{"id":"https://openalex.org/W2988278698","doi":"https://doi.org/10.23919/apnoms.2019.8892963","title":"A Monitorable Peer-to-Peer File Sharing Mechanism","display_name":"A Monitorable Peer-to-Peer File Sharing Mechanism","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2988278698","doi":"https://doi.org/10.23919/apnoms.2019.8892963","mag":"2988278698"},"language":"en","primary_location":{"id":"doi:10.23919/apnoms.2019.8892963","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apnoms.2019.8892963","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008779086","display_name":"Wei-Chiao Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Wei-Chiao Huang","raw_affiliation_strings":["Institute of Network Engineering, National Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Network Engineering, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006608753","display_name":"Lo\u2010Yao Yeh","orcid":"https://orcid.org/0000-0002-9764-0455"},"institutions":[{"id":"https://openalex.org/I193365169","display_name":"National Chi Nan University","ror":"https://ror.org/03ha6v181","country_code":"TW","type":"education","lineage":["https://openalex.org/I193365169"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Lo-Yao Yeh","raw_affiliation_strings":["National Chi Nan University, Nantou, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chi Nan University, Nantou, Taiwan","institution_ids":["https://openalex.org/I193365169"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059752721","display_name":"Jiun\u2010Long Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jiun-Long Huang","raw_affiliation_strings":["National Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008779086"],"corresponding_institution_ids":["https://openalex.org/I148366613"],"apc_list":null,"apc_paid":null,"fwci":0.7074,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74237098,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/file-sharing","display_name":"File sharing","score":0.8097493648529053},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.791739284992218},{"id":"https://openalex.org/keywords/bittorrent-tracker","display_name":"BitTorrent tracker","score":0.648530900478363},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.6408402323722839},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.5746570229530334},{"id":"https://openalex.org/keywords/self-certifying-file-system","display_name":"Self-certifying File System","score":0.5339471101760864},{"id":"https://openalex.org/keywords/distributed-file-system","display_name":"Distributed File System","score":0.459231972694397},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4582397937774658},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43611425161361694},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.43087872862815857},{"id":"https://openalex.org/keywords/torrent-file","display_name":"Torrent file","score":0.4229663610458374},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3901193141937256},{"id":"https://openalex.org/keywords/stub-file","display_name":"Stub file","score":0.23213636875152588},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.227081298828125},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19975504279136658},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19441574811935425},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19186341762542725},{"id":"https://openalex.org/keywords/data-file","display_name":"Data file","score":0.17983070015907288}],"concepts":[{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.8097493648529053},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.791739284992218},{"id":"https://openalex.org/C57501372","wikidata":"https://www.wikidata.org/wiki/Q2021268","display_name":"BitTorrent tracker","level":3,"score":0.648530900478363},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.6408402323722839},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.5746570229530334},{"id":"https://openalex.org/C82820731","wikidata":"https://www.wikidata.org/wiki/Q2640620","display_name":"Self-certifying File System","level":3,"score":0.5339471101760864},{"id":"https://openalex.org/C152043487","wikidata":"https://www.wikidata.org/wiki/Q1229600","display_name":"Distributed File System","level":2,"score":0.459231972694397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4582397937774658},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43611425161361694},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.43087872862815857},{"id":"https://openalex.org/C40350719","wikidata":"https://www.wikidata.org/wiki/Q2451637","display_name":"Torrent file","level":4,"score":0.4229663610458374},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3901193141937256},{"id":"https://openalex.org/C13674803","wikidata":"https://www.wikidata.org/wiki/Q7627301","display_name":"Stub file","level":3,"score":0.23213636875152588},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.227081298828125},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19975504279136658},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19441574811935425},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19186341762542725},{"id":"https://openalex.org/C171730128","wikidata":"https://www.wikidata.org/wiki/Q5227290","display_name":"Data file","level":2,"score":0.17983070015907288},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C56461940","wikidata":"https://www.wikidata.org/wiki/Q970687","display_name":"Eye tracking","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/apnoms.2019.8892963","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apnoms.2019.8892963","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1844512392","https://openalex.org/W2119245106","https://openalex.org/W2794417375","https://openalex.org/W2927349450","https://openalex.org/W3151748982","https://openalex.org/W6638711193","https://openalex.org/W6677516953"],"related_works":["https://openalex.org/W4308748977","https://openalex.org/W2558192934","https://openalex.org/W2622848439","https://openalex.org/W2342627122","https://openalex.org/W2083837877","https://openalex.org/W2775825612","https://openalex.org/W2022603930","https://openalex.org/W1975120555","https://openalex.org/W2332299233","https://openalex.org/W2522588804"],"abstract_inverted_index":{"With":[0],"the":[1,47,54,80,115,129],"rise":[2],"of":[3,24,120],"blockchain":[4],"technology,":[5],"peer-to-peer":[6,99],"network":[7,37],"system":[8,130],"has":[9],"once":[10],"again":[11],"caught":[12],"people's":[13],"attention.":[14],"Peer-to-peer":[15],"(P2P)":[16],"is":[17,39,73],"currently":[18],"being":[19],"implemented":[20],"on":[21],"various":[22],"kind":[23],"decentralized":[25],"systems":[26,38],"such":[27],"as":[28],"InterPlanetary":[29],"File":[30,116],"System":[31],"(IPFS).":[32],"However,":[33],"P2P":[34],"file":[35,100,110],"sharing":[36,101],"not":[40],"without":[41],"its":[42],"flaws.":[43],"Data":[44,84],"stored":[45],"in":[46,124],"other":[48,62,106],"nodes":[49,63,107,123],"cannot":[50],"be":[51,59,70],"deleted":[52,60],"by":[53,61],"owner":[55],"and":[56,93,112],"can":[57,69,136],"only":[58],"themselves.":[64],"Ensuring":[65],"that":[66,103],"personal":[67],"data":[68],"completely":[71],"removed":[72],"an":[74],"important":[75],"issue":[76],"to":[77,108,113,126,142],"comply":[78,143],"with":[79,105,138,144],"European":[81],"Union's":[82],"General":[83],"Protection":[85],"Regulation":[86],"(GDPR)":[87],"criteria.":[88],"To":[89],"improve":[90],"P2Ps":[91],"privacy":[92],"security,":[94],"we":[95],"propose":[96],"a":[97,139],"monitorable":[98],"mechanism":[102,135],"synchronizes":[104],"perform":[109],"deletion":[111],"generate":[114],"Authentication":[117],"Code":[118],"(FAC)":[119],"each":[121],"IPFS":[122],"order":[125],"make":[127],"sure":[128],"synchronized":[131],"correctly.":[132],"The":[133],"proposed":[134],"integrate":[137],"consortium":[140],"Blockchain":[141],"GDPR.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
