Advertisement

Stability, efficiency, and contentedness of social storage networks

  • Pramod C. Mane
  • Kapil Ahuja
  • Nagarajan KrishnamurthyEmail author
S.I.: Game theory and optimization

Abstract

Social storage systems are a good alternative to existing data backup systems of local, centralized, and P2P backup. Till date, researchers have mostly focussed on either building such systems by using existing underlying social networks (exogenously built) or on studying quality of service related issues. In this paper, we look at two untouched aspects of social storage systems. One aspect involves modelling social storage as an endogenous social network, where agents themselves decide with whom they want to build data backup relation, which is more intuitive than exogenous social networks. The second aspect involves studying the stability of social storage systems, which would help reduce maintenance costs and further, help build efficient as well as contented networks. We have a four fold contribution that covers the above two aspects. We, first, model the social storage system as a strategic network formation game. We define the utility of each agent in the network under two different frameworks, one where the cost to add and maintain links is considered in the utility function and the other where budget constraints are considered. In the context of social storage and social cloud computing, these utility functions are the first of its kind, and we use them to define and analyse the social storage network game. Second, we propose the concept of bilateral stability which refines the pairwise stability concept defined by Jackson and Wolinsky (J Econ Theory 71(1):44–74, 1996), by requiring mutual consent for both addition and deletion of links, as compared to mutual consent just for link addition. Mutual consent for link deletion is especially important in the social storage setting. The notion of bilateral stability subsumes the bilateral equilibrium definition of Goyal and Vega-Redondo (J Econ Theory 137(1):460–492, 2007). Third, we prove necessary and the sufficient conditions for bilateral stability of social storage networks. For symmetric social storage networks, we prove that there exists a unique neighborhood size, independent of the number of agents (for all non-trivial cases), where no pair of agents has any incentive to increase or decrease their neighborhood size. We call this neighborhood size as the stability point. Fourth, given the number of agents and other parameters, we discuss which bilaterally stable networks would evolve and also discuss which of these stable networks are efficient—that is, stable networks with maximum sum of utilities of all agents. We also discuss ways to build contented networks, where each agent achieves the maximum possible utility.

Keywords

Social storage Endogenous network formation Bilateral stability Pairwise stability F2F backup system Peer-to-peer system 

Notes

Acknowledgements

The authors would like to thank the anonymous referees and the editors of this volume for their valuable comments.

