Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
short-survey

How to decentralize the internet: : A focus on data consolidation and user privacy

Published: 01 October 2023 Publication History

Abstract

Over the years, the Internet has become a field in which a small number of large Internet companies dominate most of the Internet services. As users get used to using their services, the users’ generated content and the data about their online behaviors are concentrated in such companies. This phenomenon, called “data consolidation”, has become a serious problem, which makes the Internet society seek to decentralize the current Internet. The decentralized Internet aims to (i) prevent the concentration of user data in a few giant companies like Google and Facebook, and (ii) give users full ownership and control of their data. Various technical solutions that address the data consolidation problem have been proposed; however, those solutions focus on somewhat different scopes of the problem often from their limited viewpoints. The main contributions in this paper are the following. First, we survey the solutions relevant to Internet decentralization based on the following criteria: data consolidation, data ownership, and the privacy of user data. Second, we suggest a holistic reference framework from a functional viewpoint, while the prior proposals in the literature handle a limited set of requirements. Last, we seek to identify remaining research issues, considering additional requirements that have not been addressed in the existing solutions.

References

[2]
World population and internet users, 2023, https://www.worldometers.info/ (Accessed: 09 April 2023).
[3]
Internet health report 2018, 2023, https://internethealthreport.org/2018/ (Accessed: 09 April 2023).
[4]
ISOC global internet report 2019, 2023, https://future.internetsociety.org/2019/ (Accessed: 09 April 2023).
[5]
Search engine market share worldwide 2019, 2023, https://gs.statcounter.com/search-engine-market-share/ (Accessed: 09 April 2023).
[6]
Browser market share worldwide 2019, 2023, https://gs.statcounter.com/browser-market-share/ (Accessed: 09 April 2023).
[7]
Social media market share worldwide 2019, 2023, https://gs.statcounter.com/social-media-stats/ (Accessed: 09 April 2023).
[8]
Major global digital ad sellers 2019 net digital ad revenues, 2023, https://www.emarketer.com/content/global-digital-ad-spending-2019/ (Accessed: 09 April 2023).
[9]
The world’s most valuable resource, 2017, pp. 14–17. The Economist, May 2017.
[10]
Jung H., Koh N., Survey on the data consolidation issue in the internet and corresponding researches, in: Electronics and Telecommunications Trends, ETRI, 2019,.
[11]
EU gdpr(general data protection regulation), 2023, https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&from=EN (Accessed: 09 April 2023).
[12]
Selby J., Data localization laws: Trade barriers or legitimate responses to cybersecurity risks, or both?, Int. J. Law Inform. Technol. 25 (3) (2017) 213–232,.
[13]
ProtocolLabs J., IPFS documentation, 2023, https://docs.ipfs.io/ (Accessed: 09 April 2023).
[14]
Reed D., Sporny M., Longley D., Allen C., Grant R., Sabadello M., Decentralized identifiers (DIDs) v1.0, 2023, https://w3.org/TR/did-core/ (Accessed: 09 April 2023).
[15]
Clark D., The design philosophy of the DARPA internet protocols, ACM SIGCOMM Comput. Commun. Rev. 18 (4) (1988) 106–114,.
[16]
Ibáñez L.-D., Simperl E., Gandon F., Story H., Redecentralizing the web with distributed ledgers, IEEE Intell. Syst. 32 (1) (2017) 92–95,.
[17]
Stoica I., Morris R., Karger D., Kaashoek M.F., Balakrishnan H., Chord: A scalable peer-to-peer lookup service for internet applications, ACM SIGCOMM Comput. Commun. Rev. 31 (4) (2001) 149–160,.
