Developer(s) | kodeware, srl |
---|---|
Initial release | March 17, 2010 |
Stable release | 0.15 / February 8, 2012 |
Preview release | 1.0 alpha / December 10, 2014 [1] |
Operating system | Windows, Linux |
Type | Peer-to-peer file sharing, forum software |
Website | osiris-sps |
Osiris Serverless Portal System (usually abbreviated as Osiris sps or Osiris) is a freeware program used to create web portals distributed via peer-to-peer networking (P2P) and autonomous from centralized servers. It is available for Microsoft Windows and Linux operating systems.
Unlike common tools used to publish information on the Internet, such as content management systems, Internet forums or blogs based on a centralized system, the data of an Osiris portal are shared (via P2P) between all its participants. Because all the contents necessary for navigation are replicated on every computer, the portal can be used without a central server. Thus, the portal is always accessible because it is immune to denial of service attacks, Internet service provider limitations (such as traffic shaping and censorship) and hardware failure. In this way, a web portal can be operated at very low costs and free from external control.
Osiris was started by a developer named "Berserker" as an outgrowth of KeyForum. Osiris was written in C++ and designed to be decentralized, indestructible and expand beyond a simple a web forum. "Clodo" joined the project several months later.
Osiris was officially announced on October 2, 2006, after 2 years of development. The team is composed of 2 developers (Clodo & Berserker), two employees (DanielZ and Rei.Andrea) and a group of supporters/beta-testers (many of whom were already on the team KeyForum).
Starting from version 0.12, Osiris has become multi-platform, this was possible by migrating from the Visual Studio to the wxWidgets library.
Osiris is the result of a union between peer-to-peer (P2P) technology and web portals.
Osiris differs from classic P2P programs in that it is focused on security and distributed data management.
The Reputations system and the subsequent generation of multiple points of view of a portal is one of the most innovative aspects of the program. Unlike "traditional" systems where the computational work (calculation of statistics, indexing of content, etc.) is always made by a central server, Osiris use a distributed approach, where the majority of the works is made by users of a portal, due to this there may be more distinct points of view of a portal, depending on used account.
Each user is free to give reputation (positive or negative) to another user according to its contribution to the portal, based on these reputations, the system processes the pages by removing the contents of users evaluated negatively (such as spammers) and importing the reputations of users considered positively. This allow the creation of a network of assessments that allows management of a portal. Note that each client processes the data independently on its machine in a process that is called stabilization of the portal.
When a user creates an Osiris portal, the user must choose between two systems of moderation, namely "anarchist" and "monarchy". The choice cannot be changed after the portal is created. In an anarchic portal, every user can rate another user and thus influence that user's reputation among all users of the portal. In this way, a portal can be moderated without the use of a central server. The first reputation is always positive and is set to the administrator, the user who publishes the invitation link (digitally signed) to the portal. In a monarchy portal, only the portal administrator and moderators can generate reputations, and delete or promote contents on the portal.
Isis is a web gateway to Osiris portals, written in PHP 5, through which it is possible to browse a portal without installing Osiris.
The particularity of Isis is the management of the workload and the data, which don't lie on the public server that is running Isis, but is managed by the various nodes running Osiris. Isis only forwards web requests from visitors to the nodes that have become available to it, minimizing the use of resources from the server through the load-balancing of requests.
Since it is not technically possible to guarantee anonymity in this type of architecture, all accesses by Isis are read-only. This has the dual objective of ensuring the privacy of users and encourage the use of Osiris to actively participate to a portal.
The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. Often clients and servers communicate over a computer network on separate hardware, but both client and server may be on the same device. A server host runs one or more server programs, which share their resources with clients. A client usually does not share any of its resources, but it requests content or service from a server. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer applications that use the client–server model are email, network printing, and the World Wide Web.
Hyphanet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet's goal as providing freedom of speech on the Internet with strong anonymity protection.
Gnutella is a peer-to-peer network protocol. Founded in 2000, it was the first decentralized peer-to-peer network of its kind, leading to other, later networks adopting the model.
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of nodes. In addition, a personal area network (PAN) is also in nature a type of decentralized peer-to-peer network typically between two devices.
