Abstract
With voluntary users participating in an autonomic manner, peer-to-peer (P2P) systems have been proliferating in an unprecedented pace. Indeed, it is widely known that P2P traffic now constitutes over 60% of total Internet traffic. P2P systems are now used for file sharing, media streaming, and various other social networking applications. Furthermore, P2P systems are also extending their reach to the wireless realm. However, there are still two major system aspects that pose challenges to P2P systems’ designers and users: incentives and security. First and foremost, a P2P system, by its nature, is viable only if users contribute their resources to the community. Obviously, uniform and global altruistic behaviors cannot be expected for all users.
Some users will definitely try to take advantage of the altruism of other participants. If such “free-riding” phenomenon is too wide spread, then a system collapse will result because the input to the P2P community is smaller than the output. Thus, it is important to incorporate effective incentive mechanisms to deter selfish behaviors and encourage active contributions. On the other hand, security related issues such as privacy, anonymity, and authentication are also beyond doubt critical concerns of the participating users. Essentially, users do not want to sacrifice security to trade for service. Clearly security issues and incentives are closely related in that a low security or “untrustworthy” P2P community will not attract a large population of contributing users, and instead, might even tempt malicious users to consider the system as a potential point of attacks.
In this chapter, we survey and analyze the current state-of-the-art in tackling the incentive and security issues in P2P systems. We first give a brief account of P2P applications and their wired and wireless operating environments. We then survey and critique existing incentive techniques. This is followed by the analysis of contemporary P2P security algorithms.
The techniques that we survey will range from traditional optimization algorithms to game theoretic schemes. We provide some of our thoughts on open research issues, followed by a conclusion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
BitComet, http://www.bitcomet.com/, 2008.
BitTorrent, http://www.bittorrent.com/, 2008.
eDonkey2000, http://www.edonkey2000.com/, 2005 (defunct).
eMule, http://www.emule-project.net/, 2008.
FreeNet, http://freenetproject.org/, 2008.
giFT Project, http://gift.sourceforge.net/, 2008.
Gnutella, http://gnutella.wego.com/, 2008.
GreenTea, http://www.greenteatech.com/, 2008.
HKCSL, http://one2free.hkcsl.com/eng/main/index.jsp, 2005.
iMesh, http://www.imesh.com/, 2008.
Joost, http://www.joost.com/, 2008.
KaZaA, http://www.kazaa.com/, 2008.
Limewire, http://www.limewire.org/, 2008.
Napster, http://www.napster.com/, 2002 (bankruptcy).
PPLive, http://www.pplive.com/, 2008.
Skype, http://www.skype.com/, 2008.
Slyck.com, http://www.slyck.com/news.php?story=574, 2005.
Tribler, http://www.tribler.org/, 2008.
Washington Times Online, http://www.washtimes.com/technology/20040303-094741-3574r.htm, 2005.
World of Warcraft, http://www.worldofwarcraft.com/, 2008.
WinMX, http://winmx.com/, 2005
K. G. Anagnostakis and M. B. Greenwald, “Exchange-BasedIncentive Mechanisms for Peer-to-Peer File Sharing,” Proc.24th Int’l Conference on Distributed Computing Systems, 2004.
S. Androutsellis-Theotokis and D. Spinellis, “ASurvey of Peer-to-Peer Content Distribution Technologies,” ACM Computing Surveys, vol. 36, no. 4, Dec. 2004, pp. 335–371.
J. U. Becker and M. Clement, “The Economic Rationale ofOffering Media Files in Peer-to-Peer Networks,” Proc. 37thHawaii Int’l Conference on System Sciences, 2004.
S. Capkun, J.-P. Hubaux, and L. Buttyan, “Mobility HelpsPeer-to-Peer Security,” IEEE Transactions on MobileComputing, vol. 5, no. 1, Jan. 2006, pp. 43–51.
D. Cerri, A. Ghioni, S. Paraboschi, and S. Tiraboschi, “IDMapping Attacks in P2P Networks,” Proc. IEEE GLOBECOM2005, pp. 1785–1790.
