berkeley, Berkeley, CA, USA; 2001."},{"key":"315_CR88","doi-asserted-by":"crossref","unstructured":"Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H. Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, San Diego, CA, USA; 2001.","DOI":"10.1145\/383059.383071"},{"key":"315_CR89","doi-asserted-by":"crossref","unstructured":"Maymounkov P, Mazieres D. Kademlia: A peer-to-peer information system based on the xor metric. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) Peer-to-peer systems, first international workshop, IPTPS 2002, Cambridge, MA, USA, revised papers, lecture notes in computer science, vol. 2429; 2002. pp. 53\u201365.","DOI":"10.1007\/3-540-45748-8_5"},{"key":"315_CR90","unstructured":"Clarke I. A distributed decentralised information storage and retrieval system. In: Master\u2019s thesis, Division of Informatics, University of Edinburgh; 1999."},{"key":"315_CR91","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","volume-title":"Designing privacy enhancing technologies: international workshop on design issues in anonymity and unobservability Berkeley, CA, USA, July 25\u201326, 2000 Proceedings","author":"I Clarke","year":"2001","unstructured":"Clarke I, Sandberg O, Willey B, Hong TW. Freenet: a distributed anonymous information storage and retrieval system. In: Federrath H, editor. Designing privacy enhancing technologies: international workshop on design issues in anonymity and unobservability Berkeley, CA, USA, July 25\u201326, 2000 Proceedings. Berlin, Heidelberg: Springer; 2001. p. 46\u201366."},{"key":"315_CR92","doi-asserted-by":"publisher","unstructured":"Jennings C, Lowekamp B, Rescorla E, Baset S, Schulzrinne H. REsource LOcation And Discovery (RELOAD) base protocol. RFC 6940. 2014. https:\/\/doi.org\/10.17487\/RFC6940. https:\/\/rfc-editor.org\/rfc\/rfc6940.txt","DOI":"10.17487\/RFC6940"},{"key":"315_CR93","unstructured":"Traversat B, Arora A, Abdelaziz M, Duigou M, Haywood C, Hugly JC, Pouyoul E, Yeager B. Project JXTA 2.0 super-peer virtual network. Technical report, Sun Microsystems, Inc.; 2003."},{"key":"315_CR94","unstructured":"Leibowitz N, Ripeanu M, Wierzbicki A. Deconstructing the Kazaa network. In: Internet Applications. WIAPP 2003. Proceedings. The Third IEEE Workshop on, pp. 112\u2013120. IEEE; 2003."},{"issue":"6","key":"315_CR95","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1016\/j.comnet.2005.07.014","volume":"50","author":"J Liang","year":"2006","unstructured":"Liang J, Kumar R, Ross KW. The FastTrack overlay: a measurement study. Comput Netw. 2006;50(6):842\u201358.","journal-title":"Comput Netw"},{"issue":"4","key":"315_CR96","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1145\/964725.633045","volume":"32","author":"S Banerjee","year":"2002","unstructured":"Banerjee S, Bhattacharjee B, Kommareddy C. Scalable application layer multicast. SIGCOMM Comput Commun Rev. 2002;32(4):205\u201317.","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"315_CR97","unstructured":"Xu Z, Min R, Hu Y. HIERAS: a DHT based hierarchical P2P routing algorithm. In: 2003 International conference on parallel processing, 2003. Proceedings; 2003. pp. 187\u2013194."},{"issue":"1","key":"315_CR98","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1145\/972374.972397","volume":"34","author":"M Castro","year":"2004","unstructured":"Castro M, Costa M, Rowstron A. Should we build Gnutella on a structured overlay? SIGCOMM Comput Commun Rev. 2004;34(1):131\u20136.","journal-title":"SIGCOMM Comput Commun Rev"},{"issue":"4","key":"315_CR99","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1515\/PIKO.2005.199","volume":"28","author":"S Apel","year":"2005","unstructured":"Apel S, Buchmann E. Biology-inspired optimizations of Peer-to-Peer overlay networks. Praxis der Informationsverarbeitung und Kommunikation. 2005;28(4):199\u2013205.","journal-title":"Praxis der Informationsverarbeitung und Kommunikation"},{"key":"315_CR100","doi-asserted-by":"crossref","unstructured":"Hoh CC, Hwang RH. P2P File sharing system over MANET based on swarm intelligence: a cross-layer design. In: 2007 IEEE wireless communications and networking conference; 2007. pp. 2674\u20132679.","DOI":"10.1109\/WCNC.2007.497"},{"issue":"6","key":"315_CR101","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1016\/j.future.2010.02.007","volume":"26","author":"A Brocco","year":"2010","unstructured":"Brocco A, Malatras A, Hirsbrunner B. Enabling efficient information discovery in a self-structured grid. Future Gener Comput Syst. 2010;26(6):838\u201346.","journal-title":"Future Gener Comput Syst"},{"issue":"5","key":"315_CR102","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1109\/TNET.2010.2046745","volume":"18","author":"A Forestiero","year":"2010","unstructured":"Forestiero A, Leonardi E, Mastroianni C, Meo M. Self-Chord: a bio-inspired P2P framework for self-organizing distributed systems. IEEE\/ACM Trans Netw (TON). 2010;18(5):1651\u201364.","journal-title":"IEEE\/ACM Trans Netw (TON)"},{"key":"315_CR103","doi-asserted-by":"crossref","unstructured":"Peng F, Malatras A, Hirsbrunner B, Courant M. AntOM: Constructing multi-layer overlays for pervasive environments. In: 2012 IEEE international conference on pervasive computing and communications workshops; 2012. pp. 649\u2013654.","DOI":"10.1109\/PerComW.2012.6197594"},{"issue":"4","key":"315_CR104","doi-asserted-by":"crossref","first-page":"35:1","DOI":"10.1145\/2382570.2382571","volume":"7","author":"R Giordanelli","year":"2012","unstructured":"Giordanelli R, Mastroianni C, Meo M. Bio-inspired P2P systems: the case of multidimensional overlay. ACM Trans Auton Adapt Syst. 2012;7(4):35:1\u201328.","journal-title":"ACM Trans Auton Adapt Syst"},{"issue":"4","key":"315_CR105","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/TEVC.2008.2011478","volume":"13","author":"A Forestiero","year":"2009","unstructured":"Forestiero A, Mastroianni C. A Swarm algorithm for a self-structured P2P information system. IEEE Trans Evol Comput. 2009;13(4):681\u201394.","journal-title":"IEEE Trans Evol Comput"},{"issue":"5","key":"315_CR106","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1016\/j.jnca.2010.10.010","volume":"34","author":"SK Dhurandher","year":"2011","unstructured":"Dhurandher SK, Misra S, Pruthi P, Singhal S, Aggarwal S, Woungang I. Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks. Dependable multimedia communications: systems, services, and applications. J Netw Comput Appl. 2011;34(5):1498\u2013508.","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"315_CR107","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.1109\/TSMCB.2006.873211","volume":"36","author":"RA Ghanea-Hercock","year":"2006","unstructured":"Ghanea-Hercock RA, Wang F, Sun Y. Self-organizing and adaptive Peer-to-Peer network. IEEE Trans Syst Man Cybern Part B (Cybern). 2006;36(6):1230\u20136.","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybern)"},{"key":"315_CR108","doi-asserted-by":"crossref","unstructured":"Snyder PL, Greenstadt R, Valetto G. Myconet: a fungi-inspired model for superpeer-based peer-to-peer overlay topologies. In: 2009 Third IEEE international conference on self-adaptive and self-organizing systems; 2009. pp. 40\u201350.","DOI":"10.1109\/SASO.2009.43"},{"key":"315_CR109","unstructured":"Walfish M, Balakrishnan H, Shenker S. Untangling the Web from DNS. In: 1st symposium on networked systems design and implementation (NSDI 2004), San Francisco, California, USA, Proceedings, vol.\u00a04, pp. 225\u2013238. USENIX Association; 2004."},{"issue":"3","key":"315_CR110","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/945721.945730","volume":"32","author":"JM Hellerstein","year":"2003","unstructured":"Hellerstein JM. Toward network data independence. ACM SIGMOD Record. 2003;32(3):34\u201340.","journal-title":"ACM SIGMOD Record"},{"issue":"1","key":"315_CR111","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/JSAC.2003.818784","volume":"22","author":"BY Zhao","year":"2004","unstructured":"Zhao BY, Huang L, Stribling J, Rhea SC, Joseph AD, Kubiatowicz JD. Tapestry: a resilient global-scale overlay for service deployment. IEEE J Sel Areas Commun. 2004;22(1):41\u201353.","journal-title":"IEEE J Sel Areas Commun"},{"key":"315_CR112","unstructured":"Harvey NJA, Jones MB, Saroiu S, Theimer M, Wolman A: Skipnet: a scalable overlay network with practical locality properties. In: 4th USENIX symposium on internet technologies and systems, USITS\u201903, Seattle, Washington, US, vol.\u00a034. USENIX Association; 2003."},{"key":"315_CR113","doi-asserted-by":"crossref","unstructured":"Pugh W. Skip lists: a probabilistic alternative to balanced trees. In: Dehne FKHA, Sack J, Santoro N (eds) Algorithms and data structures: workshop WADS \u201989 Ottawa, Canada, Proceedings, lecture notes in computer science, vol. 382; 1989. pp. 437\u2013449.","DOI":"10.1007\/3-540-51542-9_36"},{"issue":"4","key":"315_CR114","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/1290672.1290674","volume":"3","author":"J Aspnes","year":"2007","unstructured":"Aspnes J, Shah G. Skip graphs. ACM Trans Algorithms (TALG). 2007;3(4):37.","journal-title":"ACM Trans Algorithms (TALG)"},{"key":"315_CR115","doi-asserted-by":"crossref","unstructured":"Feldotto M, Scheideler C, Graffi K. HSkip+: a self-stabilizing overlay network for nodes with heterogeneous bandwidths. In: 14th IEEE international conference on peer-to-peer computing; 2014. pp. 1\u201310.","DOI":"10.1109\/P2P.2014.6934300"},{"issue":"2","key":"315_CR116","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1016\/j.comcom.2007.08.003","volume":"31","author":"A Gonz\u00e1lez-Beltr\u00e1n","year":"2008","unstructured":"Gonz\u00e1lez-Beltr\u00e1n A, Milligan P, Sage P. Range queries over skip tree graphs. Comput Commun. 2008;31(2):358\u201374.","journal-title":"Comput Commun"},{"key":"315_CR117","unstructured":"Jagadish HV, Ooi, BC, Vu QH. BATON: a balanced tree structure for peer-to-peer networks. In: Proceedings of the 31st international conference on very large databases, Trondheim, Norway, pp. 661\u2013672. VLDB Endowment; 2005."},{"key":"315_CR118","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/978-0-387-09751-0_15","volume-title":"Handbook of Peer-to-Peer networking","author":"D Han","year":"2010","unstructured":"Han D, Yu Y. Keyword search in unstructured Peer-to-Peer networks. In: Shen X, Yu H, Buford J, Akon M, editors. Handbook of Peer-to-Peer networking. Boston: Springer; 2010. p. 405\u201326."},{"issue":"1","key":"315_CR119","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-011-0101-y","volume":"5","author":"H Barjini","year":"2012","unstructured":"Barjini H, Othman M, Ibrahim H, Udzir NI. Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks. Peer-to-Peer Netw Appl. 2012;5(1):1\u201313.","journal-title":"Peer-to-Peer Netw Appl"},{"key":"315_CR120","unstructured":"Crespo A, Garcia-Molina H. Routing indices for peer-to-peer systems. In: Proceedings of the 22nd international conference on distributed computing systems (ICDCS\u201902), Vienna, Austria, pp. 23\u201332. IEEE Computer Society; 2002."},{"key":"315_CR121","doi-asserted-by":"crossref","unstructured":"Harren M, Hellerstein JM, Huebsch R, Loo BT, Shenker S, Stoica I. Complex queries in DHT-based peer-to-peer networks. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) Peer-to-peer systems, first international workshop, IPTPS 2002, Cambridge, MA, USA, Revised Papers, lecture notes in computer science, vol. 2429; 2002. pp. 242\u2013250.","DOI":"10.1007\/3-540-45748-8_23"},{"key":"315_CR122","unstructured":"Bongers E, Pouwelse J. A survey of P2P multidimensional indexing structures. CoRR abs\/1507.05501. 2015. arXiv:1507.05501."},{"key":"315_CR123","unstructured":"Ferdous MS, Chowdhury F, Moniruzzaman M. A taxonomy of attack methods on peer-to-peer network. In: Proceedings of the 1st Indian Conference on computational intelligence and information security (ICCIIS, 07); 2007. pp. 132\u2013138."},{"key":"315_CR124","doi-asserted-by":"crossref","unstructured":"Christin N, Weigend AS, Chuang J. content availability, pollution and poisoning in file sharing peer-to-peer networks. In: Proceedings of the 6th ACM conference on electronic commerce, EC \u201905; 2005. pp. 68\u201377.","DOI":"10.1145\/1064009.1064017"},{"key":"315_CR125","doi-asserted-by":"crossref","unstructured":"Druschel P, Rowstron A. PAST: A large-scale, persistent peer-to-peer storage utility. In: Hot topics in operating systems, 2001. Proceedings of the Eighth Workshop on; 2001. pp. 75\u201380.","DOI":"10.1145\/502034.502053"},{"key":"315_CR126","unstructured":"Dabek F. A Cooperative File System. Master\u2019s thesis, Massachusetts Institute of Technology; 2001."