DHT Network with Link Access Control Using a Social Network

Services on peer-to-peer (P2P) networks tend to be spread throughout the world. However, there are several problems with peer-to-peer networks, such as illegal file sharing or information leaks. These problems are caused by the ability to freely connect many anonymous nodes. The present paper proposes a method of access control applying a social network to a P2P network. We can achieve access control (for example, node A can connect to node B, which is friend of node A, but node A cannot connect to node C, which is friend of node B). We also propose dynamic movement of a node on the DHT circle in order to resolve the problem of increasing path length. This increase is caused by applying a social network to a P2P network. We implemented the proposed method on a pure P2P network using DHT with a circular network structure. In addition, we evaluated the proposed method using a newly developed software simulator. Finally, we demonstrated that expected access control is achieved and that the average number of connections is sufficiently small.

[1]  Gurmeet Singh Manku,et al.  Symphony: Distributed Hashing in a Small World , 2003, USENIX Symposium on Internet Technologies and Systems.

[2]  Hector Garcia-Molina,et al.  DHT Routing Using Social Links , 2004, IPTPS.

[3]  Jun Wang,et al.  TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.

[4]  S H Strogatz,et al.  Random graph models of social networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[5]  Li Xiaoming,et al.  Maze: a social peer-to-peer network , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[6]  Ben Y. Zhao,et al.  Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.

[7]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[8]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[9]  Indranil Gupta,et al.  Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut , 2005, ArXiv.

[10]  Julita Vassileva,et al.  TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.

[11]  J. Frankel,et al.  The gnutella protocol specification v0.4 document revision 1.2 , 2000 .