Enforce Cooperative Resource Sharing in Untrusted Peer-to-Peer Computing Environment
نویسندگان
چکیده
Peer-to-Peer (P2P) computing is widely recognized as a promising paradigm for building next generation distributed applications, ranging from large scale scientific applications to mobile ad hoc information sharing, by federating dispersed pools of geographically distributed resources under loosely coordinated control. However, the autonomous, heterogeneous, and decentralized nature of participating peers across multiple administrative domain introduces the challenge for resource sharing in such an environment: how to make the peers profitable in the decentralized resource sharing under the untrusted P2P environment. To address the problem, in this paper we present a self-policing and distributed approach by combining two models: PET, a PEsonalize Trust model, and M-CUBE, a multiple-currency based economic model, to lay a foundation for resource sharing in an untrusted P2P computing environment. PET is a flexible trust model that can adapt to different requirements, and provides the solid support for the currency management in M-CUBE. With the help of the trust management and the merits of the economics, M-CUBE provides a novel self-policing and quality-aware framework for the sharing of multiple resources, including homogenous and heterogeneous resources. We evaluate the efficacy and performance of this approach in the context of a real application, a peerto-peer Web server sharing. Our results show that our approach is flexible enough to adapt to different situations and effective to make the system profitable, especially for the system with large scale.
منابع مشابه
Enforcing Cooperative Resource Sharing in Untrusted P2P Computing Environments
Peer-to-Peer (P2P) computing is widely recognized as a promising paradigm for building next generation distributed applications. However, the autonomous, heterogeneous, and decentralized nature of participating peers introduces the following challenge for resource sharing: how to make peers profitable in the untrusted P2P environment? To address the problem, we present a self-policing and distr...
متن کاملOn the Potential of Peer-to-Peer Computing
Popularized by Napster and Gnutella file sharing solutions, peer to peer (P2P) computing has suddenly emerged at the forefront of Internet computing. The basic notion of cooperative computing and resource sharing has been around for quite some time, although these new applications have opened up possibilities of very flexible web-based information sharing. This paper provides a framework for cl...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملCooperative Policy Control for Peer-to-Peer Data Distribution
Many network applications (such as swarming downloads, peer-to-peer video streaming and file sharing) are made possible by using large groups of peers to distribute and process data. Securing data in such a system requires not just data originators, but also those “distributors,” to enforce access control, verify integrity, or make other content-specific security decisions for the replicated or...
متن کاملUnstructured peer-to-peer networks for sharing processor cycles
Motivated by the needs and success ofprojects such as SETI@llOme and genome@home, we propose an architecturefor a sustainable large-scale peer-to-peer environment for distributed cycle sharing among Internet hosts. Such networks are characterized by highly dynamic state due to high arrival and departure rates. This makes it difficult to build and maintain structured networks and to use statebas...
متن کامل