P2P Business Applications: Future and Directions


Since the launch of Napster in June 1999, peer-to-peer technology (P2P) has become synonymous with file sharing applications that are the bane of the recording industry due to copyright infringements and consequent revenue losses. P2P promised a revolution in business computing which has not arrived. It has become synonymous with illegal file sharing and copyright violations. Meanwhile the information systems industry has undergone a paradigm change, and we are supposedly living in a world of cloud computing and mobile devices. It is pertinent to examine if P2P, as a revolutionary technology, is still relevant and important today and will be in future. One has to examine this question in the context of the fact that P2P technologies have matured but have however had limited adoption outside file sharing in the consumer space. This paper provides a detailed analysis of P2P computing and offers some propositions to answer the question of the relevancy of P2P. It is proposed that P2P is still a relevant technology but may be reshaped in the coming years in a different form as compared to what exists today.

Share and Cite:

P. Pankaj, M. Hyde and J. A. Rodger, "P2P Business Applications: Future and Directions," Communications and Network, Vol. 4 No. 3, 2012, pp. 248-260. doi: 10.4236/cn.2012.43029.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] E. Rutheford, “The P2P Report 2000,” 2001. www.cio.com/knowledge/edit/p2p.html
[2] G. Ruffo and R. Schifanella, “Fairpeers: Efficient Profit Sharing in Fair Peer-to-Peer Market Places,” Journal of
Network and Systems Management, Vol. 15, No. 3, 2007, pp. 355-382. doi:10.1007/s10922-007-9066-9
[3] F. Mata, J. L. Garcia-Dorado, J. Aracil and E. L. V. Jorge, “Factor Analysis of Internet Traffic Destinations from
Similar Source Networks,” Internet Research, Vol. 22, No. 1, 2012, pp. 29-56. doi:10.1108/10662241211199951
[4] R. Torres, M. Hajjat, S. Rao, M. Mellia and M. Munafo, “Inferring Undesirable Behaviour from P2P Traffic Analysis,”
Proceedings of ACM SIGMETRICS, Seattle, 15-19 June 2009, pp. 25-36.
[5] I. Wladawsky-Berger, “How CIOs Can Pilot the Untethered Enterprise,” 2013.
[6] D. Schoder and K. Fischbach, “Peer-to-Peer Prospects,” Communications of the ACM, Vol. 46, No. 2, 2003,
pp. 27-35. doi:10.1145/606272.606294
[7] W. G. Yee, L. T. Nguyen and O. Frieder, “ A View of the Data on P2P File-sharing Systems,”
Journal of the American Society for Information Science and Technology, Vol. 60, No. 10, 2009, pp. 2132-2141. doi:10.1002/asi.21106
[8] R. M. Martin, J. Casanovas, J. F. Crespo and J. Giralt, “Sharing Audiovisual Content Using a P2P Environment
Based in JXTA,” Internet Research, Vol. 17, No. 5, 2007, pp. 554-562. doi:10.1108/10662240710830244
[9] E. Frank, C. M. Gillett, E. Daley, S. R. Epps, B. Wang, T. Schadler and M. Yamnitsky, “Tablets Will Rule the
Personal Computing Landscape,” Forrestor Research, 2012.
[10] J. Perlow, “Post-PC Era Means Mass Extinction for Personal Computer OEMs,” 2012. http://www.zdnet.com/blog/
[11] C. Shirky, “What Is P2P… and What Isn’t?” 2000. http://www.openp2p.com/lpt/a/1431
[12] B. Hayes, “Collective Wisdom,” 1998. http://www.amsci.org/amsci/issues/Comsci98/copmsci1998-03.html
[13] M. A. Jovanovic, F. S. Annexstein and K. A. Berman, “Scalability Issues in Large Peer-to-Peer Networks—A Case
Study of Gnutella,” University of Cincinnati Technical Report, 2001.
[14] Anonymous_2, “DRFortress Launches the First Local Pay-As-You-Use Cloud Computing Service for Hawaii and
the Pacific Rim,” Business Wire, New York, 2012.
