Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 8

Proceedings of the 2016 Federated Conference on Computer Science and Information Systems

On Constructing Persistent Identifiers with Persistent Resolution Targets


DOI: http://dx.doi.org/10.15439/2016F87

Citation: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 8, pages 10311040 ()

Full text

Abstract. Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintenance-free PIDs using content-centric network technology and overlay networks. For proving the validity of the presented approach, the Handle PID System is used in conjunction with Magnet Link access information encoding, state-of-the-art decentralized data distribution with BitTorrent, and Named Data Networking (NDN) as location-independent data access technology for networks. Contrasting existing approaches, no green-field implementation of PID or major modifications of the Handle System is required to enable location-independent data dissemination with maintenance-free PIDs.


  1. N. Paskin, “Digital Object Identifier (DOI) System,” in Encyclopedia of Library and Information Sciences, 3rd ed. Boca Raton, FL: CRC Press, 2011, pp. 1586–1592.
  2. B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, “A survey of information-centric networking,” IEEE Comm. Magazine, vol. 50, no. 7, pp. 26–36, 2012. http://dx.doi.org/10.1109/MCOM.2012.6231276
  3. E. Van der Sar, “The Pirate Bay Tracker Shuts Down for Good,” Nov. 2009. https://torrentfreak.com/the-pirate-bay-tracker-shuts-down-for-good-091117/
  4. K. Sollins, “Pervasive persistent identification for Information centric networking,” in Proc. of the Second Edition of the ICN Workshop on Information-centric Networking. Helsinki, Finland: ACM, 2012. http://dx.doi.org/10.1145/2342488.2342490 pp. 1–6.
  5. T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica, “A Data-oriented (and Beyond) Network Architecture,” in Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ser. SIGCOMM ’07. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/1282380.1282402 pp. 181–192.
  6. C. Dannewitz, M. Herlich, and H. Karl, “OpenNetInf - prototyping an information-centric Network Architecture,” in Proceedings of the 37th IEEE Conference on Local Computer Networks Workshops 2012, Clearwater, USA, Oct. 2012. http://dx.doi.org/10.1109/LCNW.2012.6424044 pp. 1061–1069.
  7. N. Fotiou, D. Trossen, and G. C. Polyzos, “Illustrating a publish-subscribe Internet architecture,” Telecommunication Systems, vol. 51, no. 4, pp. 233–245, Dec. 2012. http://dx.doi.org/10.1007/s11235-011-9432-5
  8. C. Dannewitz, J. Golic, B. Ohlman, and B. Ahlgren, “Secure Naming for a Network of Information,” in Proc. of IEEE Conference on Computer Communications INFOCOM. San Diego, USA: IEEE, 2010. http://dx.doi.org/10.1109/INFCOMW.2010.5466661 pp. 1–6.
  9. S. Haun and A. Nürnberger, “Towards Persistent Identification of Resources in Personal Information Management,” in Proc. of the 3rd International Workshop on Semantic Digital Archives (SDA 2013), vol. 1091. Valetta, Malta: CEUR Workshop Proc., Sep. 2013, pp. 73–80.
  10. H.-W. Hilse and J. Kothe, Implementing persistent identifiers: overview of concepts, guidelines and recommendations. London: CERL, 2006.
  11. T. Cruse, “General Assembly 2016, moving DataCite forward,” 2016. https://blog.datacite.org/general-assembly-2016/
  12. “DataCite Metadata Stats,” Apr. 2016. http://stats.datacite.org/
  13. M. Fenner, “Digging into Metadata using R,” Aug. 2015. https://blog.datacite.org/digging-into-data-using-r/
