Protecting online information sharing in peer-to-peer (P2P) networks: A proposal for a P2P network security pricing model

Purpose – The purpose of this paper is to present a P2P network security pricing model that promotes more secure online information sharing in P2P networks through the creation of networks with increased resistance to malicious code propagation. Online information sharing is at an all‐time high partly due to the recent growth in, and use of, online peer‐to‐peer (P2P) networks.Design/methodology/approach – The model integrates current research findings in incentive compatible network pricing with recent developments in complex network theory. File download prices in P2P networks are linked to network security using a graph theory measurement called the Pearson coefficient. The Pearson coefficient indicates a structural dimension of scale‐free networks (scale‐free networks like the internet) called preferential attachment. Preferential attachment refers to the network property where the probability for a node to connect to a new node is greater if the new node already has a high number of connections.Findin...

[1]  Nick Gehrke,et al.  Inside Peer-to-Peer - Some Theory and an Empirical Analysis of a File Sharing Network , 2004, AMCIS.

[2]  Béla Bollobás,et al.  Random Graphs , 1985 .

[3]  Albert-László Barabási,et al.  Linked - how everything is connected to everything else and what it means for business, science, and everyday life , 2003 .

[4]  Duncan J. Watts,et al.  Six Degrees: The Science of a Connected Age , 2003 .

[5]  Jeffrey K. MacKie-Mason,et al.  Pricing the Internet , 1995 .

[6]  Bruce Schneier,et al.  Beyond fear - thinking sensibly about security in an uncertain world , 2003 .

[7]  Jon Crowcroft,et al.  Congestion Pricing: Paying Your Way in Communication Networks , 2001, IEEE Internet Comput..

[8]  Andrew B. Whinston,et al.  Benefits and Costs of Adopting Usage-Based Pricing in a Subnetwork , 2001, Inf. Technol. Manag..

[9]  S. Low,et al.  The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[10]  Jie Wu,et al.  Small Worlds: The Dynamics of Networks between Order and Randomness , 2003 .

[11]  M E J Newman Assortative mixing in networks. , 2002, Physical review letters.

[12]  Andrew B. Whinston,et al.  The economics of network management , 1999, CACM.

[13]  Deborah Estrin,et al.  Pricing in computer networks: motivation, formulation, and example , 1993, TNET.

[14]  M. Newman,et al.  The structure of scientific collaboration networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.

[15]  Detlef Schoder,et al.  Peer-to-peer prospects , 2003, CACM.

[16]  Walter Willinger,et al.  The origin of power laws in Internet topologies revisited , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[17]  Andrew B. Whinston,et al.  Economic issues in electronic commerce , 1997 .

[18]  F. Chung,et al.  Complex Graphs and Networks , 2006 .

[19]  Richard Taylor,et al.  Networking in the New Millennium: Business Applications for Peer-to-Peer and Grid Computing , 2004, AMCIS.

[20]  J. Spencer,et al.  Beyond File Sharing–Commerce in Peer-to-Peer Networks: Surveying the Landscape , 2006 .

[21]  Carl S. Young,et al.  Infection dynamics on the Internet , 2005, Comput. Secur..

[22]  Michalis Faloutsos,et al.  Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[23]  Alessandro Vespignani,et al.  Epidemics and immunization in scale‐free networks , 2002, cond-mat/0205260.

[24]  Philip E. Agre,et al.  P2P and the promise of internet equality , 2003, CACM.