Authentication-free fault-tolerant peer-to-peer service provisioning

The correct functioning of a peer-to-peer network relies on cooperative behavior of peers as service providers. Current approaches to detection and deterrence of non-cooperative behavior, such as reputation systems, rely on (1) global sharing of observations about service provisioning and (2) global authentication. These two factors severely impair the practical applicability. We propose a novel forward feedback protocol that is completely local and authentication-free and where peers locally and independently learn to avoid non-cooperative peers and routing failures. We evaluate our system in a variety of failure scenarios. The convergence rates and failure resilience are close to those of a fully centralized reputation system. High churn is tolerated without significant drop in performance. For increased fault tolerance the system takes advantage of the service replicas existing in the network. The proposed protocol is lightweight and can readily be integrated into any architecture where service requests are recursively routed, which includes all modern structured overlays.

[1]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[2]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[3]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[4]  Lik Mui,et al.  A Computational Model of Trust and Reputation for E-businesses , 2002 .

[5]  Ronald L. Rivest,et al.  Learning decision lists , 2004, Machine Learning.

[6]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Vana Kalogeraki,et al.  Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.

[8]  Atul Singh,et al.  Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[9]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[10]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[11]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[12]  Andrew Twigg,et al.  Enforcing Collaboration in Peer-to-Peer Routing Services , 2003, iTrust.

[13]  Krishna P. Gummadi,et al.  King: estimating latency between arbitrary internet end hosts , 2002, IMW '02.

[14]  CastroMiguel,et al.  Secure routing for structured peer-to-peer overlay networks , 2002 .

[15]  Andrew Twigg,et al.  Trading in Trust, Tokens, and Stamps , 2003 .

[16]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[17]  Munindar P. Singh,et al.  Community-based service location , 2001, CACM.

[18]  Robert E. Schapire,et al.  Efficient distribution-free learning of probabilistic concepts , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.