References

  1. Aumann, R. J., & Myerson, R. B. (1988). Endogenous formation of links between players and of coalitions: an application of the Shapley value. In A. E. Roth (Ed.), The Shapley value (pp. 175–192). Cambridge University Press.Google Scholar
  2. Bala, V., & Goyal, S. (2000a). A noncooperative model of network formation. Econometrica, 68(5), 1181–1229.CrossRefGoogle Scholar
  3. Bala, V., & Goyal, S. (2000b). A strategic analysis of network reliability. Review of Economic Design, 5(3), 205–228.CrossRefGoogle Scholar
  4. Batten, C., Barr, K., Saraf, A., & Trepetin, S. (2002). pStore: A secure peer-to-peer backup system. Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science.Google Scholar
  5. Belleflamme, P., & Bloch, F. (2004). Market sharing agreements and collusive networks. International Economic Review, 45(2), 387–411.CrossRefGoogle Scholar
  6. Billand, P., Bravard, C., & Sarangi, S. (2011). Strict Nash networks and partner heterogeneity. International Journal of Game Theory, 40(3), 515–525.CrossRefGoogle Scholar
  7. Blackburn, X. Z. J., Kourtellis, N., Skvoretz, J., & Iamnitchi, A. (2014). The power of indirect ties in friend-to-friend storage systems. In 14th IEEE international conference on peer-to-peer computing (P2P’14) (pp. 1–5). London, UK: IEEE.Google Scholar
  8. Bloch, F., & Dutta, B. (2009). Communication networks with endogenous link strength. Games and Economic Behavior, 66(1), 39–56.CrossRefGoogle Scholar
  9. Bloch, F., & Jackson, M. O. (2007). The formation of networks with transfers among players. Journal of Economic Theory, 133(1), 83–110.CrossRefGoogle Scholar
  10. Borkotokey, S., Gogoi, L., & Sarangi, S. (2014). A survey of player-based and link-based allocation rules for network games. Studies in Microeconomics, 2(1), 5–26.CrossRefGoogle Scholar
  11. Bramoullé, Y., Djebbari, H., & Fortin, B. (2009). Identification of peer effects through social networks. Journal of Econometrics, 150(1), 41–55.CrossRefGoogle Scholar
  12. Bramoullé, Y., Kranton, R., & D’Amours, M. (2014). Strategic interaction and networks. American Economic Review, 104(3), 898–930.CrossRefGoogle Scholar
  13. Bramoullé, Y., López-Pintado, D., Goyal, S., & Vega-Redondo, F. (2004). Network formation and anti-coordination games. International Journal of Game Theory, 33(1), 1–19.CrossRefGoogle Scholar
  14. Buchegger, S., & Datta, A. (2009). A case for P2P infrastructure for social networks-opportunities & challenges. In Sixth international conference on wireless on-demand network systems and services (WONS’09) (pp. 161–168). Snowbird, UT, USA: IEEE.Google Scholar
  15. Buchegger, S., Schiöberg, D., Vu, L. H., & Datta, A. (2009). PeerSoN: P2P social networking: Early experiences and insights. In Proceedings of the second ACM Eurosys workshop on social network systems (SNS’09) (pp. 46–52). Nuremberg, Germany: ACM.Google Scholar
  16. Buechel, B., & Hellmann, T. (2012). Under-connected and over-connected networks: The role of externalities in strategic network formation. Review of Economic Design, 16(1), 71–87.CrossRefGoogle Scholar
  17. Calvó-Armengol, A. (2004). Job contact networks. Journal of Economic Theory, 115(1), 191–206.CrossRefGoogle Scholar
  18. Cox, L. P., Murray, C. D., & Noble, B. D. (2002). Pastiche: Making backup cheap and easy. SIGOPS-Operating Systems Review, 36(SI), 285–298.CrossRefGoogle Scholar
  19. Cox, L. P., & Noble, B. D. (2003). Samsara: Honor among thieves in peer-to-peer storage. SIGOPS-Operating Systems Review, 37(5), 120–132.CrossRefGoogle Scholar
  20. Dai, S. (2015). Networks of Institutions: Institutional Emergence, Social Structure and National Systems of Policies. Routledge: Taylor & Francis.Google Scholar
  21. Demaine, E. D., Hajiaghayi, M., Mahini, H., & Zadimoghaddam, M. (2012). The price of anarchy in network creation games. ACM Transactions on Algorithms, 8(2), 13:1–13:13.CrossRefGoogle Scholar
  22. Dutta, B., Ghosal, S., & Ray, D. (2005). Farsighted network formation. Journal of Economic Theory, 122(2), 143–1.CrossRefGoogle Scholar
  23. Dutta, B., & Jackson, M. O. (2003). On the formation of networks and groups. In B. Dutta & M. O. Jackson (Eds.), Networks and groups: Models of strategic formation (pp. 1–15). Berlin: Springer.CrossRefGoogle Scholar
  24. Dutta, B., & Mutuswami, S. (1997). Stable networks. Journal of Economic Theory, 76(2), 322–344.CrossRefGoogle Scholar
  25. Fabrikant, A., Luthra, A., Maneva, E., Papadimitriou, C. H., & Shenker, S. (2003). On a network creation game. In Proceedings of the twenty-second annual symposium on principles of distributed computing (PODC’03) (pp. 347–351). Boston, Massachusetts: ACM.Google Scholar
