Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
نویسندگان
چکیده
In this paper, a novel protocol for providing both client and server anonymity in peer-to-peer (P2P) based grids is presented. The protocol assumes individual nodes or users to be utility maximizing agents, and relies on an auction mechanism for trading of resources among them. The resources here can refer to data files, storage capacity, or computation power (i.e., CPU cycles) etc. The protocol is inherently anonymous, light-weight, and incentive-compatible. Incentive compatibility implies that the protocol takes into account the selfishness of users; as would be seen the utilities of users are maximized by truthfully following the protocol steps. Moreover, if the protocol is truthfully followed by the users, anonymity to both the clients and servers of all the transactions are guaranteed. Furthermore, unlike other schemes, the proposed protocol does not rely on any trusted centralized entity or require specialized encryptions to be performed by the users. Thus, the protocol incurs very low overhead on the system and is light-weight. In brief, the proposed protocol provides efficient and natural means to provide anonymity in P2P based grids, and is easily deployable in a large un-trusted Internet-scale setting. Index Terms Anonymity, peer-to-peer, selfishness, incentives
منابع مشابه
Formal Notions of Anonymity for Peer-to-peer Networks
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potential privacy attacks (e.g., network address traceback) may deter a storage source from providing the needed data. In this paper we use this practical application scenario to verify our observation that network-based anonymity can be modeled as a complexity based cryptographic problem. We show that, ...
متن کاملExplaining the characteristics of peer-to-peer learning: A qualitative study
Explaining the characteristics of peer-to-peer learning: A qualitative study Introduction: Learning through peers is an educational method. Explaining the characteristics of learning with the help of peers has not been done in a study, so the purpose of this study was to explain the characteristics of learning with the help of peers. Materials and Methods: This qualitative study was perfo...
متن کاملResponder Anonymity and Anonymous Peer-to-Peer File Sharing
Data transfer over TCP/IP provides no privacy for network users. Previous research in anonymity has focused on the provision of initiator anonymity. We explore methods of adapting existing initiator-anonymous protocols to provide responder anonymity and mutual anonymity. We present Anonymous Peer-to-peer File Sharing (APFS) protocols, which provide mutual anonymity for peer-to-peer file sharing...
متن کاملIncentives for Cooperation in Anonymity Systems
Like many peer-to-peer applications, anonymous communication systems are vulnerable to freeriders, peers who use the system while providing little or no service to others. To complicate matters, the identity of the free-rider is obscured by the very service anonymity systems are designed to provide, which limits the efficacy of conventional approaches for promoting cooperation (e.g., reputation...
متن کاملThe Sociological Effects of Peer/ Teacher Technology-Enhanced Scaffolding through Process Approach on Young Male vs. Female EFL Learners’ Vocabulary Knowledge
Gender is considered a sociological construct and investigating the role of gender in foreign language learning contexts is highly important due to the effects of sociological factors in learning. Therefore, the present study set out to explore the sociological effects of peer and teacher scaffolding through the process approach in a technology-enhanced environment on the vocabulary learning of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Multiagent and Grid Systems
دوره 2 شماره
صفحات -
تاریخ انتشار 2006