Dealing with Cheaters in Anonymous Peer-to-Peer Networks

نویسندگان

  • Paul Gauthier
  • Brian Bershad
  • Steven D. Gribble
چکیده

As anonymous peer-to-peer file sharing networks transition from intellectual curiosity to societal reality, their long-term viability is seriously threatened by cheaters. A cheater either consumes resources without producing them (a freeloader), or advertises valuable content, but ultimately delivers that which is useless (a spoofer). In both cases, the cheater realizes some benefit from his actions without having to pay a commensurate cost. Because these networks are anonymous, the traditional accountability mechanisms developed for classic distributed systems do not apply. In this paper we present a protocol that dramatically reduces and in many cases eliminates the benefit gained by cheaters in anonymous peer-to-peer file sharing networks. Our protocol is based on the notion of exchange: instead of allowing users to unidirectionally download content, in order to acquire a file, a user must simultaneously provide a file to somebody else. We organize users into “exchange groups,” in which each user provides one file in order to acquire one file, with the aggregate exchange satisfying all participants. Through exposition we show that our composite protocol works well in theory, eliminating the incentive to freeload and forcing spoofers to spend resources commensurate with the damage they cause. Through tracedriven simulation, we show that it works well in practice, resulting in a system in which users can acquire the content they want with reasonable delay.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Identity and Trust for Peer-to-Peer Networks

In this paper, we present a new way of establishing independently-verifiable identities, based on the notion of computationally expensive key generation. We then describe a fully decentralized framework where these identities can be used to assign blame and to construct auditable blacklists of cheaters.

متن کامل

A Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory

The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...

متن کامل

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

A Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory

The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...

متن کامل

TEL-AVIV UNIVERSITY RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES SCHOOL OF COMPUTER SCIENCE Hide and Seek: Provable Anonymity in Computer Networks

Anonymous communication methods have been under heavy research in the last years. Specifically, with the advent of peer to peer networks, anonymity is grasped as a desired property of any well designed system for exchanging information between parties. Previous work dealing with anonymity and privacy is mostly application driven and intuitively based, paying more attention to implementation det...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004