On Constructing Persistent Identifiers with Persistent Resolution Targets
Oliver Wannenwetsch, Tim Alexander Majchrzak
DOI: http://dx.doi.org/10.15439/2016F87
Citation: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 8, pages 1031–1040 (2016)
Abstract. Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintenance-free PIDs using content-centric network technology and overlay networks. For proving the validity of the presented approach, the Handle PID System is used in conjunction with Magnet Link access information encoding, state-of-the-art decentralized data distribution with BitTorrent, and Named Data Networking (NDN) as location-independent data access technology for networks. Contrasting existing approaches, no green-field implementation of PID or major modifications of the Handle System is required to enable location-independent data dissemination with maintenance-free PIDs.
References
- N. Paskin, “Digital Object Identifier (DOI) System,” in Encyclopedia of Library and Information Sciences, 3rd ed. Boca Raton, FL: CRC Press, 2011, pp. 1586–1592.
- B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, “A survey of information-centric networking,” IEEE Comm. Magazine, vol. 50, no. 7, pp. 26–36, 2012. http://dx.doi.org/10.1109/MCOM.2012.6231276
- E. Van der Sar, “The Pirate Bay Tracker Shuts Down for Good,” Nov. 2009. https://torrentfreak.com/the-pirate-bay-tracker-shuts-down-for-good-091117/
- K. Sollins, “Pervasive persistent identification for Information centric networking,” in Proc. of the Second Edition of the ICN Workshop on Information-centric Networking. Helsinki, Finland: ACM, 2012. http://dx.doi.org/10.1145/2342488.2342490 pp. 1–6.
- T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica, “A Data-oriented (and Beyond) Network Architecture,” in Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ser. SIGCOMM ’07. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/1282380.1282402 pp. 181–192.
- C. Dannewitz, M. Herlich, and H. Karl, “OpenNetInf - prototyping an information-centric Network Architecture,” in Proceedings of the 37th IEEE Conference on Local Computer Networks Workshops 2012, Clearwater, USA, Oct. 2012. http://dx.doi.org/10.1109/LCNW.2012.6424044 pp. 1061–1069.
- N. Fotiou, D. Trossen, and G. C. Polyzos, “Illustrating a publish-subscribe Internet architecture,” Telecommunication Systems, vol. 51, no. 4, pp. 233–245, Dec. 2012. http://dx.doi.org/10.1007/s11235-011-9432-5
- C. Dannewitz, J. Golic, B. Ohlman, and B. Ahlgren, “Secure Naming for a Network of Information,” in Proc. of IEEE Conference on Computer Communications INFOCOM. San Diego, USA: IEEE, 2010. http://dx.doi.org/10.1109/INFCOMW.2010.5466661 pp. 1–6.
- S. Haun and A. Nürnberger, “Towards Persistent Identification of Resources in Personal Information Management,” in Proc. of the 3rd International Workshop on Semantic Digital Archives (SDA 2013), vol. 1091. Valetta, Malta: CEUR Workshop Proc., Sep. 2013, pp. 73–80.
- H.-W. Hilse and J. Kothe, Implementing persistent identifiers: overview of concepts, guidelines and recommendations. London: CERL, 2006.
- T. Cruse, “General Assembly 2016, moving DataCite forward,” 2016. https://blog.datacite.org/general-assembly-2016/
- “DataCite Metadata Stats,” Apr. 2016. http://stats.datacite.org/
- M. Fenner, “Digging into Metadata using R,” Aug. 2015. https://blog.datacite.org/digging-into-data-using-r/
- B. Cohen, “The BitTorrent Protocol Specification - BEP 3,” Oct. 2013. http://www.bittorrent.org/beps/bep_0003.html
- A. Loewenstern and A. Norberg, “The BitTorrent Protocol Specification - BEP 5,” Mar. 2013. http://www.bittorrent.org/beps/bep_0005.html
- P. Maymounkov and D. Mazières, “Kademlia: A Peer-to-Peer Information System Based on the XOR Metric,” in Peer-to-Peer Systems. Berlin, Heidelberg: Springer, 2002, vol. 2429, pp. 53–65.