G. Chen and R. S. Gray, “Simulating Non-Scanning Worms onPeer-to-Peer Networks,” Proc. 1st ACM Int’l Conf. ScalableInformation Systems, May 2006.
N. Christin, A. S. Weigend, and J. Chuang, “ContentAvailability, Pollution and Poisoning in File SharingPeer-to-Peer Networks,” Proc. ACM EC 2005, June 2005, pp.68–77.
I. Clarke, O. Sandberg, B. Wiley, and T. Hong, “Freenet: ADistributed Anonymous Information Storage and Retrieval System,” Proc. Workshop on Design Issues in Anonymous andUnobservability, July 2000.
B. Cohen, “Incentives Build Robustness in BitTorrent,” Proc. Workshop on Economics of Peer-to-Peer Systems, June 2003.
A. B. Corman, S. Douglas, P. Schachte, and V. Teague, “A SecureEvent Agreement (SEA) Protocol for Peer-to-Peer Games,” Proc. 1st IEEE Int’l Conf. Availability, Reliability and Security(ARES 2006).
G. Danezis and R. Anderson, “The Economics of ResistingCensorship,” IEEE Security and Privacy, Jan./Feb. 2005,pp. 45–50.
S. Daswani and A. Fisk, GUESS Protocol Specification,http://groups.yahoo.com/group/the_gdf/files/Proposals/GUESS/guess_01.txt.
N. Daswani and H. Garcia-Molina, “Pong-Cache Poisoning inGUESS,” Proc. ACM CCS 2004, Oct. 2004, pp. 98–109.
M. Feldman, C. Papadimitriou, J. Chuang, and I.Stoica, “Free-Riding and Whitewashing in Peer-to-Peer Systems,” Proc. 2004 SIGCOMM Workshop on Practice and Theory ofIncentives in Networked Systems, Aug. 2004, pp. 228–235.
M. Feldman and J. Chuang, “Overcoming Free-Riding Behaviorin Peer-to-Peer Systems,” ACM SIGccom Exchanges, vol. 5,no. 4, July 2005, pp. 41–50.
M. Feldman, K. Lai, I. Stoica, and J. Chuang, “RobustIncentive Techniques for Peer-to-Peer Networks,” Proc. 5thACM conference on Electronic Commerce, pp. 102–111, May 2004.
A. Friedman, “Good Neighbors Can Make Good Fences: APeer-to-Peer User Security System,” IEEE Technology andSociety Magazine, Spring 2007, pp. 17–24.
C. GauthierDickey, D. Zappala, V. Lo, and J. Marr, “Low-LatencyCheat-Proof Event Ordering for Peer-to-Peer Games,” Proc.Int’l Workshop Network and Operating Systems Support for DigitalAudio and Video (NOSSDAV), June 2004.
I. Gupta, K. Birman, P. Linga, A. Demers, and R. Van Renesse,“Kelips: Building an Efficient and Stable P2P DHT ThroughIncreased Memory and Background Overhead,” Proc. 2nd Int’lWorkshop on Peer-to-Peer Systems (IPTPS), 2003, pp. 81–86.
R. Gupta and A. K. Somani, “A Pricing Strategy ForIncentivizing Selfish Nodes To Share Resources In Peer-to-Peer(P2P) Networks,” Proc. IEEE International Conference onNetworks, Nov. 2004.
D. Hausheer, N. C. Liebau, A. Mauthe, R.Steinmetz, and B. Stiller, “ Token Based Accounting andDistributed Pricing to Introduce Market Mechanisms in aPeer-to-Peer File Sharing Scenario,” Proc. ThirdInternational Conference on Peer-to-Peer Computing, 2003.
D. Hausheer and B. Stiller, “Decentralized Auction-basedPricing with PeerMart,” Proc. 9th IFIP/IEEE InternationalSymposium on Integrated Network Management, May 2005.
Z. Jia, S. Tiange, H. Liansheng, and D. Yiqi, “A NewMicropayment Protocol Based on P2P Networks,” Proc. 2005IEEE Int’l Conference on e-Business Engineering, 2005.
