Free-riding and whitewashing in peer-to-peer systems

We devise a model to study the phenomenon of free-riding and free-identities in peer-to-peer systems. At the heart of our model is a user of a certain type, an intrinsic and private parameter that reflects the user's willingness to contribute resources to the system. A user decides whether to contribute or free-ride based on how the current contribution cost in the system compares to her type. We study the impact of mechanisms that exclude low type users or, more realistically, penalize free-riders with degraded service. We also consider dynamic scenarios with arrivals and departures of users, and with whitewashers -users who leave the system and rejoin with new identities to avoid reputational penalties. We find that imposing penalty on all users that join the system is effective under many scenarios. In particular, system performance degrades significantly only when the turnover rate among users is high. Finally, we show that the optimal exclusion or penalty level differs significantly from the level that optimizes the performance of contributors only for a limited range of societal generosity levels.

[1]  J. Andreoni Giving with Impure Altruism: Applications to Charity and Ricardian Equivalence , 1989, Journal of Political Economy.

[2]  Colin Camerer Behavioral Game Theory , 1990 .

[3]  J. Andreoni IMPURE ALTRUISM AND DONATIONS TO PUBLIC GOODS: A THEORY OF WARM-GLOW GIVING* , 1990 .

[4]  M. Nowak,et al.  Evolution of indirect reciprocity by image scoring , 1998, Nature.

[5]  Li Fan,et al.  Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[6]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[7]  Stefan Saroiu,et al.  A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .

[8]  Kevin Leyton-Brown,et al.  Incentives for sharing in peer-to-peer networks , 2001, EC '01.

[9]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[10]  Krishna P. Gummadi,et al.  An analysis of Internet content delivery systems , 2002, OPSR.

[11]  Ramayya Krishnan,et al.  An Empirical Analysis of Network Externalities in Peer-to-Peer Music Sharing Networks , 2003, ICIS.

[12]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[13]  Divyakant Agrawal,et al.  A game theoretic framework for incentives in P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[14]  Silvia Giordano,et al.  Modelling cooperation in mobile ad hoc networks: a formal description of selfishness , 2003 .

[15]  Pietro Michiardi,et al.  A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks , 2003 .

[16]  Miguel Castro,et al.  Security for Structured Peer-to-peer Overlay Networks , 2004 .

[17]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[18]  Jon Crowcroft,et al.  Modelling incentives for collaboration in mobile ad hoc networks , 2004, Perform. Evaluation.