- V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, “Networking named content,” in Proceedings of the 5th international conference on Emerging networking experiments and technologies. Rome, Italy: ACM Press, Dec. 2009. doi: 10.1145/1658939.1658941 p. 1.
- G. Mohr, “Magnet URI - Draft Tech Overview/Spec,” Jun. 2002. http://magnet-uri.sourceforge.net/magnet-draft-overview.txt
- K. Sollins and L. Masinter, “RFC 1737 - Functional Requirements for Uniform Resource Names,” Dec. 1994. https://tools.ietf.org/html/rfc1737
- E. Van der Sar, “Download a Copy of The Pirate Bay, It’s Only 90 MB,” Feb. 2012. https://torrentfreak.com/download-a-copy-of-the-pirate-bay-its-only-90-mb-120209/
- S. X. Sun, S. Reilly, and B. Boesch, “RFC 3650 - Handle System Overview,” 2003. https://tools.ietf.org/html/rfc3650
- T. Berners-Lee, R. Fielding, and L. Masinter, “RFC 3986 - Uniform Resource Identifier (URI): Generic Syntax,” 2005. https://tools.ietf.org/html/rfc3986
- Y. Yu, A. Afanasyev, Z. Zhu, and L. Zhang, “NDN Technical Memo: Naming Conventions - NDN, Technical Report NDN-0023, Revision 1,” Jul. 2014. http://named-data.net/wp-content/uploads/2014/08/ndn-tr-22-ndn-memo-naming-conventions.pdf
- D. Thaler, T. Hansen, and T. Hardie, “RFC 7595 - Guidelines and Registration Procedures for URI Schemes,” Jun. 2015. https://tools.ietf.org/html/rfc7595
- R. Fielding and J. Reschke, “RFC 7231 - Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content,” Jun. 2014. http://tools.ietf.org/html/rfc7231#section-6.4.4
- CNRI, “4.9 Handle Value Line Format,” in HANDLE.NET (version 8.1) Technical Manual, Nov. 2015, pp. 28–29. https://hdl.handle.net/20.1000/105
- CNRI, “Handle.Net software (HN v8.1),” 2015. http://www.handle.net/download_hnr.html
- M. Hellkamp, “Bottle: Python Web Framework,” Feb. 2016. http://bottlepy.org/docs/0.12/
- European Persistent Identifier Consortium, “pidconsortium/EPIC-API-v2,” Mar. 2016. https://github.com/pidconsortium/EPIC-API-v2
- A. Norberg, “libtorrent python binding,” 2015. http://www.rasterbar.com/products/libtorrent/python binding.html
- Transmission Project, “Transmission,” Mar. 2016. https://www.transmissionbt.com/
- CNRI, “Handle.Net Registry,” 2015. https://www.handle.net/proxy servlet.html
- A. Afanasyev, S. Chen, W. Shang, and J. Shi, “repo-ng: Next generation of NDN repository,” Nov. 2015. https://github.com/named-data/repo-ng
- CNRI, “HDL® Identifier and Resolution Services,” Oct. 2015. http://www.handle.net/factsheet.html
- International DOI Foundation, “DOI News - September 2014,” Sep. 2014. http://www.doi.org/news/DOI News Sep14.pdf
- A. K. M. M. Hoque, S. O. Amin, A. Alyyan, B. Zhang, L. Zhang, and L. Wang, “NLSR: Named-data Link State Routing Protocol,” in Proc. of the 3rd ACM SIGCOMM Workshop on Information-centric Networking ICN. New York, USA: ACM, 2013. http://dx.doi.org/10.1145/2491224.2491231 pp. 15–20.
- S. Farrell, C. Dannewitz, P. Hallam-Baker, D. Kutscher, and B. Ohlman, “RFC 6920 - Naming Things with Hashes,” Apr. 2014.