[18]
Ratnasamy S., Francis P., Handley M., Karp R., Shenker S., A scalable content-addressable network, in: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2001, pp. 161–172,.
[19]
Rowstron A., Druschel P., Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, in: IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing, Springer, 2001, pp. 329–350,.
[20]
Zhao B.Y., Kubiatowicz J., Joseph A.D., et al., Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing, Computer Science Division, University of California Berkeley, 2001.
[21]
B. Cohen, Incentives build robustness in BitTorrent, in: Workshop on Economics of Peer-To-Peer Systems, Vol. 6, 2003, pp. 68–72.
[22]
Bleichenbacher D., Maurer U.M., Directed acyclic graphs, one-way functions and digital signatures, in: Annual International Cryptology Conference, Springer, 1994, pp. 75–82,.
[23]
Maymounkov P., Eres D., Kademlia: A peer-to-peer information system based on the XOR metric, vol. 2429, 2002,.
[24]
ProtocolLabs P., Bitswap documentation, 2023, https://docs.ipfs.io/concepts/bitswap/ (Accessed: 09 April 2023).
[25]
Wilkinson S., Boshevski T., Brandoff J., Buterin V., Storj a Peer-to-Peer Cloud Storage Network, Citeseer, Princeton, NJ, USA, 2014.
[26]
Reed I.S., Solomon G., Polynomial codes over certain finite fields, 8, SIAM, 1960, pp. 300–304.
[27]
Rizzo L., Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Comput. Commun. Rev. 27 (2) (1997) 24–36,.
[28]
Mansour E., Sambra A.V., Hawke S., Zereba M., Capadisli S., Ghanem A., Aboulnaga A., Berners-Lee T., A demonstration of the solid platform for social web applications, in: Proceedings of the 25th International Conference Companion on World Wide Web, International World Wide Web Conferences Steering Committee, 2016, pp. 223–226,.
[29]
Zignani M., Quadri C., Gaito S., Cherifi H., Rossi G.P., The footprints of a “mastodon”: How a decentralized architecture influences online social relationships, in: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, IEEE, 2019, pp. 472–477,.
[30]
Sporny M., Inkster T., Story H., Harbulot B., Bachmann-Gmür R., Webid 1.0: Web Identification and Discovery, W3C Editors Draft, 2011.
[31]
Bizer C., Heath T., Berners-Lee T., Linked data: The story so far, in: Semantic Services, Interoperability and Web Applications: Emerging Concepts, IGI Global, 2011, pp. 205–227,.
[32]
Mastodon, 2023, https://joinmastodon.org/ (Accessed: 09 April 2023).
[33]
Zignani M., Gaito S., Rossi G.P., Follow the “mastodon”: Structure and evolution of a decentralized online social network, in: Twelfth International AAAI Conference on Web and Social Media, 2018,.
[34]
Raman A., Joglekar S., Cristofaro E.D., Sastry N., Tyson G., Challenges in the decentralised web: The mastodon case, in: Proceedings of the Internet Measurement Conference, 2019, pp. 217–229,.
[35]
Webber C.L., Tallon J., Shepherd E., Guy A., Prodromou E., ActivityPub, W3C, 2018.
[36]
Snell J., Prodromou E., Activity Streams 2.0, W3C Rec, 2017.
[37]
Sporny M., Longley D., Kellogg G., Lanthaler M., Champin P.-A., Lindström N., JSON-LD 1.1–a JSON-based serialization for Linked Data, (Ph.D. thesis) W3C, 2019.
[38]
for Science C., Dat whitepaper, 2023, https://github.com/datprotocol/whitepaper/raw/master/dat-paper.pdf (Accessed: 09 April 2023).
[39]
Aumasson J.-P., Neves S., Wilcox-O’Hearn Z., Winnerlein C., BLAKE2: Simpler, smaller, fast as MD5, in: International Conference on Applied Cryptography and Network Security, Springer, 2013, pp. 119–135,.
[40]
D.J. Bernstein, Extending the Salsa20 nonce, in: Workshop Record of Symmetric Key Encryption Workshop, Vol. 2011, 2011.
[41]
Beaker browser, 2023, https://beakerbrowser.com/ (Accessed: 09 April 2023).
[42]
YaCy - the peer to peer search engine, 2023, https://yacy.net/ (Accessed: 09 April 2023).
