Ivan Osipkov Fighting Freeloaders in Decentralized P2P File Sharing Systems.

Slides:



Advertisements
Similar presentations
Evaluating scalability Peer-to-Peer File Sharing Networks of Sayantan Mitra Vibhor Goyal.
Advertisements

1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
On the Economics of P2P Systems Speaker Coby Fernandess.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Analyzing and Improving BitTorrent Ashwin R. Bharambe ( Carnegie Mellon University ) Cormac Herley ( Microsoft Research, Redmond ) Venkat Padmanabhan (
Resilient Peer-to-Peer Streaming Paper by: Venkata N. Padmanabhan Helen J. Wang Philip A. Chou Discussion Leader: Manfred Georg Presented by: Christoph.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
CS 554. Peer-to-Peer Systems Faithfulness in Internet Algorithms Haridimos Kondylakis
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Service Differentiated Peer Selection An Incentive Mechanism for Peer-to-Peer Media Streaming Ahsan Habib, Member, IEEE, and John Chuang, Member, IEEE.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
1 CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks Young-Bae Ko, Kang-Won Lee, Thyaga Nandagopal Presentation by Tony Sung,
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Performance Evaluation of Peer-to-Peer Video Streaming Systems Wilson, W.F. Poon The Chinese University of Hong Kong.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
P2P File Sharing Systems
1 Proceeding the Second Exercises on Computer and Systems Engineering Professor OKAMURA Laboratory. Othman Othman M.M.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
A Game Theoretic Framework for Incentives in P2P Systems --- CS. Uni. California Jun Cai Advisor: Jens Graupmann.
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Michael Sirivianos Xiaowei Yang Stanislaw Jarecki Presented by Vidya Nalan Chakravarthy.
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
Secure Incremental Maintenance of Distributed Association Rules.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Othman Othman M.M., Koji Okamura Kyushu University 1.
An Efficient Approach for Content Delivery in Overlay Networks Mohammad Malli Chadi Barakat, Walid Dabbous Planete Project To appear in proceedings of.
P2P Traffic Localization by Alias Tracker for Tracker-based P2P applications (ATTP) draft-zhang-alto-attp-02 Yunfei Zhang China Mobile.
1 CS 425 Distributed Systems Fall 2011 Slides by Indranil Gupta Measurement Studies All Slides © IG Acknowledgments: Jay Patel.
Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.
Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked.
Efficient P2P backup through buffering at the edge S. Defrance, A.-M. Kermarrec (INRIA), E. Le Merrer, N. Le Scouarnec, G. Straub, A. van Kempen.
Othman Othman M.M., Koji Okamura Kyushu University 1.
1 Maze A Hybrid P2P file sharing system Design by Networking and distributed System lab at Peking University Presenter:Elaine.
An Improved Kademlia Protocol In a VoIP System Xiao Wu , Cuiyun Fu and Huiyou Chang Department of Computer Science, Zhongshan University, Guangzhou, China.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
Re-Configurable Byzantine Quorum System Lei Kong S. Arun Mustaque Ahamad Doug Blough.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
The EigenTrust Algorithm for Reputation Management in P2P Networks
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
P2P Storage/Bandwidth Sharing: Fairness and Security.
#16 Application Measurement Presentation by Bobin John.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
1 Gnutella. 2 Overview r P2P search mechanism r Simple and straightforward r Completely decentralized r Creates overlay network r Different applications.
An example of peer-to-peer application
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
Dieudo Mulamba November 2017
Anupam Das , Nikita Borisov
Presentation transcript:

Ivan Osipkov Fighting Freeloaders in Decentralized P2P File Sharing Systems

Introduction Gnutella/KazAa: 70% freeloaders, 1% serve 50% requests, files satisfy Zipf distribution Need to spread files according to popularity and curb freeloading, in order to provide QoS and eliminate central nodes Properties sought in a solution: 1. Minimize polling 2. Distributed solution 3. Collusion resistant 4. Sybil attack resistant

User Behavior in Gnutella Average user is online for 1 hour User identity may change or several identities present at the same time Evolutionary Prisoner’s Dilemma Sims: 1.New users should be treated with distrust but they should be able to start quickly 2.A user needs to have some info about other peer’s interactions. Otherwise, the game will not scale as population rises and non-optimal strategies will be followed.