P. Kabus and A. P. Buchmann, “Design of a Cheat-Resistant P2POnline Gaming System,” Proc. ACM DIMEA 2007, pp. 113–120.
A. Kalafut, A. Acharya, and M. Gupta, “A Study of Malware inPeer-to-Peer Networks,” Proc. ACM IMC 2006, Oct. 2006, pp.327–332.
M. A. Konrath, M. P. Barcellos, and R. B. Mansilha, “Attacking aSwarm with a Band of Liars: Evaluating the Impact of Attacks onBitTorrent,” Proc. 7th IEEE Int’l Conf. Peer-to-PeerComputing, 2007, pp. 37–44.
R. Krishnana, M. D. Smith, and R. Telang, “TheEconomics of Peer-to-Peer Networks,” Journal of InformationTechnology Theory and Application, vol. 5, no. 3, pp. 31–44,2003.
R. Kumar, D. D. Yao, A. Bagchi, K. W. Ross, and D. Rubenstein,“Fluid Modeling of Pollution Proliferation in P2P Networks,” Proc. ACM SIGMetrics 2006, June 2006, pp. 335–346.
G. Lawton, “Is Peer-to-Peer Secure Enough for Corporate Use?” IEEE Computer, Jan. 2004, pp. 22–25.
P. Linga, I. Gupta, and K. Birman, “A Churn-ResistantPeer-to-Peer Web Caching System,” Proc. ACM SSRS 2003,Oct. 2003.
R. T. B. Ma, S. C. M. Lee, J. C. S. Lui, and D. K. Y.Yau, “A Game Theoretic Approach to Provide Incentive and ServiceDifferentiation in P2P Networks,” Proc. SIGMETRICS, June2004, pp. 189–198.
R. T. B. Ma, S. C. M. Lee, J. C. S. Lui, and D. K. Y.Yau, “An Incentive Mechanism for P2P Networks,” Proc. 24thInt’l Conference on Distributed Computing Systems, 2004.
P. Maymounkov and D. Mazieres, “Kademlia: A Peer-to-PeerInformation System Based on the XOR Metric,” Proc. 1stInt’l Workshop on Peer-to-Peer Systems (IPTPS 2002), pp. 53–65.
M. J. Osborne, An Introduction to Game Theory, OxfordUniversity Press, 2004.
V. Pai, K. Kumar, K. Tamilmani, V. Sambamurthy, and A. E. Mohr,“Chainsaw: Eliminating Trees from Overlay Multicast,” Proc. 4th Int’l Workshop on Peer-to-Peer Systems, pp.127–140, Feb. 2005.
D. Qiu and R. Srikant, “Modeling and Performance Analysis ofBitTorrent-Like Peer-to-Peer Networks,” Proc. SIGCOMM, pp.367–377, Sept. 2004.
K. Ranganathan, M. Ripeanu, A. Sarin and I. Foster,“To Share or not to Share: An Analysis of Incentives toContribute in Collaborative File-Sharing Environments,” Proc. Workshop on Economics of Peer-to-Peer systems, June 2003.
M. Roussopoulos, M. Baker, D. Rosenthal, T. J. Giuli, P.Maniatis, and J. Mogul, “2 P2P or Not 2 P2P?,” Proceedings of the Third International Workshop on Peer-to-PeerSystems (IPTPS ’04), Feb. 2004. La Jolla, CA.
A. Rowstron and P. Druschel, “Pastry: Scalable, distributedobject address and routing for large-scale peer-to-peer systems,” Proc. IFIP/ACM Int’l Conf. on Distributed Systems Platforms,Nov. 2001.
S. Sanghavi and B. Hajek, “A New Mechanism for theFree-Rider Problem,” Proc. SIGCOMM 2005 Workshop, Aug.2005.
T. C. Schelling, Micromotives and Macrobehavior, W. W.Norton & Company, 1978.
S. Shin, J. Jung, and H. Balakrishnan, “Malware Prevalence in theKaZaA File-Sharing Network,” Proc. ACM IMC 2006, Oct. 2006,pp. 333–338.
