Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol

The goal of this paper is to present a formal framework specially defined for the analysis of cooperative behavior in self-organizing multi-party security protocols. To illustrate the formalism, we formally analyze a multi-party peer to peer (MP-P2P) content authentication protocol which ensures content integrity in a decentralized P2P file sharing system. Our approach, based on Game Theory, will serve to formally analyze and verify cooperation among a variable number of selfish and untrustworthy participant peers.

[1]  Yi Mu,et al.  Emerging Directions in Embedded and Ubiquitous Computing , 2006 .

[2]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[3]  Li Lin,et al.  Balancing Trust and Incentive in Peer-to-Peer Collaborative System , 2007, Int. J. Netw. Secur..

[4]  Xin Yao,et al.  Evolving cooperation in the non-iterated prisoner’s dilemma: A social network inspired approach , 2007, 2007 IEEE Congress on Evolutionary Computation.

[5]  Jason Schlessman,et al.  Design and Verification of Communication Protocols for Peer-to-Peer Multimedia Systems , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[6]  Juan E. Tapiador,et al.  Certificate-based Access Control in Pure P2P Networks , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).

[7]  Divyakant Agrawal,et al.  A game theoretic framework for incentives in P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[8]  Zahir Tari,et al.  On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II , 2007, OTM Conferences.

[9]  Arun K. Somani,et al.  Game theory as a tool to strategize as well as predict nodes' behavior in peer-to-peer networks , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[10]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[11]  Esther Palomar González Content authentication and access control in pure peer-to-peer networks , 2008 .

[12]  Nazareno Andrade,et al.  Influences on cooperation in BitTorrent communities , 2005, P2PECON '05.

[13]  Juan E. Tapiador,et al.  Secure content access and replication in pure P2P networks , 2008, Comput. Commun..

[14]  Sven Schneider,et al.  Towards the Application of Process Calculi in the Domain of Peer-to-Peer Algorithms , 2008, SJTU-TUB Joint Workshop.

[15]  Jiujun Cheng,et al.  A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks , 2006, EUC Workshops.

[16]  Juan E. Tapiador,et al.  Bayesian Analysis of Secure P2P Sharing Protocols , 2007, OTM Conferences.

[17]  Franco Zambonelli,et al.  Spray computers: Explorations in self-organization , 2005, Pervasive Mob. Comput..