},{"issue":"5","key":"315_CR127","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1145\/378995.379239","volume":"28","author":"J Kubiatowicz","year":"2000","unstructured":"Kubiatowicz J, Bindel D, Chen Y, Czerwinski S, Eaton P, Geels D, Gummadi R, Rhea S, Weatherspoon H, Weimer W, Wells C, Zhao B. OceanStore: an architecture for global-scale persistent storage. SIGARCH Comput Archit News. 2000;28(5):190\u2013201.","journal-title":"SIGARCH Comput Archit News"},{"issue":"4","key":"315_CR128","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/s12083-013-0203-9","volume":"7","author":"S Caron","year":"2014","unstructured":"Caron S, Giroire F, Mazauric D, Monteiro J, P\u00e9rennes S. P2P storage systems: study of different placement policies. Peer-to-Peer Netw Appl. 2014;7(4):427\u201343.","journal-title":"Peer-to-Peer Netw Appl"},{"key":"315_CR129","unstructured":"Shalini K, Surekha Y. Effective file replication and consistency maintenance mechanism in P2P systems. In: Global journal of computer science and technology; 2011."},{"key":"315_CR130","doi-asserted-by":"crossref","unstructured":"Gray J, Helland P, O\u2019Neil P, Shasha D. The dangers of replication and a solution. In: Proceedings of the 1996 ACM SIGMOD international conference on management of data, SIGMOD \u201996; 1996. pp. 173\u2013182.","DOI":"10.1145\/233269.233330"},{"key":"315_CR131","unstructured":"Martins V, Pacciti E, Valduriez P. Survey of data replication in P2P systems. In: Tech. Rep. RR-6083, Institut National de Recherche en Informatique et en Automatique; 2006."},{"issue":"1","key":"315_CR132","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/1057977.1057980","volume":"37","author":"Y Saito","year":"2005","unstructured":"Saito Y, Shapiro M. Optimistic Repl. ACM Comput Surv (CSUR). 2005;37(1):42\u201381.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"315_CR133","doi-asserted-by":"crossref","unstructured":"Lv Q, Cao P, Cohen E, Cohen E, Li K, Shenker S. Search and replication in unstructured peer-to-peer networks. In: Proceedings of the 16th international conference on supercomputing, ICS \u201902; 2002. pp. 84\u201395","DOI":"10.1145\/514191.514206"},{"key":"315_CR134","unstructured":"On G, Schmitt J, Steinmetz R. The effectiveness of realistic replication strategies on quality of availability for peer-to-peer systems. In: Proceedings third international conference on peer-to-peer computing (P2P2003); 2003. pp. 57\u201364"},{"key":"315_CR135","doi-asserted-by":"crossref","unstructured":"Ktari S, Zoubert M, Hecker A, Labiod H. Performance evaluation of replication strategies in DHTs Under Churn. In: Proceedings of the 6th international conference on mobile and ubiquitous multimedia, MUM \u201907; 2007. pp. 90\u201397.","DOI":"10.1145\/1329469.1329481"},{"key":"315_CR136","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/3-540-37795-6_28","volume-title":"Future directions in distributed computing: research and position Papers","author":"R Bhagwan","year":"2003","unstructured":"Bhagwan R, Moore D, Savage S, Voelker GM. Replication strategies for highly available peer-to-peer storage. In: Schiper A, Shvartsman AA, Weatherspoon H, Zhao BY, editors. Future directions in distributed computing: research and position Papers. Berlin: Springer; 2003. p. 153\u20138."},{"key":"315_CR137","unstructured":"Goel S, Buyya R. Data Replication Strategies in Wide-Area Distributed Systems, chap.\u00a09. Hershey; 2019."},{"key":"315_CR138","doi-asserted-by":"crossref","unstructured":"Leontiadis E, Dimakopoulos V, Pitoura, E. Creating and maintaining replicas in unstructured peer-to-peer systems. In: Euro-Par 2006 parallel processing, lecture notes on computer science, vol. 4128, pp. 1015\u20131025. Springer; 2006.","DOI":"10.1007\/11823285_107"},{"key":"315_CR139","unstructured":"Kangasharju J, Ross KW, Antipolls SATD. Optimal content replication in P2P communities. In: Tech. rep., TU Darmstadt; 2002."},{"key":"315_CR140","unstructured":"Monteiro J. Modeling and analysis of reliable peer-to-peer storage systems. In: Ph.D. thesis, Universit\u00e9 Nice Sophia Antipolis; 2010."},{"issue":"2","key":"315_CR141","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming RW. Error detecting and error correcting codes. Bell Syst Tech J. 1950;29(2):147\u201360.","journal-title":"Bell Syst Tech J"},{"issue":"2","key":"315_CR142","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"MO Rabin","year":"1989","unstructured":"Rabin MO. Efficient dispersal of information for security, load balancing, and fault tolerance. J ACM. 1989;36(2):335\u201348.","journal-title":"J ACM"},{"issue":"2","key":"315_CR143","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"IS Reed","year":"1960","unstructured":"Reed IS, Solomon G. Polynomial codes over certain finite fields. J Soc Ind Appl Math. 1960;8(2):300\u20134.","journal-title":"J Soc Ind Appl Math"},{"issue":"9","key":"315_CR144","doi-asserted-by":"crossref","first-page":"4539","DOI":"10.1109\/TIT.2010.2054295","volume":"56","author":"AG Dimakis","year":"2010","unstructured":"Dimakis AG, Godfrey PB, Wu Y, Wainwright MJ, Ramchandran K. Network coding for distributed storage systems. IEEE Trans Inf Theory. 2010;56(9):4539\u201351.","journal-title":"IEEE Trans Inf Theory"},{"key":"315_CR145","doi-asserted-by":"crossref","unstructured":"Duminuco A, Biersack E. Hierarchical codes: how to make erasure codes attractive for peer-to-peer storage systems. In: Peer-to-Peer Computing, 2008. P2P\u201908. Eighth International Conference on; 2008. pp. 89\u201398.","DOI":"10.1109\/P2P.2008.9"},{"key":"315_CR146","doi-asserted-by":"crossref","unstructured":"Sharma R, Datta A. SuperNova: super-peers based architecture for decentralized online social networks. In: 2012 fourth international conference on communication systems and networks (COMSNETS 2012); 2012. pp. 1\u201310.","DOI":"10.1109\/COMSNETS.2012.6151349"},{"key":"315_CR147","unstructured":"Di\u00a0Pasquale A, Nardelli E. Scalable distributed data structures: a survey. In: Proceedings in Informatics, 3rd International Workshop on Distributed Data and Structures (WDAS\u201900), vol.\u00a09, pp. 87\u2013111. Carleton-Scientific, L\u2019Aquila, Italy; 2000."},{"key":"315_CR148","unstructured":"Gribble SD, Brewer EA, Hellerstein JM, Culler D. Scalable, distributed data structures for internet service construction. In: Proceedings of the 4th conference on symposium on operating system design & Implementation\u2014Vol. 4, OSDI\u201900. USENIX Association, Berkeley, CA, USA; 2000."},{"key":"315_CR149","unstructured":"Tanner T. Distributed hash tables in p2p systems-a literary survey. In: Tech. Rep. T-110.551, Helsinki University of Technology; 2005."