K. Sripanidkulchai, A. Ganjam, B. Maggs, and H. Zhang, “TheFeasibility of Supporting Large-Scale Live Streaming Applicationswith Dynamic Application End-Points,” Proc. SIGCOMM, vol.34, no. 4, pp. 107–120, Aug. 2004.
I. Stoica, R. Morris, D. Karger, M. Frans Kaashoek, andH. Balakrishnan, “Chord: A Scalable Peer-to-peer Lookup Servicefor Internet Applications,” Proc. ACM SIGCOMM 2001, Aug.2001, pp. 149–160.
Q. Sun and H. Garcia-Molina, “SLIC: A Selfish Link-basedIncentive Mechanism for Unstructured Peer-to-Peer Networks,” Proc. 24th Int’l Conference on Distributed Computing Systems,2004.
J. Van Der Werwe, D. Dawoud, and S. McDonald, “A Survey onPeer-to-Peer Key Management for Mobile Ad Hoc Networks,” ACM Computing Surveys, vol. 39, no. 1, Apr. 2007.
V. Venkataraman, P. Francisy, and J. Calandrino, “Chunkyspread:Multi-Tree Unstructured Peer-to-Peer Multicast,” Proc.5th Int’l Workshop on Peer-to-Peer Systems,Feb. 2006.
W. Wang and B. Li, “Market-driven Bandwidth Allocationin Selfish Overlay Networks,” Proc. IEEE INFOCOM 2005,Mar. 2005.
F. Wang, Y. Xiong, and J. Liu, “mTreebone: A Hybrid Tree/MeshOverlay for Application-Layer Live Video Multicast,” Proc.ICDCS,June 2007.
S. D. Webb and S. Soh, “Cheating in Networked Computer Games—AReview,” Proc. ACM DIMEA 2007, pp. 105–112.
J. D. Weisz, S. Kiesler, H. Zhang, Y. Ren, R. E. Kraut, and J. A.Konstan, “Watching Together: Integrating Text Chat with Video,” Proc. SIGCHI, pp. 877–886, Apr.–May 2007.
K. Wongrujira and A. Seneviratne, “Monetary Incentive withReputation for Virtual Market-Place Based P2P,” Proc.CoNEXT’05, Oct. 2005.
B. Yang and H. Garcia-Molina, “PPay: Micropayments forPeer-to-Peer Systems,” Proc. 10th ACM Conference onComputer and Communication Security, pp. 300–310, 2003.
W. Yu, S. Chellappan, X. Wang, and D. Xuan, “On DefendingPeer-to-Peer System-Based Active Worm Attacks,” Proc. IEEEGLOBECOM 2005, pp. 1757–1761.
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, “SybilGuard:Defending Against Sybil Attacks via Social Networks,” Proc.ACM SIGCOMM 2006, Sept. 2006, pp. 267–278.
X. Zhang, J. Liu, B. Lim, and T.-S. P. Yum,“CoolStreaming/DONet: A Data-Driven Overlay Network forPeer-to-Peer Live Media Streaming,” Proc. INFOCOM, vol. 3,pp. 2102–2111, Mar. 2005.
M. Zhang, Y. Xiong, Q. Zhang, and S. Yang, “Optimizing theThroughput of Data-Driven based Streaming in HeterogeneousOverlay Network,” Proc. 13th Int’l Multimedia ModelingConf., Jan. 2007.
M. Zhang, L. Zhao, Y. Tang, J.-G. Luo, and S.-Q. Yang,“Large-Scale Live Media Streaming over Peer-to-Peer Networksthrough Global Internet,” Proc. Workshop on Advances inPeer-to-Peer Multimedia Streaming, pp. 21–28, Nov. 2005.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Kwok, YK. (2009). Autonomic Peer-to-Peer Systems: Incentive and Security Issues. In: Zhang, Y., Yang, L., Denko, M. (eds) Autonomic Computing and Networking. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-89828-5_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-89828-5_9
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-89827-8
Online ISBN: 978-0-387-89828-5
eBook Packages: EngineeringEngineering (R0)