{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T08:48:44Z","timestamp":1766738924976,"version":"3.48.0"},"reference-count":56,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T00:00:00Z","timestamp":1766707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union\u2019s Horizon 2020 research and innovation programme","award":["956433"],"award-info":[{"award-number":["956433"]}]},{"name":"FCT projects","award":["10.54499\/LA\/P\/0083\/2020"],"award-info":[{"award-number":["10.54499\/LA\/P\/0083\/2020"]}]},{"name":"FCT projects","award":["10.54499\/UIDP\/50009\/2020"],"award-info":[{"award-number":["10.54499\/UIDP\/50009\/2020"]}]},{"name":"FCT projects","award":["10.54499\/UIDB\/50009\/2020"],"award-info":[{"award-number":["10.54499\/UIDB\/50009\/2020"]}]},{"name":"FCT projects","award":["CEECIND\/01179\/2017"],"award-info":[{"award-number":["CEECIND\/01179\/2017"]}]},{"name":"European Funds","award":["UID\/50021\/2025"],"award-info":[{"award-number":["UID\/50021\/2025"]}]},{"name":"European Funds","award":["UID\/PRR\/50021\/2025"],"award-info":[{"award-number":["UID\/PRR\/50021\/2025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This paper presents the design of G-IDSS (Graph-based InnoCyPES Data Storage Service): a novel, distributed data storage service that is built around a P2P network overlay to support handling distributed data. G-IDSS is accessible through a standard command-line interface and is based on a graph database to support the schema-less management of the distributed data stored among peers. The mechanisms to facilitate the execution of complex queries requiring distributed data integration and fusion are also presented and discussed. Besides the design, this work also provides relevant details related to the implementation of G-IDSS, reflecting several use cases that demand data that are distributed across different, even geographically spread, locations. G-IDSS scales to thousands of peers in an overlay, it is able to run distributed queries and can integrate data that are stored in different sources.<\/jats:p>","DOI":"10.3390\/fi18010009","type":"journal-article","created":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T08:38:14Z","timestamp":1766738294000},"page":"9","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Design and Implementation of a Graph-Based P2P Data Storage Service"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9737-8514","authenticated-orcid":false,"given":"Lunodzo J.","family":"Mwinuka","sequence":"first","affiliation":[{"name":"Department of Engineering for Innovation, University of Salento, 73100 Lecce, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1118-7109","authenticated-orcid":false,"given":"Massimo","family":"Cafaro","sequence":"additional","affiliation":[{"name":"Department of Engineering for Innovation, University of Salento, 73100 Lecce, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9110-8775","authenticated-orcid":false,"given":"Lucas","family":"Pereira","sequence":"additional","affiliation":[{"name":"Interactive Technologies Institute (ITI\/LARSyS), Instituto Superior T\u00e9cnico, Universidade de Lisboa, 1649-004 Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5906-4744","authenticated-orcid":false,"given":"Hugo","family":"Morais","sequence":"additional","affiliation":[{"name":"Instituto de Engenharia de Sistemas e Computadores-Investigac\u00e3o e Desenvolvimento (INESC-ID), Instituto Superior T\u00e9cnico, Universidade de Lisboa, 1649-004 Lisbon, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,12,26]]},"reference":[{"key":"ref_1","unstructured":"Duarte, F. (2025, December 17). Amount of Data Created Daily. Available online: https:\/\/explodingtopics.com\/blog\/data-generated-per-day."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.jnca.2016.04.008","article-title":"A survey of big data management: Taxonomy and state-of-the-art","volume":"71","author":"Siddiqa","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.jnca.2015.11.007","article-title":"Network computing and applications for Big Data analytics","volume":"59","author":"Abawajy","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"104080","DOI":"10.1016\/j.jnca.2024.104080","article-title":"Caching or re-computing: Online cost optimization for running big data tasks in IaaS clouds","volume":"235","author":"Fu","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"75","DOI":"10.3997\/1365-2397.fb2024107","article-title":"Data Management Transformation to Drive Subsurface Autonomy","volume":"42","author":"Mohan","year":"2024","journal-title":"First Break"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MC.2012.37","article-title":"CAP twelve years later: How the \u201crules\u201d have changed","volume":"45","author":"Brewer","year":"2012","journal-title":"Computer"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2018.04.006","article-title":"Verifiable database outsourcing supporting join","volume":"115","author":"Etemad","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Amiri, M.J., Agrawal, D., and El Abbadi, A. (2020, January 20\u201324). Modern large-scale data management systems after 40 years of consensus. Proceedings of the 2020 IEEE 36th International Conference on Data Engineering (ICDE), Dallas, TX, USA.","DOI":"10.1109\/ICDE48307.2020.00172"},{"key":"ref_9","unstructured":"Hoffer, J.A., Ramesh, V., and Topi, H. (2016). Modern Database Management, Pearson."