1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.

Slides:



Advertisements
Similar presentations
Grand Challenges in Networking Nick Feamster CS 7001.
Advertisements

Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
On the Economics of P2P Systems Speaker Coby Fernandess.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Can ISPs and P2P Users Cooperate for Improved Performance? Vinay Aggarwal, Anja Feldmann (German Telecom Laboratories) Christian Scheideler (TU, Munchen)
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Peer-to-Peer Computing
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
CS 268: Future Internet Architectures Ion Stoica May 6, 2003.
MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Introduction Widespread unstructured P2P network
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
P2P Architecture Case Study: Gnutella Network
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
Tussel in Cyberspace Based on Slides by I. Stoica.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
The Design of A Distributed Rating Scheme for Peer-to-peer Systems Debojyoti Dutta 1, Ashish Goel 2, Ramesh Govindan 1, Hui Zhang 1 1 University of Southern.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Cascading Payment Content Exchange (CasPaCE) Framework for P2P Networks Gurleen Arora Supervisors: Dr. M. Hanneghan & Prof. M. Merabti Networked Appliances.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Computer Science and Engineering 1 Mobile Computing and Security.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Peer-to-Peer Information Systems Week 13: Trust Old Dominion University Department of Computer Science CS 495/595 Fall 2003 Michael L. Nelson 11/17/03.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation Presented by Dr. Ying Lu.
The Cryptoeconomic Way
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Peer-to-Peer Information Systems Week 6: Performance
CT 1306 Communication Networks Management Lab
SPINE: Surveillance protection in the network Elements
Presentation transcript:

1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro

2 Grand challenge Design economic mechanisms to provide incentives for increasing utility of network  Internet  ad hoc  overlays

3 Overlays  why?  to deploy new services/applications  to fine tune network for applications  instantiations  CDN  p2p  challenge  incentives for users to join and contribute services (freerider problem)  incentives for peering

4 Freerider problem  widely observed phenomenon  file sharing [e.g. Adar & Huberman Gnutella measuremets] Why should users participate – except when they need service?  solutions  reputations need reputation to get service providing reliable service yields reputation  payments need tokens to get service providing services yields tokens

5 G Anonymity problem  anonymity property  set of peers G  message initiator I  message from I appears to be from anyone in G  p2p implementation  message routed along random path through G  source routing vs. randomized forwarding  response routed along reverse path I

6 Onion routing  source based routing  packet encrypted by source in layers (onion)  each layer encrypted with public key of next node  encryption layer removed at each hop  install connection state in each hop  reverse path for responses

7 Onion routing example I C B D A R initiator recipient peer G Path = {C,B,D,C,R}

8 Pricing and anonymity  reputation mechanism  must know peer identities  won’t work for anonymity  pay to initiate messages  ante up at join  forward messages to earn money  payments in electronic cash to preserve anonymity  modified onion-routing protocol to control... who gets paid when they get paid how much they get paid

9 Payment system example NM peer... Bank

10 Research challenges  analysis  model?  equilibrium price?  sensitivity to user desires?  other anonymity protocols  crowds  approach tied to the “real” economy  simplifies bootstrapping (cash from outside)  alternate markets?

11 Research challenges  how to generate trust  central bank  can trust be distributed?  reputation-based solutions?  relationship to payment-based solutions?  hybrids? to deal with malicious users  other p2p apps?  ad hoc networks?  other networking applications

12 D.R. Figueiredo, J. Shapiro, D. Towsley "Incentives for Cooperation in Anonymity Systems" ftp://gaia.cs.umass.edu/Anon_Incentive_03. pdf

13 Payment System  use onion to embed payment  source inserts encrypted payment for each hop in path  node must forward message to get payment  key for payment is visible only to next hop  node cashes payment before forwarding response  ensure valid payment  off-line protocol can defer validation

14 Electronic cash  electronic cash  supports untraceable transactions  payer identity hidden from everyone  can prevent double payment  use onion to embed payment  source inserts encrypted payment for each hop  node must forward message to get payment  node cashes payment before forwarding response