},{"key":"315_CR150","doi-asserted-by":"crossref","unstructured":"Alaei S, Toossi M, Ghodsi M. SkipTree: A Scalable Range-Queryable Distributed Data Structure for Multidimensional Data. In: Deng X, Du DZ (eds) Algorithms and computation: 16th International Symposium, ISAAC 2005, Sanya, Hainan, China, Proceedings; 2005. pp. 298\u2013307.","DOI":"10.1007\/11602613_31"},{"key":"315_CR151","doi-asserted-by":"crossref","unstructured":"Beltran AG, Sage P, Miligan P. Skip tree graph: a distributed and Balanced Search Tree for Peer-to-Peer Networks. In: 2007 IEEE international conference on communications; 2007. pp. 1881\u20131886.","DOI":"10.1109\/ICC.2007.313"},{"key":"315_CR152","doi-asserted-by":"crossref","unstructured":"Ratnasamy S, Francis P, Handley M, Karp R, Shenker S. A scalable content-addressable network. In: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM \u201901, pp. 161\u2013172. ACM, New York, NY, USA; 2001.","DOI":"10.1145\/383059.383072"},{"key":"315_CR153","doi-asserted-by":"crossref","unstructured":"Malkhi D, Naor M, Ratajczak D. Viceroy: a scalable and dynamic emulation of the butterfly. In: Proceedings of the twenty-first annual symposium on principles of distributed computing, PODC \u201902, pp. 183\u2013192. ACM, Monterey, California; 2002.","DOI":"10.1145\/571825.571857"},{"key":"315_CR154","doi-asserted-by":"crossref","unstructured":"Crainiceanu A, Linga P, Gehrke J, Shanmugasundaram J. P-tree: a P2P index for resource discovery applications. In: Proceedings of the 13th international world wide web conference on alternate track papers & Posters, WWW Alt. \u201904, pp. 390\u2013391. ACM; 2004.","DOI":"10.1145\/1013367.1013490"},{"key":"315_CR155","unstructured":"Schmidt C, Parashar M. Flexible information discovery in decentralized distributed systems. In: High performance distributed computing, 2003. Proceedings. 12th IEEE International Symposium on, pp. 226\u2013235. IEEE; 2003."},{"key":"315_CR156","doi-asserted-by":"crossref","unstructured":"Arge L, Eppstein D, Goodrich MT. Skip-webs: efficient distributed data structures for multi-dimensional data sets. In: Proceedings of the twenty-fourth annual ACM symposium on principles of distributed computing, PODC \u201905; 2005. pp. 69\u201376.","DOI":"10.1145\/1073814.1073827"},{"key":"315_CR157","unstructured":"Awerbuch B, Scheideler C. The hyperring: a low-congestion deterministic data structure for distributed environments. In: Proceedings of the fifteenth annual ACM-SIAM symposium on discrete algorithms, SODA \u201904, pp. 318\u2013327. SIAM, Philadelphia, PA, USA; 2004."},{"key":"315_CR158","doi-asserted-by":"crossref","unstructured":"Palomar E, Estevez-Tapiador JM, Hernandez-Castro JC, Ribagorda A. Security in P2P networks: survey and research directions. In: Zhou X, Sokolsky O, Yan L, Jung ES, Shao Z, Mu Y, Lee DC, Kim DY, Jeong YS, Xu CZ (eds) Emerging directions in embedded and ubiquitous computing; 2006. pp. 183\u2013192.","DOI":"10.1007\/11807964_19"},{"key":"315_CR159","first-page":"21","volume":"43","author":"MA Rguibi","year":"2018","unstructured":"Rguibi MA, Moussa N. Hybrid trust model for Worm mitigation in P2P networks. J Inf Secur Appl. 2018;43:21\u201336.","journal-title":"J Inf Secur Appl"},{"issue":"15","key":"315_CR160","doi-asserted-by":"crossref","first-page":"3517","DOI":"10.1016\/j.comnet.2011.06.028","volume":"55","author":"G Ciccarelli","year":"2011","unstructured":"Ciccarelli G, Cigno RL. Collusion in peer-to-peer systems. Comput Netw. 2011;55(15):3517\u201332.","journal-title":"Comput Netw"},{"key":"315_CR161","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system bitcoin: a peer-to-peer electronic cash system; 2008."},{"key":"315_CR162","unstructured":"Cigno RL, Ciccarelli G. Collusion in peer-to-peer systems. In: Tech. rep., University of Trento; 2009."},{"key":"315_CR163","doi-asserted-by":"crossref","unstructured":"Popescu A, Constantinescu D, Erman D, Ilie D. A survey of reliable multicast communication; 2007.","DOI":"10.1109\/NGI.2007.371205"},{"key":"315_CR164","doi-asserted-by":"publisher","unstructured":"Quinn B, Almeroth K. IP multicast applications: challenges and solutions. RFC 3170. 2001. https:\/\/doi.org\/10.17487\/RFC3170. https:\/\/www.rfc-editor.org\/rfc\/rfc3170.txt.","DOI":"10.17487\/RFC3170"},{"key":"315_CR165","doi-asserted-by":"crossref","unstructured":"Nakayama H, Duolikun D, Enokido T, Takizawa M. A P2P model of publish\/subscribe systems. In: 2014 Ninth international conference on broadband and wireless computing, communication and applications; 2014. pp. 383\u2013388.","DOI":"10.1109\/BWCCA.2014.93"},{"key":"315_CR166","doi-asserted-by":"crossref","unstructured":"Shen H. Content-based publish\/subscribe systems. In: Shen X, Yu H, Buford J, Akon M (eds) Handbook of peer-to-peer networking, pp. 1333\u20131366. Springer; 2010.","DOI":"10.1007\/978-0-387-09751-0_49"},{"key":"315_CR167","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.cose.2016.04.008","volume":"61","author":"AV Uzunov","year":"2016","unstructured":"Uzunov AV. A survey of security solutions for distributed publish\/subscribe systems. Comput Secur. 2016;61:94\u2013129.","journal-title":"Comput Secur"},{"key":"315_CR168","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/3-540-45546-9_3","volume-title":"Networked group communication: third international COST264 Workshop, NGC 2001 London, UK, November 7\u20139, 2001 Proceedings","author":"A Rowstron","year":"2001","unstructured":"Rowstron A, Kermarrec AM, Druschel P, Castro M. Scribe: the design of a large-scale event notification infrastructure. In: Crowcroft J, editor. Networked group communication: third international COST264 Workshop, NGC 2001 London, UK, November 7\u20139, 2001 Proceedings. Berlin, Heidelberg: Springer; 2001. p. 30\u201343."},{"key":"315_CR169","doi-asserted-by":"crossref","unstructured":"Zhuang SQ, Zhao BY, Joseph AD, Katz RH, Kubiatowicz J.D. Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination. In: Proceedings of the 11th international workshop on Network and operating systems support for digital audio and video, pp. 11\u201320. ACM; 2001.","DOI":"10.1145\/378344.378347"},{"issue":"5","key":"315_CR170","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1080\/17445760.2012.697162","volume":"27","author":"TR Mayer","year":"2012","unstructured":"Mayer TR, Brunie L, Coquil D, Kosch H. On reliability in publish\/subscribe systems: a survey. Int J Parallel Emergent Distrib Syst. 2012;27(5):369\u201386.","journal-title":"Int J Parallel Emergent Distrib Syst"},{"issue":"3","key":"315_CR171","doi-asserted-by":"crossref","first-page":"1591","DOI":"10.1109\/SURV.2014.031914.00192","volume":"16","author":"P Bellavista","year":"2014","unstructured":"Bellavista P, Corradi A, Reale A. Quality of service in wide scale publish\u2014subscribe systems. IEEE Commun Surv Tutor. 