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"45","DOI":"10.21884\/IJMTER.2017.4151.1EA3X","article-title":"Data Processing through Data Warehouse and Data mining","volume":"4","author":"Raghavendra","year":"2017","journal-title":"Int. J. Mod. Trends Eng. Res."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.jnca.2016.03.007","article-title":"PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting","volume":"66","author":"Qureshi","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.jnca.2016.09.015","article-title":"Khorramshahr: A scalable peer to peer architecture for port warehouse management system","volume":"76","author":"Goudarzi","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1818","DOI":"10.1016\/j.jnca.2012.07.006","article-title":"HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity","volume":"35","author":"Amad","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1052","DOI":"10.1016\/j.jnca.2011.12.005","article-title":"A peer-to-peer collaboration framework for multi-sensor data fusion","volume":"35","author":"Lee","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1990","DOI":"10.1016\/j.jnca.2012.07.022","article-title":"A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems","volume":"35","author":"Hu","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"103562","DOI":"10.1016\/j.jnca.2022.103562","article-title":"Privacy preserving subgraph isomorphism query for dynamic graph database","volume":"211","author":"Cong","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Shen, X., Yu, H., Buford, J., and Akon, M. (2010). Handbook of Peer-to-Peer Networking, Springer Science & Business Media.","DOI":"10.1007\/978-0-387-09751-0"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Carlsson, B., and Gustavsson, R. (2001, January 18\u201320). The rise and fall of napster-an evolutionary approach. Proceedings of the International Computer Science Conference on Active Media Technology, Hong Kong, China.","DOI":"10.1007\/3-540-45336-9_40"},{"key":"ref_19","unstructured":"Ripeanu, M. (2001, January 27\u201329). Peer-to-peer architecture case study: Gnutella network. Proceedings of the Proceedings First International Conference on Peer-to-Peer Computing, Link\u00f6ping, Sweden."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Pouwelse, J., Garbacki, P., Epema, D., and Sips, H. (2005, January 24\u201325). The bittorrent p2p file-sharing system: Measurements and analysis. Proceedings of the Peer-to-Peer Systems IV: 4th International Workshop, IPTPS 2005, Ithaca, NY, USA. Revised Selected Papers 4.","DOI":"10.1007\/11558989_19"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ripeanu, M., and Foster, I.T. (2002, January 7\u20138). Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems. Proceedings of the Revised Papers from the First International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA. IPTPS \u201901.","DOI":"10.1007\/3-540-45748-8_8"},{"key":"ref_22","first-page":"351","article-title":"Internet Study 2008\/2009","volume":"37","author":"Schulze","year":"2009","journal-title":"Ipoque Rep."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Baset, S.A., and Schulzrinne, H.G. (2006, January 23\u201329). An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. Proceedings of the Proceedings IEEE INFOCOM 2006, 25TH IEEE International Conference on Computer Communications, Barcelona, Spain.","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"ref_24","unstructured":"Nakamoto, S., and Bitcoin, A. (2025, December 17). Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_25","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Maymounkov, P., and Mazieres, D. (2002, January 7\u20138). Kademlia: A peer-to-peer information system based on the xor metric. Proceedings of the International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA.","DOI":"10.1007\/3-540-45748-8_5"},{"key":"ref_27","unstructured":"Castro, M., Costa, M., and Rowstron, A. (2004). Peer-to-Peer Overlays: Structured, Unstructured or Both, Msr-tr-2004-73 Microsoft Research."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/TNET.2007.900406","article-title":"Characterizing unstructured overlay topologies in modern P2P file-sharing systems","volume":"16","author":"Stutzbach","year":"2008","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Shen, X., Yu, H., Buford, J., and Akon, M. (2010). Peer-to-Peer Networking and Applications: Synopsis and Research Directions. Handbook of Peer-to-Peer Networking, Springer.","DOI":"10.1007\/978-0-387-09751-0"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Kaashoek, M.F., and Stoica, I. (2003, January 21\u201322). A Simple Fault Tolerant Distributed Hash Table. Proceedings of the Peer-to-Peer Systems II, Berkeley, CA, USA.","DOI":"10.1007\/b11823"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Dhara, K., Guo, Y., Kolberg, M., and Wu, X. (2010). Overview of structured peer-to-peer overlay algorithms. Handbook of Peer-to-Peer Networking, Springer.","DOI":"10.1007\/978-0-387-09751-0_9"},{"key":"ref_32","first-page":"1","article-title":"A survey and comparison of relational and non-relational database","volume":"1","author":"Jatana","year":"2012","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Nambiar, A., and Mundra, D. (2022). An Overview of Data Warehouse and Data Lake in Modern Enterprise Data Management. Big Data Cogn. Comput., 6.","DOI":"10.3390\/bdcc6040132"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.14778\/3352063.3352116","article-title":"Data lake management: Challenges and opportunities","volume":"12","author":"Nargesian","year":"2019","journal-title":"Proc. Vldb Endow."