Decentralized Polling with Respectable Participants

نویسندگان

  • Rachid Guerraoui
  • Kévin Huguenin
  • Anne-Marie Kermarrec
  • Maxime Monod
چکیده

We consider the polling problem in a social network where participants care about their reputation: they do not want their vote to be disclosed nor their misbehaving, if any, to be publicly exposed. Assuming this reputation concern, we show that a simple secret sharing scheme, combined with verification procedures, can efficiently enable polling without the need for any central authority or heavyweight cryptography. More specifically, we present DPol, a simple and scalable distributed polling protocol where misbehaving nodes are exposed with a non-zero probability and the probability of dishonest participants violating privacy is balanced with their impact on the accuracy of the polling result. The trade-off is captured by a generic parameter of the protocol, an integer k we call the privacy parameter, so that in a system of N nodes with B < √ N dishonest participants, the probability of disclosing a participant’s vote is bounded by (B/N), whereas the impact on the polling result is bounded by (6k + 2)B. We report on the deployment of DPol over 400 PlanetLab nodes. The polling result suffers a relative error of less than 10% in the face of message losses, crashes and asynchrony inherent in PlanetLab. In the presence of dishonest nodes, our experiments show that the impact on the polling result is (4k + 1)B on average, consistently lower that the theoretical bound of (6k + 2)B.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protocol and Heuristics for Synchronizing Opinion Poll Items in Vehicular Ad-hoc Networks

While drivers are not expected to vote while driving, VANETs can be an excellent media for dissemination of decentralized regional polls and for prerecorded votes/opinions on regional issues in a decentralized opinion poll. We propose and evaluate heuristics for scheduling messages in a VANET broadcastingbased dissemination of decentralized opinion polling data among self-interested participant...

متن کامل

Fighting Freeloaders in Decentralized P2P File Sharing Systems

Currently used P2P file-sharing systems such as Gnutella suffer from a freeloading problem due to absence of enforcible decentralized mechanism to motivate peers to provide services to others. Freeloading leads to a de facto centralized system that is susceptible to DoS attacks and provides poor service to its participants. In this paper, we propose a decentralized mechanism that avoids on-line...

متن کامل

Delay and Energy Models for Polling Based MAC Protocols with Sleep-Wake Cycles

While decentralized medium access control (MAC) protocols are more popular in wireless networks, cluster based sensor networks are particularly amenable to centralized, polling based protocols. This paper presents an analytic model to evaluate the performance of a polling based MAC protocol in terms of the packet delay, buffer overflow rates and energy consumption. We show that the polling base...

متن کامل

ar X iv : 1 41 2 . 76 53 v 1 [ cs . D C ] 2 4 D ec 2 01 4 Efficient Polling Protocol for Decentralized Social Networks ∗

We address the polling problem in social networks where individuals collaborate to choose the most favorite choice amongst some options, without divulging their vote and publicly exposing their potentially malicious actions. Given this social interaction model, Guerraoui et al. [1], [2] recently proposed polling protocols that do not rely on any central authority or cryptography system, using a...

متن کامل

Efficient Polling Protocol for Decentralized Social Networks

We address the polling problem in social networks where individuals collaborate to choose the most favorite choice amongst some options, without divulging their vote and publicly exposing their potentially malicious actions. Given this social interaction model, Guerraoui et al. [1], [2] recently proposed polling protocols that do not rely on any central authority or cryptography system, using a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009