2014;16(3):1591\u2013616.","journal-title":"IEEE Commun Surv Tutor"},{"key":"315_CR172","unstructured":"Segall B, Arnold D. Elvin has left the building: a publish\/subscribe notification service with quenching. In: Proceedings of the 1997 Australian UNLX Users Group (AUUG\u20191997), pp. 243\u2013255. Queensland, Australia; 1997."},{"key":"315_CR173","doi-asserted-by":"crossref","unstructured":"Petrovic M, Burcea I, Jacobsen HA. S-ToPSS: Semantic Toronto Publish\/Subscribe System. In: Proceedings of the 29th international conference on very large data bases\u2014Volume 29, VLDB \u201903, pp. 1101\u20131104. VLDB Endowment, Berlin, Germany; 2003.","DOI":"10.1016\/B978-012722442-8\/50115-4"},{"issue":"9","key":"315_CR174","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1109\/32.950318","volume":"27","author":"G Cugola","year":"2001","unstructured":"Cugola G, Di Nitto E, Fuggetta A. The JEDI event-based infrastructure and its application to the development of the OPSS WFMS. IEEE Trans Softw Eng. 2001;27(9):827\u201350.","journal-title":"IEEE Trans Softw Eng"},{"key":"315_CR175","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/978-3-642-17226-7_8","volume-title":"From active data management to event-based systems and more: papers in Honor of Alejandro Buchmann on the occasion of His 60th birthday","author":"H Parzyjegla","year":"2010","unstructured":"Parzyjegla H, Graff D, Schr\u00f6ter A, Richling J, M\u00fchl G. Design and implementation of the Rebeca Publish\/Subscribe Middleware. In: Sachs K, Petrov I, Guerrero P, editors. From active data management to event-based systems and more: papers in Honor of Alejandro Buchmann on the occasion of His 60th birthday. Berlin, Heidelberg: Springer; 2010. p. 124\u201340."},{"key":"315_CR176","doi-asserted-by":"crossref","unstructured":"Carzaniga A, Rosenblum DS, Wolf AL. Achieving scalability and expressiveness in an internet-scale event notification service. In: Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, pp. 219\u2013227. ACM; 2000.","DOI":"10.1145\/343477.343622"},{"issue":"3","key":"315_CR177","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1145\/380749.380767","volume":"19","author":"A Carzaniga","year":"2001","unstructured":"Carzaniga A, Rosenblum DS, Wolf AL. Design and evaluation of a wide-area event notification service. ACM Trans Comput Syst (TOCS). 2001;19(3):332\u201383.","journal-title":"ACM Trans Comput Syst (TOCS)"},{"key":"315_CR178","doi-asserted-by":"crossref","unstructured":"Gupta A, Sahin OD, Agrawal D, Abbadi AE. Meghdoot: Content-Based Publish\/Subscribe over P2P Networks. In: Proceedings of the 5th ACM\/IFIP\/USENIX international conference on middleware, pp. 254\u2013273; 2004.","DOI":"10.1007\/978-3-540-30229-2_14"},{"key":"315_CR179","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1109\/CISIS.2008.13","volume-title":"Second international conference on complex, intelligent and software intensive systems (CISIS-2008), March 4th-7th, 2008","author":"JP Ahull\u00f3","year":"2008","unstructured":"Ahull\u00f3 JP, L\u00f3pez PG, G\u00f3mez-Skarmeta AF. LightPS: lightweight content-based publish\/subscribe for Peer-to-Peer systems. In: Xhafa F, Barolli L, editors. Second international conference on complex, intelligent and software intensive systems (CISIS-2008), March 4th-7th, 2008. Barcelona: Technical University of Catalonia; 2008. p. 342\u20137."},{"issue":"1","key":"315_CR180","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.comnet.2011.09.015","volume":"56","author":"A Avramidis","year":"2012","unstructured":"Avramidis A, Kotzanikolaou P, Douligeris C, Burmester M. Chord-PKI: a distributed trust infrastructure based on P2P networks. Comput Netw. 2012;56(1):378\u201398.","journal-title":"Comput Netw"},{"issue":"SI","key":"315_CR181","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1145\/844128.844156","volume":"36","author":"M Castro","year":"2002","unstructured":"Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS. Secure routing for structured peer-to-peer overlay networks. ACM SIGOPS Oper Syst Rev. 2002;36(SI):299\u2013314.","journal-title":"ACM SIGOPS Oper Syst Rev"},{"issue":"4","key":"315_CR182","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"RC Merkle","year":"1978","unstructured":"Merkle RC. Secure communications over insecure channels. Commun ACM. 1978;21(4):294\u20139.","journal-title":"Commun ACM"},{"key":"315_CR183","unstructured":"Borisov, N. Computational puzzles as sybil defenses. In: Sixth IEEE international conference on peer-to-peer computing (P2P\u201906); 2006. pp. 171\u2013176."},{"key":"315_CR184","doi-asserted-by":"crossref","unstructured":"Rowaihy H, Enck W, McDaniel P, La\u00a0Porta T. Limiting Sybil Attacks in Structured P2P Networks. In: IEEE INFOCOM 2007\u201426th IEEE international conference on computer communications; 2007. pp. 2596\u20132600.","DOI":"10.1109\/INFCOM.2007.328"},{"key":"315_CR185","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/978-3-642-16161-2_16","volume-title":"Security and privacy in communication networks","author":"M Ion","year":"2010","unstructured":"Ion M, Russello G, Crispo B. Supporting publication and subscription confidentiality in Pub\/Sub networks. In: Jajodia S, Zhou J, editors. Security and privacy in communication networks. Berlin, Heidelberg: Springer; 2010. p. 272\u201389."},{"key":"315_CR186","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/978-3-319-23126-6_18","volume-title":"Internet of things, smart spaces, and next generation networks and systems","author":"C Probst","year":"2015","unstructured":"Probst C, Disterh\u00f6ft A, Graffi K. Chunked-Swarm: divide and conquer for real-time bounds in video streaming. In: Balandin S, Andreev S, Koucheryavy Y, editors. Internet of things, smart spaces, and next generation networks and systems. Cham: Springer; 2015. p. 198\u2013210."