},{"key":"ref_35","first-page":"33","article-title":"Astudy on graph storage database of nosql","volume":"5","author":"Agrawal","year":"2016","journal-title":"Int. J. Soft Comput. Artif. Intell. Appl. (IJSCAI)"},{"key":"ref_36","unstructured":"Jawad, M. (2011). Data Privacy in P2P Systems. [Ph.D. Thesis, Universit\u00e9 de Nantes]. Available online: https:\/\/theses.hal.science\/tel-00638721v1."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"nwae403","DOI":"10.1093\/nsr\/nwae403","article-title":"A survey on multimodal large language models","volume":"11","author":"Yin","year":"2024","journal-title":"Natl. Sci. Rev."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Zhang, H., Wen, Y., Xie, H., and Yu, N. (2013). Distributed Hash Table: Theory, Platforms and Applications, Springer.","DOI":"10.1007\/978-1-4614-9008-1"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Aberer, K. (2001, January 5\u20137). P-Grid: A self-organizing access structure for P2P information systems. Proceedings of the International Conference on Cooperative Information Systems, Trento, Italy.","DOI":"10.1007\/3-540-44751-2_15"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Lindner, W., Mesiti, M., T\u00fcrker, C., Tzitzikas, Y., and Vakali, A.I. (2004, January 14\u201318). XPeer: A Self-Organizing XML P2P Database System. Proceedings of the Current Trends in Database Technology\u2014EDBT 2004 Workshops, Heraklion, Greece.","DOI":"10.1007\/b101218"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Norvag, K., Eide, E., and Standal, O.H. (2007, January 28\u201331). Query planning in P2P database systems. Proceedings of the 2007 2nd International Conference on Digital Information Management, Lyon, France.","DOI":"10.1109\/ICDIM.2007.4444252"},{"key":"ref_42","unstructured":"(2025, July 21). Contributors, OrbitDB: Peer-to-Peer Databases for the Decentralized Web. Available online: https:\/\/github.com\/orbitdb\/orbitdb."},{"key":"ref_43","unstructured":"(2025, July 21). Contributors, Peerbit: A CRDT-Based State Machine Framework on IPFS. Available online: https:\/\/github.com\/dao-xyz\/peerbit."},{"key":"ref_44","unstructured":"(2025, July 21). Contributors, DefraDB: A Peer-to-Peer Edge-First NoSQL Database. Available online: https:\/\/github.com\/sourcenetwork\/defradb."},{"key":"ref_45","unstructured":"Ng, W.S., Ooi, B.C., Tan, K.L., and Zhou, A. (2003, January 5\u20138). Peerdb: A p2p-based system for distributed data sharing. Proceedings of the 19th International Conference on Data Engineering (Cat. No. 03CH37405), Bangalore, India."},{"key":"ref_46","unstructured":"Iordanov, B. (2010, January 15\u201317). Hypergraphdb: A generalized graph database. Proceedings of the Web-Age Information Management: WAIM 2010 International Workshops: IWGD 2010, XMLDM 2010, WCMT 2010, Jiuzhaigou Valley, China. Revised Selected Papers 11."},{"key":"ref_47","unstructured":"Nadal, M., and Contributors (2025, July 21). GUN: A Decentralized, Offline-First Graph Database Engine. Available online: https:\/\/github.com\/amark\/gun."},{"key":"ref_48","unstructured":"Cafaro, M., Epicoco, I., Pulimeno, M., Mwinuka, L.J., Pereira, L., and Morais, H. (2025). IDSS, a Novel P2P Relational Data Storage Service. arXiv."},{"key":"ref_49","unstructured":"Monteiro, J.M.P. (2021). Scaling DHTs Towards Millions. [Ph.D. Thesis, NOVA University of Lisbon]."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/964723.383071","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","volume":"31","author":"Stoica","year":"2001","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Rowstron, A., and Druschel, P. (2001, January 12\u201316). Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. Proceedings of the IFIP\/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing, Heidelberg, Germany.","DOI":"10.1007\/3-540-45518-3_18"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Gupta, I., Birman, K., Linga, P., Demers, A., and Van Renesse, R. (2003, January 21\u201322). Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead. Proceedings of the International Workshop on Peer-to-Peer Systems, Berkeley, CA, USA.","DOI":"10.1007\/978-3-540-45172-3_15"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Jimenez, R., Osmani, F., and Knutsson, B. (September, January 31). Sub-second lookups on a large-scale Kademlia-based overlay. Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, Kyoto, Japan.","DOI":"10.1109\/P2P.2011.6038665"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Yu, J., Fang, C., Xu, J., Chang, E.C., and Li, Z. (2009, January 9\u201311). ID repetition in Kad. Proceedings of the 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, Seattle, WA, USA.","DOI":"10.1109\/P2P.2009.5284551"},{"key":"ref_55","unstructured":"Loudet, J., Sandu-Popa, I., and Bouganim, L. (2019, January 26\u201330). DISPERS: Securing highly distributed queries on personal data management systems. Proceedings of the VLDB 2019-45th International Conference on Very Large Data Bases, Los Angeles, CA, USA."},{"key":"ref_56","unstructured":"Javet, L. (2023). Privacy-Preserving Distributed Queries Compatible with Opportunistic Networks. [Ph.D. Thesis, Universit\u00e9 Paris-Saclay]."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/9\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T08:42:02Z","timestamp":1766738522000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,26]]},"references-count":56,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["fi18010009"],"URL":"https:\/\/doi.org\/10.3390\/fi18010009","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,26]]}}}