A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges

BitTorrent swarms rely on reciprocative chunk exchanges among autonomously participating peers. It has been shown that BitTorrent native tit-for-tat mechanism cannot effectively discourage the peer strategic misbehavior such as free-riding and fake chunk attack. This paper proposes a hierarchical chunk cipher scheme based only on bits circular shifting manipulation. As such, encrypted chunks preserve a fraction of information entropy of original chunks that can be observed by the receiving peers directly, which is used for assuring authenticity of the encrypted chunks. Our hierarchical bits shifting scheme allows more flexibility on the fraction of information entropy exposed directly by the encrypted chunks, when compared to the single layer bits shifting scheme. Further, exact mathematical results between the hierarchical scheme and the single layer scheme are derived and analyzed in detail.

[1]  Kyuyong Shin Preventing misbehavior in cooperative distributed systems , 2009 .

[2]  Jian Wang,et al.  Resisting free-riding behavior in BitTorrent , 2010, Future Gener. Comput. Syst..

[3]  Injong Rhee,et al.  Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[4]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[5]  Johan A. Pouwelse,et al.  Verifiable Encryption for P2P Block Exchange , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).

[6]  Johan A. Pouwelse,et al.  Fast download but eternal seeding: The reward and punishment of Sharing Ratio Enforcement , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[7]  Maghsoud Abbaspour,et al.  Securing BitTorrent using a new reputation-based trust management system , 2012, Peer-to-Peer Networking and Applications.

[8]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[9]  Jeffrey S. Rosenschein,et al.  Adding incentives to file-sharing systems , 2009, AAMAS.

[10]  David Choffnes,et al.  On blind mice and the elephant , 2011, SIGCOMM 2011.

[11]  Miguel Rio,et al.  A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks , 2009, IEEE INFOCOM 2009.

[12]  Michael Sirivianos,et al.  Dandelion: Cooperative Content Distribution with Robust Incentives , 2007, USENIX Annual Technical Conference.

[13]  Bobby Bhattacharjee,et al.  Bittorrent is an auction: analyzing and improving bittorrent's incentives , 2008, SIGCOMM '08.