DTNDocs: A delay tolerant peer-to-peer collaborative editing system

Author(s):  
Charles Edward A. Robin ◽  
Victor M. Romero
Author(s):  
G. Xexeo ◽  
A. Vivacqua ◽  
B. Miranda ◽  
B. Braga ◽  
B.K. Almentero ◽  
...  

2019 ◽  
Vol 2019 (3) ◽  
pp. 210-232
Author(s):  
Stephan A. Kollmann ◽  
Martin Kleppmann ◽  
Alastair R. Beresford

Abstract Document collaboration applications, such as Google Docs or Microsoft Office Online, need to ensure that all collaborators have a consistent view of the shared document, and usually achieve this by relying on a trusted server. Other existing approaches that do not rely on a trusted third party assume that all collaborating devices are trusted. In particular, when inviting a new collaborator to a group, one needs to choose between a) keeping past edits private and sending only the latest state (a snapshot) of the document; or b) allowing the new collaborator to verify her view of the document is consistent with other honest devices by sending the full history of (signed) edits. We present a new protocol which allows an authenticated snapshot to be sent to new collaborators while both hiding the past editing history, and allowing them to verify consistency. We evaluate the costs of the protocol by emulating the editing history of 270 Wikipedia pages; 99% of insert operations were processed within 11.0 ms; 64.9 ms for delete operations. An additional benefit of authenticated snapshots is a median 84% reduction in the amount of data sent to a new collaborator compared to a basic protocol that transfers a full edit history.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 726
Author(s):  
S Murugaveni ◽  
B Priyalakshmi ◽  
K Vijayan

In military network environments is resource-constrained arrange conditions, where end-to-end network is not ensured because of successive deferral, an efficient solution is required for trustful and energy efficient routing. Proposed work, provenance trust based routing is combined with energy efficient route to opt for a high network lifetime. Proposed scheme is designed for peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost Provenance alludes to the historical backdrop of responsibility for esteemed data. Proposed scheme avoids malicious node using provenance model and achieves good network lifetime using energy efficient routing strategy. Node’s trust is calculated dynamically in response to changes in the environmental and node conditions.  


Sign in / Sign up

Export Citation Format

Share Document