Formation of Stable and Efficient Social Storage Cloud

In this paper, we study the formation of endogenous social storage cloud in a dynamic setting, where rational agents build their data backup connections strategically. We propose a degree-distance-based utility model, which is a combination of benefit and cost functions. The benefit function of an agent captures the expected benefit that the agent obtains by placing its data on others’ storage devices, given the prevailing data loss rate in the network. The cost function of an agent captures the cost that the agent incurs to maintain links in the network. With this utility function, we analyze what network is likely to evolve when agents themselves decide with whom they want to form links and with whom they do not. Further, we analyze which networks are pairwise stable and efficient. We show that for the proposed utility function, there always exists a pairwise stable network, which is also efficient. We show that all pairwise stable networks are efficient, and hence, the price of anarchy is the best that is possible. We also study the effect of link addition and deletion between a pair of agents on their, and others’, closeness and storage availability.

[1]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[2]  Martin G. Everett,et al.  A Graph-theoretic perspective on centrality , 2006, Soc. Networks.

[3]  Agnieszka Rusinowska,et al.  A Degree-Distance-Based Connections Model with Negative and Positive Externalities , 2013 .

[4]  Michael Burrows,et al.  A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.

[5]  Nagarajan Krishnamurthy,et al.  Stability, efficiency, and contentedness of social storage networks , 2016, Ann. Oper. Res..

[6]  S. Sarangi,et al.  A Survey of Player-based and Link-based Allocation Rules for Network Games , 2014 .

[7]  Adriana Iamnitchi,et al.  A Survey of Socially Aware Peer-to-Peer Systems , 2016, ACM Comput. Surv..

[8]  Lakshminarayanan Subramanian,et al.  Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.

[9]  T. D. Nguyen,et al.  BlockParty : Cooperative offsite backup among friends , 2007 .

[10]  Jiue-An Yang,et al.  Spatial Social Networks , 2017 .

[11]  Raúl Gracia Tinedo,et al.  FRIENDBOX: A cloudified F2F storage application , 2012, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P).

[12]  Brian D. Noble,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .

[13]  Matthew O. Jackson,et al.  On the Formation of Networks and Groups , 2003 .

[14]  A. Marini Marco Games of Coalition and Network Formation: A Survey , 2009 .

[15]  V. Latora,et al.  Harmony in the Small-World , 2000, cond-mat/0008357.

[16]  Adriana Iamnitchi,et al.  The power of indirect ties in friend-to-friend storage systems , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.

[17]  Eitan Altman,et al.  Nash Equilibria in Load Balancing in Distributed Computer Systems , 2002, IGTR.

[18]  Matthew O. Jackson,et al.  Centrality measures in networks , 2016, Social Choice and Welfare.

[19]  David K. Y. Yau,et al.  Cyber-Physical Correlation Effects in Defense Games for Large Discrete Infrastructures , 2018, Games.

[20]  Thayer Morrill Network formation under negative degree-based externalities , 2011, Int. J. Game Theory.

[21]  Peter B. Luh,et al.  Shapley Value-Based Payment Calculation for Energy Exchange between Micro- and Utility Grids , 2017, Games.

[22]  Berno Buechel,et al.  Network formation with closeness incentives , 2009 .

[23]  Gabrielle Demange,et al.  A Survey of Network Formation Models: Stability and Efficiency , 2005 .

[24]  Oskar Skibski,et al.  Axioms for Distance-Based Centralities , 2018, AAAI.

[25]  Raúl Gracia Tinedo,et al.  F2Box: Cloudifying F2F Storage Systems with High Availability Correlation , 2012, IEEE CLOUD.

[26]  M. Jackson,et al.  A Strategic Model of Social and Economic Networks , 1996 .

[27]  Sebastiano Vigna,et al.  Axioms for Centrality , 2013, Internet Math..

[28]  Kyle Chard,et al.  Social Cloud Computing: A Vision for Socially Motivated Resource Sharing , 2012, IEEE Transactions on Services Computing.

[29]  Kjell Hausken,et al.  Information Sharing Among Cyber Hackers in Successive Attacks , 2017, IGTR.

[30]  Joaquín Sánchez-Soriano,et al.  An Overview on Game Theory Applications to Engineering , 2013, IGTR.

[31]  Judith Timmer,et al.  Customer and Cost Sharing in a Jackson Network , 2018, IGTR.

[32]  John Skvoretz,et al.  Node centrality in weighted networks: Generalizing degree and shortest paths , 2010, Soc. Networks.

[33]  Sanjeev Goyal,et al.  A Noncooperative Model of Network Formation , 2000 .

[34]  Pietro Michiardi,et al.  An empirical study of availability in friend-to-friend storage systems , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[35]  Kian-Lee Tan,et al.  PeerStore: better performance by relaxing in peer-to-peer backup , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[36]  Stefan Schmid,et al.  Topological Implications of Selfish Neighbor Selection in Unstructured Peer-to-Peer Networks , 2011, Algorithmica.

[37]  Jinyang Li,et al.  Efficient cooperative backup with decentralized trust management , 2012, TOS.