Avoiding Whitewashing in Unstructured Peer-to-Peer Resource Sharing Network

In peer-to-peer file sharing network, it is hard to distinguish between a legitimate newcomer and a whitewasher. This makes whitewashing a big problem in peer-to-peer networks. Although the problem of whitewashing can be solved using permanent identities, it may take away the right of anonymity for users. In this paper, we a have proposed a novel algorithm to avoid this problem when network uses free temporary identities. In this algorithm, the initial reputation is adjusted according to the level of whitewashing in the network.

[1]  Mihaela van der Schaar,et al.  Online Learning in BitTorrent Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[2]  P. Morris Introduction to Game Theory , 1994 .

[4]  Ion Stoica,et al.  Incentives for Cooperation in Peer-to-Peer Networks , 2003 .

[5]  Béla Bollobás,et al.  The degree sequence of a scale‐free random graph process , 2001, Random Struct. Algorithms.

[6]  Miguel Castro,et al.  Security for Structured Peer-to-peer Overlay Networks , 2004 .

[7]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[8]  Maria Gradinariu Potop-Butucaru,et al.  Incentives for P2P Fair Resource Sharing , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[9]  Yatindra Nath Singh,et al.  Trust Estimation in Peer-to-Peer Network Using BLUE , 2013, ArXiv.

[10]  M. Osborne Introduction to Game Theory: International Edition , 2009 .

[11]  Geoff Coulson,et al.  Free Riding on Gnutella Revisited: The Bell Tolls? , 2005, IEEE Distributed Syst. Online.

[12]  Yatindra Nath Singh,et al.  Trust Estimation and Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm , 2012, ArXiv.

[13]  Stefan Saroiu,et al.  A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .

[14]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[15]  Jianguo Chen,et al.  A Solution for Whitewashing in P2P Systems Based on Observation Preorder , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[16]  Michal Feldman,et al.  The evolution of cooperation under cheap pseudonyms , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[17]  Christos H. Papadimitriou,et al.  Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.

[18]  Athman Bouguettaya,et al.  Reputation Bootstrapping for Trust Establishment among Web Services , 2009, IEEE Internet Computing.

[19]  Wen Dou,et al.  Trust based incentive in P2P network , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[20]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[21]  Hongcai Feng,et al.  A novel multi-level trust model to improve the security of P2P networks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[22]  Mao Yang,et al.  An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System , 2005, IPTPS.