  26. Falk, A., & Kosfeld, M. (2012). It’s all about connections: Evidence on network formation. Review of Network Economics,.  https://doi.org/10.1515/1446-9022.1402.CrossRefGoogle Scholar
  27. Flåm, S. D., & Horvath, C. (1996). Network games; adaptations to Nash-Cournot equilibrium. Annals of Operations Research, 64(1), 179–195.CrossRefGoogle Scholar
  28. Furusawa, T., & Konishi, H. (2007). Free trade networks. Journal of International Economics, 72(2), 310–335.CrossRefGoogle Scholar
  29. Gilles, R. P., & Sarangi, S. (2010). Network formation under mutual consent and costly communication. Mathematical Social Sciences, 60(3), 181–185.CrossRefGoogle Scholar
  30. Goeree, J. K., Riedl, A., & Ule, A. (2009). In search of stars: Network formation among heterogeneous agents. Games and Economic Behavior, 67(2), 445–466.CrossRefGoogle Scholar
  31. Goyal, S. (2012). Social networks on the web. In M. Peitz & J. Waldfogel (Eds.), The Oxford handbook of the digital economy (pp. 434–459). Oxford: Oxford University Press.Google Scholar
  32. Goyal, S., & Joshi, S. (2003). Networks of collaboration in oligopoly. Games and Economic Behavior, 43(1), 57–85.CrossRefGoogle Scholar
  33. Goyal, S., & Joshi, S. (2006a). Bilateralism and free trade. International Economic Review, 47(3), 749–778.CrossRefGoogle Scholar
  34. Goyal, S., & Joshi, S. (2006b). Unequal connections. International Journal of Game Theory, 34(3), 319–349.CrossRefGoogle Scholar
  35. Goyal, S., & Moraga-González, J. L. (2001). R&D networks. The RAND Journal of Economics, 32(4), 686–707.CrossRefGoogle Scholar
  36. Goyal, S., & Vega-Redondo, F. (2007). Structural holes in social networks. Journal of Economic Theory, 137(1), 460–492.CrossRefGoogle Scholar
  37. Gracia-Tinedo, R., Artigas, M. S., & Garcia-López, P. (2012a). Analysis of data availability in F2F storage systems: When correlations matter. In 12th IEEE international conference on peer-to-peer computing (P2P’12) (pp. 225–236). Tarragona, Spain: IEEE.Google Scholar
  38. Gracia-Tinedo, R., Sánchez-Artigas, M., & Garcia-López, P. (2012b). F2box: Cloudifying F2F storage systems with high availability correlation. In 5th IEEE international conference on cloud computing (CLOUD’12) (pp. 123–130). Honolulu, HI, USA: IEEE.Google Scholar
  39. Gracia-Tinedo, R., Sánchez-Artigas, M., Moreno-Martínez, A., & Garcia-López, P. (2012c). Friendbox: A hybrid F2F personal storage application. In 5th IEEE international conference on cloud computing (CLOUD’12) (pp. 131–138). Honolulu, HI, USA: IEEE.Google Scholar
  40. Hall, P. (1935). On representatives of subsets. Journal of the London Mathematical Society, 10(1), 26–30.CrossRefGoogle Scholar
  41. Hummon, N. P. (2000). Utility and dynamic social networks. Social Networks, 22(3), 221–249.CrossRefGoogle Scholar
  42. Jackson, M. O. (2005). A survey of network formation models: Stability and efficiency. In G. Demange & M. Wooders (Eds.), Group formation in economics (pp. 11–57). Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  43. Jackson, M. O. (2008). Social and economic networks. Princeton: Princeton University Press.CrossRefGoogle Scholar
  44. Jackson, M. O., & van den Nouweland, A. (2005). Strongly stable networks. Games and Economic Behavior, 51(2), 420–444.CrossRefGoogle Scholar
  45. Jackson, M. O., & Wolinsky, A. (1996). A strategic model of social and economic networks. Journal of Economic Theory, 71(1), 44–74.CrossRefGoogle Scholar
  46. Jain, H., Teja, G., Mane, P., Ahuja, K., & Krishnamurthy, N. (2018). Data backup network formation with heterogeneous agents. In 10th international conference on communication systems & NETworkS (COMSNETS’18). Bengaluru, India: IEEE. arXiv preprint arXiv:1711.10283.
  47. Kuznetsov, P., & Schmid, S. (2010). Towards network games with social preferences. In B. Patt-Shamir & T. Ekim (Eds.), 17th International colloquium on structural information and communication complexity (SIROCCO’10) (pp. 14–28). Heidelberg: Springer.CrossRefGoogle Scholar
  48. Landers, M., Zhang, H., & Tan, K. L. (2004). PeerStore: Better performance by relaxing in peer-to-peer backup. In Fourth international conference on peer-to-peer computing (P2P’04) (pp. 72–79). Zurich, Switzerland: IEEE.Google Scholar
  49. Li, J., & Dabek, F. (2006). F2F: Reliable storage in open networks. In the 5th international workshop on peer-to-peer systems (IPTPS’06), Santa Barbara, CA, USA (pp. 1–6).Google Scholar
  50. Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., & Isard, M. (2003). A cooperative internet backup scheme. In Proceedings of the annual conference on USENIX annual technical conference (pp. 29–41). San Antonio, Texas, USA: USENIX Association.Google Scholar