},{"key":"315_CR187","doi-asserted-by":"crossref","unstructured":"Graffi K, Stingl D, Gross C, Nguyen H, Kovacevic A, Steinmetz R. Towards a P2P cloud: reliable resource reservations in unreliable P2P systems. In: 16th IEEE international conference on parallel and distributed systems, ICPADS 2010, Shanghai, China; 2010. pp. 27\u201334.","DOI":"10.1109\/ICPADS.2010.34"},{"key":"315_CR188","doi-asserted-by":"crossref","unstructured":"Graffi K, Pussep K, Kaune S, Kovacevic A, Liebau N, Steinmetz R. Overlay bandwidth management: scheduling and active queue management of overlay flows. In: 32nd Annual IEEE conference on local computer networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings; 2007. pp. 334\u2013342.","DOI":"10.1109\/LCN.2007.13"},{"issue":"6","key":"315_CR189","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1007\/s12083-015-0366-7","volume":"9","author":"B Guidi","year":"2016","unstructured":"Guidi B, Amft T, De Salve A, Graffi K, Ricci L. Didusonet: a P2P architecture for distributed dunbar-based social networks. Peer-to-Peer Netw Appl. 2016;9(6):1177\u201394.","journal-title":"Peer-to-Peer Netw Appl"},{"key":"315_CR190","doi-asserted-by":"crossref","unstructured":"Benter M, Divband M, Kniesburges S, Koutsopoulos A, Graffi K. Ca-Re-Chord: a churn resistant self-stabilizing chord overlay network. In: 2013 conference on networked systems, NetSys 2013, Stuttgart, Germany; 2013. pp. 27\u201334.","DOI":"10.1109\/NetSys.2013.11"},{"key":"315_CR191","doi-asserted-by":"publisher","unstructured":"Harrington D, Presuhn R, Wijnen B. An architecture for describing simple network management protocol (SNMP) management frameworks. 2002. https:\/\/doi.org\/10.17487\/RFC3411.","DOI":"10.17487\/RFC3411"},{"issue":"1","key":"315_CR192","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1088\/0967-1846\/4\/1\/003","volume":"4","author":"G von Bochmann","year":"1997","unstructured":"von Bochmann G, Hafid A. Some principles for quality of service management. Distrib Sys Eng. 1997;4(1):16\u201327.","journal-title":"Distrib Sys Eng"},{"key":"315_CR193","unstructured":"Albrecht K, Arnold R, G\u00e4hwiler M, Wattenhofer R. Aggregating information in peer-to-peer systems for improved join and leave. In: IEEE P2P \u201904: proceedings of the international conference on peer-to-peer computing, pp. 227\u2013234. IEEE; 2004."},{"key":"315_CR194","doi-asserted-by":"crossref","unstructured":"van Renesse R, Bozdog A. Willow: DHT, aggregation, and publish\/subscribe in one protocol. In: Peer-to-Peer Systems III, third international workshop, IPTPS 2004, La Jolla, CA, USA, revised selected papers, lecture notes in computer science (LNCS), vol. 3279, pp. 173\u2013183. Springer. 2004.","DOI":"10.1007\/978-3-540-30183-7_17"},{"key":"315_CR195","doi-asserted-by":"crossref","unstructured":"Idreos S, Koubarakis M, Tryfonopoulos C. P2P-DIET: an extensible P2P service that unifies ad-hoc and continuous querying in super-peer networks. In: Weikum G, K\u00f6nig CA, De\u00dfloch S (eds) Proceedings of the ACM SIGMOD international conference on management of data, Paris, France, pp. 933\u2013934. ACM; 2004.","DOI":"10.1145\/1007568.1007704"},{"key":"315_CR196","doi-asserted-by":"crossref","unstructured":"Shen D, Shao Y, Nie T, Kou Y, Wang Z, Yu G. HilbertChord: a P2P framework for service resources management. In: Wu S, Yang LT, Xu TL (eds) Advances in grid and pervasive computing, third international conference, GPC 2008, Kunming, China, Proceedings; 2008. pp. 331\u2013342.","DOI":"10.1007\/978-3-540-68083-3_33"},{"key":"315_CR197","unstructured":"Kempe D, Dobra A, Gehrke J. Gossip-based computation of aggregate information. In: 44th symposium on foundations of computer science (FOCS 2003), Cambridge, MA, USA, Proceedings; 2003. pp. 482\u2013491."},{"issue":"13","key":"315_CR198","doi-asserted-by":"crossref","first-page":"2321","DOI":"10.1016\/j.comnet.2009.03.013","volume":"53","author":"T Man","year":"2009","unstructured":"Man T. Gossip-based fast overlay topology construction. Gossiping in distributed systems. Comput Netw. 2009;53(13):2321\u201339.","journal-title":"Comput Netw"},{"key":"315_CR199","unstructured":"Blasa F, Cafiero S, Fortino G, Di\u00a0Fatta G. Symmetric push-sum protocol for decentralised aggregation. In: Liotta A, Antonopoulus N, Di FG, Hara T, Vu QH (eds) Proceedings of the third international conference on advances in P2P Systems (AP2PS) 2011), pp. 27\u201332. International Academy, Research, and Industry Association (IARIA). 2011."},{"key":"315_CR200","doi-asserted-by":"crossref","unstructured":"SkyEye: A tree-based peer-to-peer monitoring approach. Pervasive Mobile Comput 2017;40:593\u2013610.","DOI":"10.1016\/j.pmcj.2017.07.003"},{"key":"315_CR201","doi-asserted-by":"crossref","unstructured":"Graffi K, Kovacevic A, Xiao S, Steinmetz R. SkyEye.KOM: an information management over-overlay for getting the oracle view on structured P2P systems. In: 2008 14th IEEE international conference on parallel and distributed systems; 2008. pp. 279\u2013286.","DOI":"10.1109\/ICPADS.2008.8"},{"key":"315_CR202","unstructured":"Bhagwan R, Varghese G, Voelker GM. CONE: augmenting DHTs to support distributed resource discovery. In: Technical report CS2003-0755, University of California, San Diego; 2003."},{"key":"315_CR203","unstructured":"Li J, Lim DY. A robust aggregation tree on distributed hash tables. In: Proceedings of the 4th Annual student oxygen workshop held at warren conference center & Inn in Ashland, MA. MIT Oxygen Alliance. 2004."},{"key":"315_CR204","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/978-3-540-45172-3_16","volume-title":"Peer-to-Peer systems II","author":"Z Zhang","year":"2003","unstructured":"Zhang Z, Shi SM, Zhu J. SOMO: self-organized metadata overlay for resource management in P2P DHT. In: Kaashoek MF, Stoica I, editors. Peer-to-Peer systems II. Berlin, Heidelberg: Springer; 2003. p. 170\u201382."},{"key":"315_CR205","doi-asserted-by":"crossref","unstructured":"Disterh\u00f6ft A, Sandkuhler P, Ippisch A, Graffi K. Mr.Tree: multiple realities in tree-based monitoring overlays for peer-to-peer networks. In: 2018 international conference on computing, networking and communications, ICNC 2018, Maui, HI, USA; 2018. pp. 354\u2013360.","DOI":"10.1109\/ICCNC.2018.8390361"},{"key":"315_CR206","doi-asserted-by":"crossref","unstructured":"Graffi K, Stingl D, Rueckert J, Kovacevic A, Steinmetz R. Monitoring and management of structured peer-to-peer systems. In: Schulzrinne H, Aberer K, Datta A (eds) Proceedings P2P 2009, Ninth International Conference on Peer-to-Peer Computing, USA: Seattle, Washington; 2009. p. 311\u201320.","DOI":"10.1109\/P2P.2009.5284512"},{"key":"315_CR207","doi-asserted-by":"crossref","unstructured":"Graffi KG. Monitoring and management of peer-to-peer systems. PhD, Darmstadt University of Technology; 2010.","DOI":"10.1109\/P2P.2009.5284512"},{"key":"315_CR208","doi-asserted-by":"crossref","unstructured":"Graffi K, Gross C, Mukherjee P, Kovacevic A, Steinmetz R. LifeSocial.KOM: a P2P-based Platform for secure online social networks. In: Proceedings of the IEEE international conference on peer-to-peer computing (P2P\u201910), pp. 1\u20132; 2010.","DOI":"10.1109\/P2P.2010.5569977"},{"key":"315_CR209","doi-asserted-by":"crossref","unstructured":"Graffi