Dealing with Cheaters in Anonymous Peer-to-Peer Networks
نویسندگان
چکیده
As anonymous peer-to-peer file sharing networks transition from intellectual curiosity to societal reality, their long-term viability is seriously threatened by cheaters. A cheater either consumes resources without producing them (a freeloader), or advertises valuable content, but ultimately delivers that which is useless (a spoofer). In both cases, the cheater realizes some benefit from his actions without having to pay a commensurate cost. Because these networks are anonymous, the traditional accountability mechanisms developed for classic distributed systems do not apply. In this paper we present a protocol that dramatically reduces and in many cases eliminates the benefit gained by cheaters in anonymous peer-to-peer file sharing networks. Our protocol is based on the notion of exchange: instead of allowing users to unidirectionally download content, in order to acquire a file, a user must simultaneously provide a file to somebody else. We organize users into “exchange groups,” in which each user provides one file in order to acquire one file, with the aggregate exchange satisfying all participants. Through exposition we show that our composite protocol works well in theory, eliminating the incentive to freeload and forcing spoofers to spend resources commensurate with the damage they cause. Through tracedriven simulation, we show that it works well in practice, resulting in a system in which users can acquire the content they want with reasonable delay.
منابع مشابه
Anonymous Identity and Trust for Peer-to-Peer Networks
In this paper, we present a new way of establishing independently-verifiable identities, based on the notion of computationally expensive key generation. We then describe a fully decentralized framework where these identities can be used to assign blame and to construct auditable blacklists of cheaters.
متن کاملA Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory
The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملA Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory
The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...
متن کاملTEL-AVIV UNIVERSITY RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES SCHOOL OF COMPUTER SCIENCE Hide and Seek: Provable Anonymity in Computer Networks
Anonymous communication methods have been under heavy research in the last years. Specifically, with the advent of peer to peer networks, anonymity is grasped as a desired property of any well designed system for exchanging information between parties. Previous work dealing with anonymity and privacy is mostly application driven and intuitively based, paying more attention to implementation det...
متن کامل