[15] E. Knorr and G. Gruman, “What Cloud Computing Really Means?” 2012. http://www.infoworld.com/d/cloud-computing/what-cloud
[16] Anonymous_1, “Gearing up for Grid,” 2004. http://www.itutilitypipeline.com
[17] S. Di and C. L. Wang, “Decentralized Proactive Resource Allocation for Maximizing Throughput of P2P Grid,”
Journal of Parallel and Distributed Computing, Vol. 72, No. 2, 2012, pp. 308-321. doi:10.1016/j.jpdc.2011.10.010
[18] Anonymous_3, “The Science of SETI@Home,” 2012. http://setiathome.berkeley.edu/sah_about.php
[19] X. Zhang, “Research Issues for Building and Integrating Peer-Based and Grid Systems,” 2002. http://www.nesc.ac.uk/talks/china_meet/zhang_beijing_talk.pdf
[20] Anonymous_8, “Status and Plans for Globus Toolkit 3.0,” 2004. http://www-unix.globus.org/toolkit/
[21] Anonymous_9, “About the Globus Alliance,” 2012. http://www.globus.org/alliance/about.php
[22] R. Krishnan, M. D. Smith and R. Telang, “The Economics of Peer-Peer Networks,” JITTA:
Journal of Information Technology Theory and Application, Vol. 5, No. 3, 2003, pp. 31-45.
[23] P. J. Alexander, “Peer-to-Peer File Sharing—The Case of Music Recording Industry,” Review of
Industrial Organization, Vol. 20, 2002, pp. 151-161. doi:10.1023/A:1013819218792
[24] J. A. Clark and A. Tsiaparas, “Bandwidth-on-Demand Networks—A Solution to Peer-to-Peer File Sharing,”
BT Technology Journal, Vol. 20, No. 1, 2002, pp. 5-16. doi:10.1023/A:1014518008964
[25] T. Boyle, “Independent Axes for Centralization/Decentralization of Transaction Systems,” 2001. http://www.ledgerism.net/P2Paxes.htm
[26] X. Meng and W. Cui, “Research on the Immune Strategy for the Polluted File Propagation in Structured
P2P Networks,” Computers & Electrical Engineering, Vol. 38, No. 2, 2012, pp. 194-205. doi:10.1016/j.compeleceng.2011.12.013
[27] J. R. Galbraith, “Organization Design,” Addison Wesley, Reading, 1977.
[28] H. Jarraya and M. Laurent, “A Secure Peer-to-Peer Backup Service Keeping Great Autonomy while under the
Supervision of a Provider,” Computers & Security, Vol. 29, No. 2, 2010 , pp. 180-195. doi:10.1016/j.cose.2009.10.003
[29] E. Miller, “Decentrlaization, Gnutella and Bad Actors,” 2002. http://research.yale.edu/lawmeme/modules.php?name=News&file=article&sid=291
[30] Y. Gu and A. Boukerche, “HD Tree: A Novel Data Dtructure to Support Multi-Dimensional Range Query for
P2P Networks,” Journal of Parallel and Distributed Computing, Vol. 71, No. 8, 2011, pp. 1111-1124.
[31] M. Xu, S. Zhou and J. Guan, “A New and Effective Hierarchical Overlay Structure for Peer-to-Peer Networks,”
computer Communications, Vol. 34, No. 1, 2011, pp. 862-874. doi:10.1016/j.comcom.2010.10.005
[32] G. Exarchakos, N. Antonopoulos and J. Salter, “G-ROME: Semantic-Driven Capacity Sharing Among P2P
Networks,” Internet Research, Vol. 17, No. 1, 2007, pp. 7-20. doi:10.1108/10662240710730461
[33] D. O. Rice, “Protecting Online Information Sharing in Peer-to-Peer (P2P) Networks,” Online Information Review,
Vol. 31, No. 5, 2007, pp. 682-693. doi:10.1108/14684520710832351
[34] P. Morrissey, “RTGuardian Delivers Skype Smackdown,” Network Computing, Vol. 17, No. 13, 2006, pp. 22-24.
[35] Anonymous_6, “Managed Peer-to-Peer Networking,” 2012. http://www.pandonetworks.com/p2p
[36] C. Metz, “P2P Goes Private,” PC Magazine, February 2005, p. 92.
[37] Anonymous_5, “Cybermanagement: Correction—CommerceNet and PeerIntelligence Galvanize Peer-to-Peer (P2P)
Community with Groundbreaking Research for Business Environment,” M2 Presswire, Coventry, 2001, p. 1.