  51. Meyer, J. (2010). Representing risk preferences in expected utility based decision models. Annals of Operations Research, 176(1), 179–190.CrossRefGoogle Scholar
  52. Moreno-Martínez, A., Gracia-Tinedo, R., Sánchez-Artigas, M., & Garcia-Lopez, P. (2012). Friendbox: A cloudified F2F storage application. In 12th IEEE international conference on peer-to-peer computing (P2P’12) (pp. 75–76). Tarragona, Spain: IEEE.Google Scholar
  53. Moscibroda, T., Schmid, S., & Wattenhofer, R. (2006). On the topologies formed by selfish peers. In Proceedings of the twenty-fifth annual ACM symposium on principles of distributed computing (PODC’06) (pp. 133–142). Denver, Colorado, USA: ACM.Google Scholar
  54. Moscibroda, T., Schmid, S., & Wattenhofer, R. (2011). Topological implications of selfish neighbor selection in unstructured peer-to-peer networks. Algorithmica, 61(2), 419–446.CrossRefGoogle Scholar
  55. Myerson, R. B. (1977). Graphs and cooperation in games. Mathematics of Operations Research, 2(3), 225–229.CrossRefGoogle Scholar
  56. Nguyen, T. D., & Li, J. (2007). Blockparty: Cooperative offsite backup among friends. In 4th USENIX symposium on networked systems design & implementation (poster paper). Cambridge, MA: USENIX Association.Google Scholar
  57. Oliveira, M. I. S., Cirne, W., Brasileiro, F., & Guerrero, D. (2008). On the impact of the data redundancy strategy on the recoverability of friend-to-friend backup systems. In 26th Brazilian symposium on computer networks and distributed systems (SBRC’08), Rio de Janeiro, Brazil (pp. 1–14).Google Scholar
  58. Papadimitriou, C. (2001). Algorithms, games, and the internet. In Proceedings of the thirty-third annual ACM symposium on theory of computing (STOC’01) (pp. 749–753). Hersonissos, Greece: ACM.Google Scholar
  59. Pratt, J. W. (1964). Risk aversion in the small and in the large. Econometrica, 32(1–2), 22–136.Google Scholar
  60. Rzadca, K., Datta, A., & Buchegger, S. (2010). Replica placement in P2P storage: Complexity and game theoretic analyses. In 30th IEEE International Conference on Distributed Computing Systems (pp. 599–609). Genova, Italy: IEEE.Google Scholar
  61. Rzadca, K., Datta, A., Kreitz, G., & Buchegger, S. (2015). Game-theoretic mechanisms to increase data availability in decentralized storage systems. ACM Transactions on Autonomous and Adaptive Systems, 10(3), 14:1–14:32.CrossRefGoogle Scholar
  62. Sharma, R., Datta, A., DeH’Amico, M., & Michiardi, P. (2011). An empirical study of availability in friend-to-friend storage systems. In IEEE international conference on peer-to-peer computing (P2P’11) (pp. 348–351). Kyoto, Japan: IEEE.Google Scholar
  63. Skorin-Kapov, D. (2017). Social enterprise tree network games. Annals of Operations Research,.  https://doi.org/10.1007/s10479-017-2460-0.CrossRefGoogle Scholar
  64. Steinmetz, R., & Wehrle, K. (2005). What is this “peer-to-peer” about? In R. Steinmetz & K. Wehrle (Eds.), Peer-to-peer systems and applications (pp. 9–16). Berlin: Springer.CrossRefGoogle Scholar
  65. Suijs, J., Borm, P., Hamers, H., Quant, M., & Koster, M. (2005). Communication and cooperation in public network situations. Annals of Operations Research, 137(1), 117–140.CrossRefGoogle Scholar
  66. Tennekes, M. (2010). Network formation games. PhD thesis, Maastricht University.Google Scholar
  67. Toka, L., & Michiardi, P. (2011). Analysis of user-driven peer selection in peer-to-peer backup and storage systems. Telecommunication Systems, 47(1), 49–63.CrossRefGoogle Scholar
  68. Tran, D. N., Chiang, F., & Li, J. (2008). Friendstore: cooperative online backup using trusted nodes. In Proceedings of the 1st workshop on social network systems (SocialNets’08) (pp. 37–42). Glasgow, Scotland: ACM.Google Scholar
  69. Tran, N., Chiang, F., & Li, J. (2012). Efficient cooperative backup with decentralized trust management. ACM Transactions on Storage, 8(3), 8:1–8:25.CrossRefGoogle Scholar
  70. Weatherspoon, H., & Kubiatowicz, J. D. (2002). Erasure coding vs. replication: A quantitative comparison. In P. Druschel, F. Kaashoek, & A. Rowstron (Eds.), Peer-to-peer systems (pp. 328–337). Berlin: Springer.CrossRefGoogle Scholar
  71. Zirulia, L. (2006). Industry profit maximizing R and D networks. Economics Bulletin, 12(1), 1–6.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Computer Science and EngineeringIndian Institute of Technology IndoreIndoreIndia
  2. 2.Operations Management and Quantitative TechniquesIndian Institute of Management IndoreIndoreIndia

Personalised recommendations