  14. B. Cohen, “The BitTorrent Protocol Specification - BEP 3,” Oct. 2013. http://www.bittorrent.org/beps/bep_0003.html
  15. A. Loewenstern and A. Norberg, “The BitTorrent Protocol Specification - BEP 5,” Mar. 2013. http://www.bittorrent.org/beps/bep_0005.html
  16. P. Maymounkov and D. Mazières, “Kademlia: A Peer-to-Peer Information System Based on the XOR Metric,” in Peer-to-Peer Systems. Berlin, Heidelberg: Springer, 2002, vol. 2429, pp. 53–65.
  17. V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, “Networking named content,” in Proceedings of the 5th international conference on Emerging networking experiments and technologies. Rome, Italy: ACM Press, Dec. 2009. doi: 10.1145/1658939.1658941 p. 1.
  18. G. Mohr, “Magnet URI - Draft Tech Overview/Spec,” Jun. 2002. http://magnet-uri.sourceforge.net/magnet-draft-overview.txt
  19. K. Sollins and L. Masinter, “RFC 1737 - Functional Requirements for Uniform Resource Names,” Dec. 1994. https://tools.ietf.org/html/rfc1737
  20. E. Van der Sar, “Download a Copy of The Pirate Bay, It’s Only 90 MB,” Feb. 2012. https://torrentfreak.com/download-a-copy-of-the-pirate-bay-its-only-90-mb-120209/
  21. S. X. Sun, S. Reilly, and B. Boesch, “RFC 3650 - Handle System Overview,” 2003. https://tools.ietf.org/html/rfc3650
  22. T. Berners-Lee, R. Fielding, and L. Masinter, “RFC 3986 - Uniform Resource Identifier (URI): Generic Syntax,” 2005. https://tools.ietf.org/html/rfc3986
  23. Y. Yu, A. Afanasyev, Z. Zhu, and L. Zhang, “NDN Technical Memo: Naming Conventions - NDN, Technical Report NDN-0023, Revision 1,” Jul. 2014. http://named-data.net/wp-content/uploads/2014/08/ndn-tr-22-ndn-memo-naming-conventions.pdf
  24. D. Thaler, T. Hansen, and T. Hardie, “RFC 7595 - Guidelines and Registration Procedures for URI Schemes,” Jun. 2015. https://tools.ietf.org/html/rfc7595
  25. R. Fielding and J. Reschke, “RFC 7231 - Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content,” Jun. 2014. http://tools.ietf.org/html/rfc7231#section-6.4.4
  26. CNRI, “4.9 Handle Value Line Format,” in HANDLE.NET (version 8.1) Technical Manual, Nov. 2015, pp. 28–29. https://hdl.handle.net/20.1000/105
  27. CNRI, “Handle.Net software (HN v8.1),” 2015. http://www.handle.net/download_hnr.html
  28. M. Hellkamp, “Bottle: Python Web Framework,” Feb. 2016. http://bottlepy.org/docs/0.12/
  29. European Persistent Identifier Consortium, “pidconsortium/EPIC-API-v2,” Mar. 2016. https://github.com/pidconsortium/EPIC-API-v2
  30. A. Norberg, “libtorrent python binding,” 2015. http://www.rasterbar.com/products/libtorrent/python binding.html
  31. Transmission Project, “Transmission,” Mar. 2016. https://www.transmissionbt.com/
  32. CNRI, “Handle.Net Registry,” 2015. https://www.handle.net/proxy servlet.html
  33. A. Afanasyev, S. Chen, W. Shang, and J. Shi, “repo-ng: Next generation of NDN repository,” Nov. 2015. https://github.com/named-data/repo-ng
  34. CNRI, “HDL® Identifier and Resolution Services,” Oct. 2015. http://www.handle.net/factsheet.html
  35. International DOI Foundation, “DOI News - September 2014,” Sep. 2014. http://www.doi.org/news/DOI News Sep14.pdf
  36. A. K. M. M. Hoque, S. O. Amin, A. Alyyan, B. Zhang, L. Zhang, and L. Wang, “NLSR: Named-data Link State Routing Protocol,” in Proc. of the 3rd ACM SIGCOMM Workshop on Information-centric Networking ICN. New York, USA: ACM, 2013. http://dx.doi.org/10.1145/2491224.2491231 pp. 15–20.
  37. S. Farrell, C. Dannewitz, P. Hallam-Baker, D. Kutscher, and B. Ohlman, “RFC 6920 - Naming Things with Hashes,” Apr. 2014.