[38] E. Messmer, “Gartner: Top 10 Emerging Infrastructure Trends—The Tablet, the Cloud, Big Data All on the List,”
2012. http://www.networkworld.com/news/2012/060512-gartner-trends-259883.html
[39] W. J. Bolosky, J. R. Douceur, D. Ely and M. Theimer, “Feasibility of a Serverless Distributed File System Deployed
on an Existing Set of Desktop PCs,” 2001. http://research.microsoft.com/sn/Farsite/Sigmetrics2000.pdf
[40] C. C. Costa, C. C. Ferreira, L. L. Bastiao, L. L. Riberio, A. A. Silvo and J. L. Oliveira, “Dicoogle—An Open Source
Peer-to-Peer PACS,” Journal of Digital Imaging, Vol. 24, No. 5, 2011, pp. 848-856. doi:10.1007/s10278-010-9347-9
[41] P. D. Maciel, F. Brasilerio, R. A. Santos, D. Candeia, R. Lopes, M. Carvalho, R. Miceli, N. Andrade and M. Mowbray,
“Business-Driven Short-Term Management of a Hybrid IT Infrastructure,” Journal of Parallel and Distributed Computing,
Vol. 72, No. 2, 2012, pp. 106-119. doi:10.1016/j.jpdc.2011.11.001
[42] Anonymous_7, “Stortext: Stortext Launches DOXZONE,” M2 Presswire, Coventry, 2001.
[43] S. Smith, “P2P in B2B,” EContent, Vol. 26, No. 7, 2003, pp. 20-24.
[44] M. M. Schorlemmer, J. J. Abian, C. C. Sierra, D. D. Cruz, L. L. Bernacchioni, E. E. Jaen, A. A. P. Pinninck and
M. M. Atencia, “P2P Proteomics—Data Sharing for Enhanced Protein Identification,” Automated Experimentation, Vol. 4, No. 1, 2012, p. 1. http://www.aejournal.net/content/4/1/1
[45] Y. He, Z. Xiong, Y. Zhang, X. Tan and Z. Li, “Modeling and Analysis of Multi-Channel P2P VoD Systems,” Journal of Network and Computer Applications, Vol. 10, No. 16, 2012, pp. 1568-1578. doi:10.1016/j.jnca.2012.02.004
[46] W. Sun, and C. King, “ORN: A Content-Based Approach to Improving Supplier Discovery in P2P VOD Networks,” Journal of Parallel and Distributed Computing, Vol. 71, No. 12, 2011, pp. 1558-1569. doi:10.1016/j.jpdc.2011.08.004
[47] Anonymous_13, “Skyrider Extends Peer-to-Peer (P2P) Leadership Role with Search Marketing Platform and Series C Round of Funding,” Business Wire, New York, 2006.
[48] Anonymous_10, “TOR: Overview,” 2012. https://www.torproject.org/about/overview.html.en
[49] D. Schoder and K. Fischbach, “Peer-to-Peer Prospects,” Communications of the ACM, Vol. 46, No. 2, 2003, pp. 27-35. doi:10.1145/606272.606294
[50] Wikipedia, “Wireless Ad-Hoc Nework,” 2012. http://en.wikipedia.org/wiki/Wireless_ad-hoc_network
[51] L. Hardesty, “Explained: Ad Hoc Networks,” 2011. http://web.mit.edu/newsoffice/2011/exp-ad-hoc-0310.html
[52] M. Wood, “If Facebook Dies (and It Might) Its Killer Will Be Born Mobile,” 2012. http://news.cnet.com/8301-31322_3-57443289-256/if-facebook-dies-and-it-might-its-killer-will-be-born-mobile/?tag=nl.e703
[53] A. Bruno, “UpFront: Mobile—Two New Apps Take P2P Mobile,” Billboard, Vol. 118, No. 5, 2006, p. 8.
[54] Anonymous_11, “mTouche, Indian Partner to offer P2P mobile content,” New Straits Times, Kuala Lumpur, Malaysia, 2009, p. 5.
[55] Anonymous_12, “Endeavors Technology: Endeavors Technology’s Magi P2P Collaboration Software for PDAs to Run Insignia’s Industry-Leading Jeode Platform,” M2 Presswire, Coventry, 2001.
[56] D. Lonescu, “UPDATE: New Android Malware Uses Phones as Spam Botnet,” 2012. http://www.pcworld.com/article/258794/update_new_android_malware_uses_phones_as_spam_botnet.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.