K, Gross C, Stingl D, Hartung D, Kovacevic A, Steinmetz R. LifeSocial. KOM: a secure and P2P-based solution for online social networks. In: Proceedings of the 2011 IEEE consumer communications and networking conference (CCNC); 2011. pp. 554\u2013558.","DOI":"10.1109\/CCNC.2011.5766541"},{"key":"315_CR210","doi-asserted-by":"crossref","unstructured":"Graffi K, Masinde N. LibreSocial: a peer-to-peer framework for online social networks. CoRR. 2020. arXiv:2001.02962.","DOI":"10.1002\/cpe.6150"},{"key":"315_CR211","doi-asserted-by":"crossref","unstructured":"Graffi K, Mukherjee P, Menges B, Hartung D, Kovacevic A, Steinmetz R. Practical security in P2P-based social networks. In: Proceedings of the IEEE 34th conference on local computer networks, 2009. LCN 2009; 2009. pp. 269\u2013272.","DOI":"10.1109\/LCN.2009.5355085"},{"key":"315_CR212","doi-asserted-by":"crossref","unstructured":"Narendula R, Papaioannou TG, Aberer K. Privacy-aware and highly-available OSN profiles. In: 2010 19th IEEE international workshops on enabling technologies: infrastructures for collaborative enterprises; 2010. pp. 211\u2013216.","DOI":"10.1109\/WETICE.2010.40"},{"key":"315_CR213","doi-asserted-by":"crossref","unstructured":"Narendula R, Papaioannou TG, Aberer K. My3: a highly-available P2P-based online social network. In: Peer-to-Peer Computing (P2P), 2011 IEEE International Conference on, pp. 166\u2013167. IEEE; 2011.","DOI":"10.1109\/P2P.2011.6038730"},{"key":"315_CR214","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1090191.1080102","volume":"35","author":"S Rhea","year":"2005","unstructured":"Rhea S, Godfrey B, Karp B, Kubiatowicz J, Ratnasamy S, Shenker S, Stoica I, Yu H. OpenDHT: a public DHT service and its uses. ACM SIGCOMM Comput Commun Rev. 2005;35:73\u201384.","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"315_CR215","doi-asserted-by":"crossref","unstructured":"Perfitt, T, Englert B. Megaphone: fault tolerant, scalable, and trustworthy P2P Microblogging. In: 2010 Fifth international conference on internet and web applications and services; 2010. pp. 469\u2013477.","DOI":"10.1109\/ICIW.2010.77"},{"issue":"2","key":"315_CR216","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120\u20136.","journal-title":"Commun ACM"},{"key":"315_CR217","unstructured":"Loupasakis A, Ntarmos N, Triantafillou P. eXO: Decentralized autonomous scalable social networking. In: CIDR 2011, fifth biennial conference on innovative data systems research, Asilomar, CA, USA, Online Proceedings; 2011. pp. 85\u201395."},{"key":"315_CR218","doi-asserted-by":"crossref","unstructured":"Asthana H, Cox IJ. PAC\u2019nPost: A framework for a micro-blogging social network in an unstructured P2P Network. In: Proceedings of the 21st international conference on world wide web, WWW \u201912 Companion, pp. 455\u2013456. Lyon, France; 2012.","DOI":"10.1145\/2187980.2188074"},{"key":"315_CR219","doi-asserted-by":"crossref","unstructured":"Jahid S, Nilizadeh S, Mittal P, Borisov N, Kapadia A. DECENT: a decentralized architecture for enforcing privacy in online social networks. In: Pervasive computing and communications workshops (PERCOM Workshops), 2012 IEEE international conference on, pp. 326\u2013332. IEEE; 2012.","DOI":"10.1109\/PerComW.2012.6197504"},{"issue":"1","key":"315_CR220","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1049\/iet-ifs.2013.0256","volume":"9","author":"F Raji","year":"2015","unstructured":"Raji F, Jazi MD, Miri A. PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability. IET Inf Secur. 2015;9(1):73\u201380.","journal-title":"IET Inf Secur"},{"issue":"2","key":"315_CR221","first-page":"71","volume":"14","author":"B Malek","year":"2012","unstructured":"Malek B, Miri A. Adaptively secure broadcast encryption with short ciphertexts. Int J Netw Secur. 2012;14(2):71\u20139.","journal-title":"Int J Netw Secur"},{"key":"315_CR222","doi-asserted-by":"crossref","unstructured":"Disterh\u00f6ft A, Graffi K. Protected chords in the web: secure p2p framework for decentralized online social networks. In: 2015 IEEE international conference on peer-to-peer computing (P2P), pp. 1\u20135. IEEE; 2015.","DOI":"10.1109\/P2P.2015.7328520"},{"key":"315_CR223","unstructured":"Buchegger S, Schi\u00f6berg D, Vu LH, Datta A. PeerSoN: P2P social networking: early experiences and insights. In: Proceedings of the second ACM EuroSys workshop on social network systems, SNS \u201909; 2015. pp. 46\u201352."},{"key":"315_CR224","doi-asserted-by":"crossref","unstructured":"Cutillo LA, Molva R, Strufe T. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In: 2009 IEEE international symposium on a world of wireless, mobile and multimedia networks workshops; 2009. pp. 1\u20136.","DOI":"10.1109\/WOWMOM.2009.5282446"},{"issue":"12","key":"315_CR225","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"LA Cutillo","year":"2009","unstructured":"Cutillo LA, Molva R, Strufe T. Safebook: a privacy-preserving online social network leveraging on real-life trust. Commun Mag IEEE. 2009;47(12):94\u2013101.","journal-title":"Commun Mag IEEE"},{"key":"315_CR226","unstructured":"Cutillo LA, Molva R, \u00d6nen M. Safebook: privacy preserving online social network. In: The IAB workshop on Internet Privacy, jointly organized with the W3C, ISOC, and MIT CSAIL, hosted by MIT on 8-9 December 2010, pp. 1\u20132. Internet Architecture Board (IAB); 2010."},{"key":"315_CR227","doi-asserted-by":"crossref","unstructured":"Xu T, Chen Y, Zhao J, Fu X. Cuckoo: towards decentralized, socio-aware online microblogging services and data measurements. In: Proceedings of the 2nd ACM international workshop on hot topics in planet-scale measurement, no.\u00a04 in HotPlanet \u201910, pp. 4:1\u20134:6. San Francisco, California; 2010.","DOI":"10.1145\/1834616.1834622"},{"key":"315_CR228","doi-asserted-by":"crossref","unstructured":"Xu T, Chen Y, Fu X, Hui P. Twittering by cuckoo: decentralized and socio-aware online microblogging services. In: Proceedings of the ACM SIGCOMM 2010 conference on applications, technologies, architectures, and protocols for computer communications, New Delhi, India; 2010. pp. 473\u2013474.","DOI":"10.1145\/1851275.1851270"},{"key":"315_CR229","doi-asserted-by":"crossref","unstructured":"Juste PS, Wolinsky D, Boykin PO, Figueiredo RJ. Litter: a lightweight peer-to-peer microblogging service. In: Privacy, security, risk and trust (PASSAT) and 2011 IEEE third inernational conference on social computing (SocialCom), 2011 IEEE third international conference on IEEE, pp. 900\u2013903. 