Uploading refers to transmitting data from one computer system to another through means of a network. Common methods of uploading include: uploading via web browsers, FTP clients, and terminals (SCP/SFTP). Uploading can be used in the context of clients that send files to a central server. While uploading can also be defined in the context of sending files between distributed clients, such as with a peer-to-peer (P2P) file-sharing protocol like BitTorrent, the term file sharing is more often used in this case. Moving files within a computer system, as opposed to over a network, is called file copying.
A web hosting service is a type of Internet hosting service that hosts websites for clients, i.e. it offers the facilities required for them to create and maintain a site and makes it accessible on the World Wide Web. Companies providing web hosting services are sometimes called web hosts.
A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and any participating node can efficiently retrieve the value associated with a given key. The main advantage of a DHT is that nodes can be added or removed with minimum work around re-distributing keys. Keys are unique identifiers which map to particular values, which in turn can be anything from addresses, to documents, to arbitrary data. Responsibility for maintaining the mapping from keys to values is distributed among the nodes, in such a way that a change in the set of participants causes a minimal amount of disruption. This allows a DHT to scale to extremely large numbers of nodes and to handle continual node arrivals, departures, and failures.
BitTorrent, also referred to simply as torrent, is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a decentralized manner. The protocol is developed and maintained by Rainberry, Inc., and was first released in 2001.
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.
In computer science and networking in particular, a session is a time-delimited two-way link, a practical layer in the TCP/IP protocol enabling interactive expression and information exchange between two or more communication devices or ends – be they computers, automated systems, or live active users. A session is established at a certain point in time, and then ‘torn down’ - brought to an end - at some later point. An established communication session may involve more than one message in each direction. A session is typically stateful, meaning that at least one of the communicating parties needs to hold current state information and save information about the session history to be able to communicate, as opposed to stateless communication, where the communication consists of independent requests with responses.
A content delivery network or content distribution network (CDN) is a geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance ("speed") by distributing the service spatially relative to end users. CDNs came into existence in the late 1990s as a means for alleviating the performance bottlenecks of the Internet as the Internet was starting to become a mission-critical medium for people and enterprises. Since then, CDNs have grown to serve a large portion of the Internet content today, including web objects, downloadable objects, applications, live streaming media, on-demand streaming media, and social media sites.
P2PTV refers to peer-to-peer (P2P) software applications designed to redistribute video streams in real time on a P2P network; the distributed video streams are typically TV channels from all over the world but may also come from other sources. The draw to these applications is significant because they have the potential to make any TV channel globally available by any individual feeding the stream into the network where each peer joining to watch the video is a relay to other peer viewers, allowing a scalable distribution among a large audience with no incremental cost for the source.
Peer-to-peer file sharing is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology. P2P file sharing allows users to access media files such as books, music, movies, and games using a P2P software program that searches for other connected computers on a P2P network to locate the desired content. The nodes (peers) of such networks are end-user computers and distribution servers.
A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".
Syndie is an open-source cross-platform computer application to syndicate (re-publish) data over a variety of anonymous and non-anonymous computer networks.
Peer-to-peer file sharing (P2P) systems like Gnutella, KaZaA, and eDonkey/eMule, have become extremely popular in recent years, with the estimated user population in the millions. An academic research paper analyzed Gnutella and eMule protocols and found weaknesses in the protocol; many of the issues found in these networks are fundamental and probably common on other P2P networks. Users of file sharing networks, such as eMule and Gnutella, are subject to monitoring of their activity. Clients may be tracked by IP address, DNS name, software version they use, files they share, queries they initiate, and queries they answer to. Clients may also share their private files to the network without notice due to inappropriate settings.
A distributed search engine is a search engine where there is no central server. Unlike traditional centralized search engines, work such as crawling, data mining, indexing, and query processing is distributed among several peers in a decentralized manner where there is no single point of control.
Open Cobalt is a free and open-source software platform for constructing, accessing, and sharing virtual worlds both on local area networks or across the Internet, with no need for centralized servers.
Peer-to-peer web hosting is using peer-to-peer networking to distribute access to webpages. This is differentiated from the client–server model which involves the distribution of web data between dedicated web servers and user-end client computers. Peer-to-peer web hosting may also take the form of P2P web caches and content delivery networks.
The InterPlanetary File System (IPFS) is a protocol, hypermedia and file sharing peer-to-peer network for storing and sharing data in a distributed hash table. By using content addressing, IPFS uniquely identifies each file in a global namespace that connects IPFS hosts, creating a resilient system of file storage and sharing.