1 SLIC: A Selfish Link-based Incentive Mechanism for Unstructured P2P Networks Qixiang Sun Hector Garcia-Molina Stanford University.

Slides:



Advertisements
Similar presentations
Hadi Goudarzi and Massoud Pedram
Advertisements

Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Improving Search in Peer-to-Peer Networks Beverly Yang Hector Garcia-Molina Presented by Shreeram Sahasrabudhe
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Structuring Unstructured Peer-to-Peer Networks Stefan Schmid Roger Wattenhofer Distributed Computing Group HiPC 2007 Goa, India.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Routing indexes A. Crespo & H. Garcia-Molina ICDCS 02.
Expediting Searching Processes via Long Paths in P2P Systems 05/30 IDEA Lab.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Service Differentiated Peer Selection An Incentive Mechanism for Peer-to-Peer Media Streaming Ahsan Habib, Member, IEEE, and John Chuang, Member, IEEE.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
Hardware-based Load Generation for Testing Servers Lorenzo Orecchia Madhur Tulsiani CS 252 Spring 2006 Final Project Presentation May 1, 2006.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
1 Maximizing Remote Work in Flooding-based P2P Systems Qixiang Sun Neil Daswani Hector Garcia-Molina Stanford University.
Making Gnutella-like P2P Systems Scalable Presented by: Karthik Lakshminarayanan Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, and Scott.
Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
1 Characterizing Selfishly Constructed Overlay Routing Networks March 11, 2004 Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz University.
Searching in Unstructured Networks Joining Theory with P-P2P.
Peer-to-peer archival data trading Brian Cooper and Hector Garcia-Molina Stanford University.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Distributed Systems Research Seminar on Annemari Auvinen, Research Student.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Routing indexes A. Crespo & H. Garcia-Molina ICDCS 02.
The EigenTrust Algorithm for Reputation Management in P2P Networks
A Non-Monetary Protocol for P2P Content Distribution in Wireless Broadcast Networks with Network Coding I-Hong Hou, Yao Liu, and Alex Sprintson Dept. of.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
SLAC and SLACER: Simple copy & rewire algorithms for trust and cooperation in P2P David Hales, Stefano Arteconi, Ozalp Babaoglu University of Bologna,
Michael J. Neely, University of Southern California CISS, Princeton University, March 2012 Wireless Peer-to-Peer Scheduling.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Februar 17, 2006GDS meeting - LIP1 MOve: an application-Malleable Overlay UIUC / INRIA Collaboration.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
GIA: Making Gnutella-like P2P Systems Scalable Yatin Chawathe Sylvia Ratnasamy, Scott Shenker, Nick Lanham, Lee Breslau (Several slides have been taken.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
© 2002, Magdalena Punceva, EPFL-IC, Laboratoire de systèmes d'informations répartis Self-Organized Construction of Distributed Access Structures: A Comparative.
A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science.
Zibin Zheng DR 2 : Dynamic Request Routing for Tolerating Latency Variability in Cloud Applications CLOUD 2013 Jieming Zhu, Zibin.
David Hales (University of Bologna) University of Bologna, Italywww.davidhales.com WARNING! Superficial sociological interpretation followed by simplistic.
Emergent Group-Like Selection in a Peer-to-Peer Network ECCS Conference Paris, Nov. 16 th, 2005 David Hales University of Bologna, Italy
GIA: Making Gnutella-like P2P Systems Scalable Yatin Chawathe Sylvia Ratnasamy, Scott Shenker, Nick Lanham, Lee Breslau Parts of it has been adopted from.
On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks Presenter: 游創文.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Incentives for Sharing in Peer-to-Peer Networks By Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
Project funded by the Future and Emerging Technologies arm of the IST Programme From Selfish Nodes to Cooperative Networks – Emergent Link-based Incentives.
1 Query-Flood DoS Attacks in Gnutella by Andreas Legrum based upon a paper by Neil Daswani and Hector Garcia-Molina.
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  Challenges for search in wireless networks  Random walks and flooding for search with.
Peer to Peer Network Design Discovery and Routing algorithms
Evaluation GUESS and Non-Forwarding Peer-to-Peer search ICDCS paper Beverly Yang Patrick Vinograd Hector Garcia-Molina Computer Science Department, Stanford.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
Reorganization in Network Regions for Optimality and Fairness Robert E. Beverly IV, MSc Thesis.
Informatics tools in network science
Project funded by the Future and Emerging Technologies arm of the IST Programme Altruism “for free” using Tags David Hales Department.
03/19/02Scalab Seminar Series1 Finding Good Peers in Peer-to-Peer Networks Ramaswamy N.Vadivelu Scalab, ASU.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Trustworthiness Management in the Social Internet of Things
Controlling the Cost of Reliability in Peer-to-Peer Overlays
On Growth of Limited Scale-free Overlay Network Topologies
Evolution for Cooperation
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Presentation transcript:

1 SLIC: A Selfish Link-based Incentive Mechanism for Unstructured P2P Networks Qixiang Sun Hector Garcia-Molina Stanford University

2 P2P File Sharing Gnutella, KaZaA, Overnet, etc. Internet

3 Architecture

4 Problem Why share files? Why forward other’s queries? Nodes are SELFISH!

5 Existing Approaches Micro-payments/Bartering “Global” reputation/trust system Query Results A B C AB Reputation = f (G)

6 Our Approach AB Fragment A Fragment B They need each other to reach more nodes.  Can retaliate

7 Our Approach (2) A DCB Reward “good” neighbors Penalize “bad” neighbors

8 Simple Model of a Node Capacity - Inject new queries - Answer/Forward queries Answering power Assume operate in rounds

9 SLIC Algorithm A DCB W(A,B) W(A,C) W(A,D) (2) Use the weights to “divide” its “spare” capacity (1) Adjust weights based on quality of services During each round:

10 SLIC Algorithm (2) A DCB 4 hits 2 hits For each query: # hits  [0, 1] Service = sum scores over all queries (0.25) (0.5) Service per round: Computed over A’s queries whose TTLs have just expired this round

11 SLIC Algorithm (3) W (A,B) = 0.9 W (A,B) S (A,B) ii-1i Update weight with exponential decay Allocate spare capacity proportionally W(A,B) W(A,B) + W(A,C) + W(A,D) A B C E.g., node B gets D

12 Does it work? Can a malicious node take advantage of the system? –Share less files –Dedicate less capacity –Have fewer connections

13 Utility Average # of hits per query Total # of hits

14 Evaluation Setup baseline = all nodes behave “normally” choose a probe node to behave differently –vary the probe node location compare the difference in utility –improvement ratio Simulation using 250-nodes random graphs

15 Answering Power Baseline

16 Total Capacity Baseline

17 Connectivity

18 Dynamic Scenario A B C D ? W = ? Can malicious nodes take advantage? “Happy” nodes do not want new connections while “unhappy” nodes take more risks

19 Dynamic Scenario (2) Weight for a new link = average weight of the existing links –Inverse of the current utility: 1/U –Exponential of the current utility: e -U Drop links with small weights

20 Evaluation Setup A probe node joins late How does its utility change over time?

21 Join (1)

22 Join (2)

23 Respawn Every node periodically tries to establish new links to improve utility 3 group of nodes –Normal –Low Answer Power –High Rho

24 Respawn (2) Better service

25 Future Direction All nodes selfishly change parameters to maximize their utility at the cheapest cost Simplify model for game-theoretic analysis Extend SLIC to other search mechanisms (e.g., random walks) and beyond searches

26 Conclusion SLIC is a “retaliation-based” mechanism Locally selfish decisions can give rise to a proper incentive structure Accepting new connections based on own utility can reduce the impact of malicious node

27 More Information Google for “Stanford Peers”

28

29 # of New Queries

30 # of New Queries (2)