Autonomic Peer-to-Peer Systems: Incentive and Security Issues

With voluntary users participating in an autonomic manner, peer-to-peer (P2P) systems have been proliferating in an unprecedented pace. Indeed, it is widely known that P2P traffic now constitutes over 60% of total Internet traffic. P2P systems are now used for file sharing, media streaming, and various other social networking applications. Furthermore, P2P systems are also extending their reach to the wireless realm. However, there are still two major system aspects that pose challenges to P2P systems’ designers and users: incentives and security. First and foremost, a P2P system, by its nature, is viable only if users contribute their resources to the community. Obviously, uniform and global altruistic behaviors cannot be expected for all users.

[1]  Mary Baker,et al.  2 P2P or Not 2 P2P? , 2003, IPTPS.

[2]  Xun Wang,et al.  On defending peer-to-peer system-based active worm attacks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[3]  Kostas G. Anagnostakis,et al.  Exchange-based incentive mechanisms for peer-to-peer file sharing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[4]  Christos H. Papadimitriou,et al.  Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.

[5]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[6]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[7]  Jan U. Becker,et al.  The economic rationale of offering media files in peer-to-peer networks , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[8]  David Hausheer,et al.  Token-based accounting and distributed pricing to introduce market mechanisms in a peer-to-peer file sharing scenario , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[9]  Bruce E. Hajek,et al.  A New Mechanism for the Free-Rider Problem , 2008, IEEE Trans. Autom. Control..

[10]  Alejandro P. Buchmann,et al.  Design of a cheat-resistant P2P online gaming system , 2007, DIMEA.

[11]  David Hausheer,et al.  Decentralized auction-based pricing with PeerMart , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..

[12]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[13]  Srdjan Capkun,et al.  Mobility helps peer-to-peer security , 2006, IEEE Transactions on Mobile Computing.

[14]  George Lawton Is peer-to-peer secure enough for corporate use? , 2004, Computer.

[15]  Marinho P. Barcellos,et al.  Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).

[16]  Bo Li,et al.  CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[17]  George Danezis,et al.  Economics of Information Security , 2005 .

[18]  Yiqi Dai,et al.  A new micro-payment protocol based on P2P networks , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).

[19]  Daniel Zappala,et al.  Low latency and cheat-proof event ordering for peer-to-peer games , 2004, NOSSDAV '04.

[20]  Vinay S. Pai,et al.  Chainsaw: Eliminating Trees from Overlay Multicast , 2005, IPTPS.

[21]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[22]  Minaxi Gupta,et al.  A study of malware in peer-to-peer networks , 2006, IMC '06.

[23]  Arun K. Somani,et al.  Pricing strategy for incentivizing selfish nodes to share resources in peer-to-peer (P2P) networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[24]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[25]  Hector Garcia-Molina,et al.  SLIC: a selfish link-based incentive mechanism for unstructured peer-to-peer networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[26]  Rahul Telang,et al.  The Economics of Peer-to-Peer Networks , 2003 .

[27]  David K. Y. Yau,et al.  An incentive mechanism for P2P networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[28]  Hector Garcia-Molina,et al.  Pong-cache poisoning in GUESS , 2004, CCS '04.

[29]  Robert E. Kraut,et al.  Watching together: integrating text chat with video , 2007, CHI.

[30]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[31]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[32]  Rayadurgam Srikant,et al.  Modeling and performance analysis of BitTorrent-like peer-to-peer networks , 2004, SIGCOMM 2004.

[33]  Meng Zhang,et al.  Large-scale live media streaming over peer-to-peer networks through global internet , 2005, P2PMMS'05.

[34]  Bruce M. Maggs,et al.  The feasibility of supporting large-scale live streaming applications with dynamic application end-points , 2004, SIGCOMM.

[35]  Hector Garcia-Molina,et al.  PPay: micropayments for peer-to-peer systems , 2003, CCS '03.

[36]  Indranil Gupta,et al.  A churn-resistant peer-to-peer web caching system , 2003, SSRS '03.

[37]  Aruna Seneviratne,et al.  Monetary incentive with reputation for virtual market-place based P2P , 2005, CoNEXT '05.

[38]  Vanessa Teague,et al.  A Secure Event Agreement (SEA) protocol for peer-to-peer games , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[39]  Sieteng Soh,et al.  Cheating in networked computer games: a review , 2007, DIMEA.

[40]  Qian Zhang,et al.  Optimizing the Throughput of Data-Driven Based Streaming in Heterogeneous Overlay Network , 2007, MMM.

[41]  Indranil Gupta,et al.  Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead , 2003, IPTPS.

[42]  Hari Balakrishnan,et al.  Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.

[43]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[44]  W. Wang,et al.  Market-driven bandwidth allocation in selfish overlay networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[45]  Nicolas Christin,et al.  Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.

[46]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[47]  Guanling Chen,et al.  Simulating non-scanning worms on peer-to-peer networks , 2006, InfoScale '06.

[48]  I. Foster,et al.  ‘To Share or not to Share’ An Analysis of Incentives to Contribute in Collaborative File Sharing Environments , 2003 .

[49]  Michal Feldman,et al.  Overcoming free-riding behavior in peer-to-peer systems , 2005, SECO.

[50]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[51]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[52]  Paul Francis,et al.  Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[53]  Stefano Paraboschi,et al.  ID mapping attacks in P2P networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[54]  Rakesh Kumar,et al.  Fluid modeling of pollution proliferation in P2P networks , 2006, SIGMETRICS '06/Performance '06.

[55]  Allan Friedman,et al.  Good neighbors can make good fences: a peer-to-peer user security system , 2007, IEEE Technology and Society Magazine.

[56]  David K. Y. Yau,et al.  A game theoretic approach to provide incentive and service differentiation in P2P networks , 2004, SIGMETRICS '04/Performance '04.

[57]  T B MaRichard,et al.  A game theoretic approach to provide incentive and service differentiation in P2P networks , 2004 .

[58]  Paul Francis,et al.  Chunkyspread: Multi-tree Unstructured Peer-to-Peer Multicast , 2006, IPTPS.

[59]  Martin J. Osborne,et al.  An Introduction to Game Theory , 2003 .

[60]  Feng Wang,et al.  mTreebone: A Hybrid Tree/Mesh Overlay for Application-Layer Live Video Multicast , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).