T-Chain: A General Incentive Scheme for Cooperative Computing

In this paper, we propose a simple, distributed, but highly efficient fairness-enforcing incentive mechanism for cooperative computing. The proposed incentive scheme, called Triangle Chaining (T-Chain), enforces reciprocity to minimize the exploitable aspects of other schemes that allow free-riding. In T-Chain, symmetric key cryptography provides the basis for a lightweight, almost-fair exchange protocol, which is coupled with a pay-it-forward mechanism. This combination increases the opportunity for multi-lateral exchanges and further maximizes the resource utilization of participants, each of whom is assumed to operate solely for his or her own benefit. T-Chain also provides barrier-free entry to newcomers with flexible resource allocation, providing them with immediate benefits, and therefore is suitable for dynamic environments with high churn (i.e., Turnover). TChain is distributed and simple to implement, as no trusted third party is required to monitor or enforce the scheme, nor is there any reliance on reputation information or tokens.

[1]  Xiaoming Hu,et al.  A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges , 2015, Peer Peer Netw. Appl..

[2]  Mustaque Ahamad,et al.  Incentives in BitTorrent induce free riding , 2005, P2PECON '05.

[3]  Johan Pouwelse,et al.  Give-to-Get: free-riding resilient video-on-demand in P2P systems , 2008, Electronic Imaging.

[4]  Venkata N. Padmanabhan,et al.  Analyzing and Improving a BitTorrent Networks Performance Mechanisms , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  Jeffrey K. MacKie-Mason,et al.  Why share in peer-to-peer networks? , 2008, ICEC.

[6]  Bobby Bhattacharjee,et al.  Bittorrent is an auction: analyzing and improving bittorrent's incentives , 2008, SIGCOMM '08.

[7]  Ahmed Amer,et al.  Accelerated chaining: a better way to harness peer power in video-on-demand applications , 2011, SAC '11.

[8]  Thomas E. Anderson,et al.  One Hop Reputations for Peer to Peer File Sharing Workloads , 2008, NSDI.

[9]  G. Hardin,et al.  The Tragedy of the Commons , 1968, Green Planet Blues.

[10]  Arun Venkataramani,et al.  Do incentives build robustness in bit torrent , 2007 .

[11]  Ramayya Krishnan,et al.  The Virtual Commons: Why Free-Riding Can Be Tolerated in File Sharing Networks , 2002, ICIS.

[12]  Miguel Rio,et al.  A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks , 2009, IEEE INFOCOM 2009.

[13]  Richard T. B. Ma,et al.  Distributed Caching via Rewarding: An Incentive Scheme Design in P2P-VoD Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.

[14]  Injong Rhee,et al.  Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[15]  Michael Sirivianos,et al.  Free-riding in BitTorrent Networks with the Large View Exploit , 2007, IPTPS.

[16]  Michal Feldman,et al.  Overcoming free-riding behavior in peer-to-peer systems , 2005, SECO.

[17]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[18]  Bin Fan,et al.  The design trade-offs of BitTorrent-like file sharing protocols , 2009, TNET.

[19]  Anne-Marie Kermarrec,et al.  Tracking freeriders in gossip-based content dissemination systems , 2014, Comput. Networks.

[20]  Stefan Schmid,et al.  Free Riding in BitTorrent is Cheap , 2006, HotNets.

[21]  Jason Nieh,et al.  FairTorrent: bringing fairness to peer-to-peer systems , 2009, CoNEXT '09.

[22]  Richard T. B. Ma,et al.  On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation , 2013, Comput. Networks.

[23]  Yongdong Wu,et al.  Incentive Mechanism Design for Heterogeneous Peer-to-Peer Networks: A Stackelberg Game Approach , 2014, IEEE Transactions on Mobile Computing.

[24]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[25]  Michael Sirivianos,et al.  Dandelion: Cooperative Content Distribution with Robust Incentives , 2007, USENIX Annual Technical Conference.

[26]  Indrajit Ray,et al.  An anonymous and failure resilient fair-exchange e-commerce protocol , 2005, Decis. Support Syst..

[27]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.