2011.","DOI":"10.1109\/PASSAT\/SocialCom.2011.192"},{"key":"315_CR230","doi-asserted-by":"crossref","unstructured":"Juste PS, Eom H, Lee K, Figueiredo RJ. Enabling decentralized microblogging through P2pvpns. In: 2013 IEEE 10th consumer communications and networking conference (CCNC); 2013. pp. 323\u2013328.","DOI":"10.1504\/IJSN.2013.057699"},{"issue":"3","key":"315_CR231","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MIC.2012.41","volume":"16","author":"DL Iglesias","year":"2012","unstructured":"Iglesias DL, Marques JM, Cabrera G, Rifa-Pous H, Montane A. HorNet: microblogging for a contributory social network. IEEE Internet Comput. 2012;16(3):37\u201345.","journal-title":"IEEE Internet Comput"},{"key":"315_CR232","unstructured":"Iglesias DL. A middleware for service deployment in contributory computing systems. In: PhD., Universitat Oberta de Catalunya, Barcelona, Spain; 2011."},{"key":"315_CR233","doi-asserted-by":"crossref","unstructured":"Aiello LM, Milanesio M, Ruffo G, Schifanella R. tempering kademlia with a robust identity based system. In: 2008 eighth international conference on peer-to-peer computing; 2008. pp. 30\u201339.","DOI":"10.1109\/P2P.2008.40"},{"key":"315_CR234","doi-asserted-by":"crossref","unstructured":"D\u00fcrr M, Maier M, Dorfmeister F. Vegas\u2014a secure and privacy-preserving peer-to-peer online social network. In: 2012 international conference on privacy, security, risk and trust and 2012 international conference on social computing; 2012. pp. 868\u2013874.","DOI":"10.1109\/SocialCom-PASSAT.2012.42"},{"key":"315_CR235","first-page":"1","volume":"5","author":"HM Tran","year":"2015","unstructured":"Tran HM, Nguyen VS, Ha SVU. Decentralized online social network using Peer-to-Peer technology. REV J Electron Commun. 2015;5:1\u20132.","journal-title":"REV J Electron Commun"},{"key":"315_CR236","doi-asserted-by":"crossref","unstructured":"Wang J, Liu F, Li X, Liu H, Zhao X. HPOSN: a novel online social network model based on hybrid P2P. In: 2015 international conference on cloud computing and big data (CCBD); 2015. pp. 342\u2013349.","DOI":"10.1109\/CCBD.2015.46"},{"issue":"2","key":"315_CR237","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D Goldschlag","year":"1999","unstructured":"Goldschlag D, Reed M, Syverson P. Onion routing. Commun ACM. 1999;42(2):39\u201341.","journal-title":"Commun ACM"},{"key":"315_CR238","doi-asserted-by":"crossref","unstructured":"Nilizadeh S, Jahid S, Mittal P, Borisov N, Kapadia A. Cachet: a decentralized architecture for privacy preserving social networking with caching. In: Proceedings of the 8th international conference on emerging networking experiments and technologies, CoNEXT \u201912; 2012. pp. 337\u2013348.","DOI":"10.1145\/2413176.2413215"},{"key":"315_CR239","doi-asserted-by":"crossref","unstructured":"Jahid S, Mittal P, Borisov N. EASiER: encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM symposium on information, computer and communications security, ASIACCS \u201911; 2011. pp. 411\u2013415.","DOI":"10.1145\/1966913.1966970"},{"key":"315_CR240","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Security and privacy, 2007. SP\u201907. IEEE Symposium on IEEE, pp. 321\u2013334. 2007.","DOI":"10.1109\/SP.2007.11"},{"key":"315_CR241","unstructured":"Freitas M. twister\u2014a P2P microblogging platform. CoRR abs\/1312.7152. 2013."},{"issue":"1","key":"315_CR242","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1080\/17445760.2015.1053808","volume":"31","author":"M Freitas","year":"2016","unstructured":"Freitas M. Twister: the development of a peer-to-peer microblogging platform. Int J Parall Emergent Distrib Syst. 2016;31(1):20\u201333.","journal-title":"Int J Parall Emergent Distrib Syst"},{"issue":"1","key":"315_CR243","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.socnet.2004.11.007","volume":"27","author":"M Everett","year":"2005","unstructured":"Everett M, Borgatti SP. Ego network betweenness. Soc Netw. 2005;27(1):31\u20138.","journal-title":"Soc Netw"},{"key":"315_CR244","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/978-981-10-0421-6_7","volume-title":"Embedded system technology","author":"Y Fang","year":"2015","unstructured":"Fang Y, Wen Z, Shen Q, Yang Y, Wu Z. SEDOSN: a secure decentralized online social networking framework. In: Zhang X, Wu Z, Sha X, editors. Embedded system technology. Singapore: Springer; 2015. p. 68\u201374."},{"key":"315_CR245","doi-asserted-by":"crossref","unstructured":"Rouselakis Y, Waters B. Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS \u201913; 2013. pp. 463\u2013474.","DOI":"10.1145\/2508859.2516672"},{"issue":"2","key":"315_CR246","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4018\/IJDST.2016040103","volume":"7","author":"E Franchi","year":"2016","unstructured":"Franchi E, Poggi A, Tomaiuolo M. Blogracy: a peer-to-peer social network. Int J Distrib Syst Technol (IJDST). 2016;7(2):37\u201356.","journal-title":"Int J Distrib Syst Technol (IJDST)"},{"key":"315_CR247","unstructured":"zzz (Pseudonym), Schimmer L. Peer profiling and selection in the I2P anonymous network. In: Proceedings of PET-CON 2009.1; 2013. pp. 59\u201370."},{"key":"315_CR248","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router. In: Tech. rep., Naval Research Lab Washington DC; 2004.","DOI":"10.21236\/ADA465464"},{"key":"315_CR249","doi-asserted-by":"crossref","unstructured":"Vu LH, Aberer K, Buchegger S, Datta A. Enabling secure secret sharing in distributed online social networks. In: 2009 annual computer security applications conference, 2009:419\u2013428.","DOI":"10.1109\/ACSAC.2009.46"},{"key":"315_CR250","doi-asserted-by":"publisher","unstructured":"Camarillo G. Peer-to-Peer (P2P) Architecture: definition, taxonomies, examples, and applicability. RFC 2009:5694 2009. https:\/\/doi.org\/10.17487\/RFC5694. https:\/\/rfc-editor.org\/rfc\/rfc5694.txt","DOI":"10.17487\/RFC5694"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00315-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-020-00315-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00315-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T17:49:21Z","timestamp":1723571361000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-020-00315-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":250,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["315"],"URL":"https:\/\/doi.org\/10.1007\/s42979-020-00315-8","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9]]},"assertion":[{"value":"31 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"299"}}