[43]
Herrmann M., Ning K.-C., Diaz C., Preneel B., Description of the Yacy Distributed Web Search Engine, KU Leuven ESAT/COSIC, IMinds, 2014.
[44]
Croft W.B., Metzler D., Strohman T., Search Engines: Information Retrieval in Practice, Vol. 520, Addison-Wesley Reading, 2010.
[45]
M. Ali, J. Nelson, R. Shea, M.J. Freedman, Blockstack: A global naming and storage system secured by blockchains, in: 2016 USENIX Annual Technical Conference, USENIX ATC 16, 2016, pp. 181–194.
[46]
Ali M., Nelson J., Blankstein A., Blockstack technical whitepaper v 2.0, 2023, https://silverway.io/whitepaper.pdf (Accessed: 09 April 2023).
[47]
Swan M., Blockchain: Blueprint for a New Economy, ”O’Reilly Media, Inc.”, 2015.
[48]
Foundation T.S., Sovrin: A protocol and token for self-sovereign identity and decentralized trust, 2023, https://sovrin.org/wp-content/uploads/Sovrin-Protocol-and-Token-White-Paper.pdf (Accessed: 09 April 2023).
[49]
Sabadello M., A universal resolver for self-sovereign identifiers, 2023, https://medium.com/decentralized-identity/a-universal-resolver-for-self-sovereign-identifiers-48e6b4a5cc3c (Accessed: 09 April 2023).
[50]
Rannenberg K., Camenisch J., Sabouri A., Attribute-based credentials for trust, in: Identity in the Information Society, Springer, 2015, doi:10.1007%2F978-3-319-14439-9.
[51]
Yue K., Zhang Y., Chen Y., Li Y., Zhao L., Rong C., Chen L., A survey of decentralizing applications via blockchain: The 5g and beyond perspective, IEEE Commun. Surv. Tutor. 23 (4) (2021) 2191–2217,.
[52]
Li K., Yang Y., Wang S., Shi R., Li J., A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid, Comput. Secur. 103 (2021),.
[53]
Kim H., Park J., Bennis M., Kim S.-L., Blockchained on-device federated learning, IEEE Commun. Lett. 24 (6) (2019) 1279–1283,.
[54]
Li Z., Alazab M., Garg S., Hossain M.S., PriParkRec: Privacy-preserving decentralized parking recommendation service, IEEE Trans. Veh. Technol. 70 (5) (2021) 4037–4050,.
[55]
Singh R., Dwivedi A.D., Mukkamala R.R., Alnumay W.S., Privacy-preserving ledger for blockchain and Internet of Things-enabled cyber-physical systems, Comput. Electr. Eng. 103 (2022),.
[56]
Ali M.S., Vecchio M., Pincheira M., Dolui K., Antonelli F., Rehmani M.H., Applications of blockchains in the Internet of Things: A comprehensive survey, IEEE Commun. Surv. Tutor. 21 (2) (2018) 1676–1717,.
[57]
Benisi N.Z., Aminian M., Javadi B., Blockchain-based decentralized storage networks: A survey, J. Netw. Comput. Appl. 162 (2020),.
[58]
Zhang J., Zhong S., Wang T., Chao H.-C., Wang J., Blockchain-based systems and applications: A survey, J. Internet Technol. 21 (1) (2020) 1–14,.
[59]
Yue K., Zhang Y., Chen Y., Li Y., Zhao L., Rong C., Chen L., A survey of decentralizing applications via blockchain: The 5g and beyond perspective, IEEE Commun. Surv. Tutor. 23 (4) (2021) 2191–2217,.
[60]
Antal C., Cioara T., Anghel I., Antal M., Salomie I., Distributed ledger technology review and decentralized applications development guidelines, Future Internet 13 (3) (2021) 62,.
[61]
Six N., Herbaut N., Salinesi C., Blockchain software patterns for the design of decentralized applications: A systematic literature review, Blockchain: Res. Appl. (2022),.
[62]
Abdullah Lajam O., Ahmed Helmy T., Performance evaluation of IPFS in private networks, in: 2021 4th International Conference on Data Storage and Data Engineering, DSDE ’21, Association for Computing Machinery, New York, NY, USA, 2021, pp. 77–84,.
[63]
Stutzbach D., Rejaie R., Understanding churn in peer-to-peer networks, in: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 2006, pp. 189–202,.
[64]
Douceur J.R., The sybil attack, in: International Workshop on Peer-to-Peer Systems, Springer, 2002, pp. 251–260,.
[65]
Dewan P., Dasgupta P., Pride: peer-to-peer reputation infrastructure for decentralized environments, in: Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers & Posters, 2004, pp. 480–481,.
[66]
Lee S.Y., Kwon O.-H., Kim J., Hong S.J., A reputation management system in structured peer-to-peer networks, in: 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, WETICE’05, IEEE, 2005, pp. 362–367,.
[67]
Reed I.S., Solomon G., Polynomial codes over certain finite fields, J. Soc. Ind. Appl. Math. 8 (2) (1960) 300–304,.
[68]
SAFE network, 2023, https://safenetwork.tech/ (Accessed: 09 April 2023).
[69]
Lambiotte R., Kosinski M., Tracking the digital footprints of personality, Proc. IEEE 102 (12) (2014) 1934–1939,.
[70]
Reynolds P., Irwin A.S., Tracking digital footprints: Anonymity within the bitcoin system, J. Money Laund. Control (2017),.
[71]
ProtocolLabs P., CID (content identifier), 2023, https://github.com/multiformats/cid (Accessed: 09 April 2023).
[72]
lifeID P., lifeID: Digital identify simple & secure, 2023, https://lifeid.io/ (Accessed: 09 April 2023).
[73]
One V., Veres one: A globally interoperable blockchain for identity, 2023, https://veres.one/ (Accessed: 09 April 2023).
[74]
ProtocolLabs V., Filecoin: A decentralized storage network, 2023, https://filecoin.io/filecoin.pdf (Accessed: 09 April 2023).
[75]
Nakamoto S., et al., Bitcoin: A peer-to-peer electronic cash system, 2008.
[76]
Steemit, 2023, https://steemit.com/ (Accessed: 09 April 2023).
[77]
Dtube whitepaper, 2023, https://token.d.tube/whitepaper.pdf (Accessed: 09 April 2023).
[78]
Brave rewards, 2023, https://brave.com/brave-rewards/ (Accessed: 09 April 2023).
[79]
[80]
Gummadi K., Gummadi R., Gribble S., Ratnasamy S., Shenker S., Stoica I., The impact of DHT routing geometry on resilience and proximity, in: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM ’03, ACM, New York, NY, USA, 2003, pp. 381–394,.
[81]
Kong J.S., Bridgewater J.S., Roychowdhury V.P., A general framework for scalability and performance analysis of DHT routing systems, in: International Conference on Dependable Systems and Networks, DSN’06, IEEE, 2006, pp. 343–354,.
[82]
Broder A., Fontura M., Josifovski V., Kumar R., Motwani R., Nabar S., Panigrahy R., Tomkins A., Xu Y., Estimating corpus size via queries, in: Proceedings of the 15th ACM International Conference on Information and Knowledge Management, ACM, 2006, pp. 594–603,.
[83]
Rescorla E., The transport layer security (TLS) protocol version 1.3, 2018.
[84]
Zimmermann P.R., Zimmermann P.R., The Official PGP User’s Guide, Vol. 5, MIT press Cambridge, 1995.
[85]
Golbeck J., Weaving a web of trust, Science 321 (5896) (2008) 1640–1641,.
[86]
Ulrich A., Holz R., Hauck P., Carle G., Investigating the openpgp web of trust, in: European Symposium on Research in Computer Security, Springer, 2011, pp. 489–507,.
[87]
Habib A., Chuang J., Incentive mechanism for peer-to-peer media streaming, in: Twelfth IEEE International Workshop on Quality of Service, 2004 IWQOS 2004, 2004, pp. 171–180,.
[88]
Marti S., Garcia-Molina H., Taxonomy of trust: Categorizing P2P reputation systems, Comput. Netw. 50 (4) (2006) 472–484,.
[89]
Huang J., Lei K., Du M., Zhao H., Liu H., Liu J., Qi Z., Survey on blockchain incentive mechanism, in: Data Science: 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I 5, Springer, 2019, pp. 386–395,.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking  Volume 234, Issue C
Oct 2023
460 pages

Publisher

Elsevier North-Holland, Inc.

United States

Publication History

Published: 01 October 2023

Author Tags

  1. Privacy
  2. Internet
  3. Network architecture and design
  4. Distributed networks

Qualifiers

  • Short-survey

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media