Proposed Solutions Polling: Our Goals: Witnesses 1.Overhead 2.Incomplete Picture 3.DoS 4.Who’ll participate? 1.Overhead 2.Who’ll participate? 1.No polling 2.Avoid public service

Contributions Off-line participation evaluation. No 3rd party brokers or polling: only PKI assumed Upload activity proportional to download activity. Popular files spread more, thus improved load-balance Progressive taxation on accumulated credit. Easy to start participating Distributed data for undeniable collusion detection Works on top of Gnutella-like protocol and can be integrated with it

Offline Participation Evaluation If peer A sends file F to peer B, A obtains a signed download receipt from B, and B obtains upload receipt. The receipts state the time-interval of the file transfer and IDs of peers involved. Each peer presents its receipts when requesting a download Credit of peer is calculated based on the receipts and the peer is put into a priority queue AB F AB {A,B,dld,T1,T2} sign(A) {A,B,upld,T1,T2} sign(B)

Credit Calculation Given a time frame (s,t) and current time T, credit contribution of this time-frame is f(s,t,T) where f "ages" as T increases. One adds all contributions of upload receipts, subtracts contributions of download receipts and of "unaccounted time-intervals“ Old receipts contribute little

Properties of Credits Old receipts can be discarded Dumping of download receipts leads to "unaccounted time-frames" for which peer may be charged even more. The more credit peer has, the more it loses to aging. Thus downloads cost more and uploads generate less credit: PROGRESSIVE TAXATION As a consequence of the formulas, credit has upper and lower limits.

General Bandwidth Let b Kb/sec be "unit" bandwidth. A user with n*b bandiwdth creates n virtual (but related) peers. Each virtual peer can be involved in a single transaction at a time which should be finished without interruptions. If peer A has n*b bandwidth and B has m*b where n<b, then n*b can be dedicated on each side for download, but accounting is done on each virtual peer separately.

New Users New users get more credit from uploads than the old users. Thus if it first provides uploads to others it will be able quickly to obtain a viable amount of credit. Need to have some (popular) files initially Dynamic vs potential credit Should initial credit be given?

Collusion Attacks If undetectable from receipts then they raise total credit insignificantly If detectable then proof is undeniable: use intersection of receipts Data needed for proof is distributed but within similar time- frame Peers holding the compromising receipts are interested in prosecution

Collusion Attacks (Cont’d) (colluder) A B (colluder) TIME T1T2T3 A C B finally downloads T4 A B A and B can’t dld/upld to others during this time T5 C B B: lousy service and no receipt from A

In the beginning, it takes B three rounds to download, I.e. bandwidth usage is 33% (at most) Continuous collusion will force bandwidth usage to 25% What if A says “listen B, I’ll download your files for you, just keep giving me receipts”? Simulate longer downloads? Collusion Attacks: Conclusion

Sybil Attacks Not alleviated by the above mechanisms Need to do clustering (e.g. using IP addresses which should be pinged) when calculating total credit. Or use central CA

Simulations Setup 200 peers Files have Zipf popularity distribution Topology is random with average degree 3.4 Every user has initial files chosen at random but with popularity in mind 4 Levels of priority queue based on credit Gnutella routing/discovery simulated 1.65% freeloaders 2.25% honest peers 3.5% servers 4.5% newcomers

Simulations: Average History

Simulations: Bandwidth Usage

BitTorrent? You give to me, I give to you… NOW! The 2 peers need to have what each one needs (usually part of the same file) Used to offload work from the originator and increase bandwidth for large files Applicable to our case?

Future work Reputation system is a must: need to take action on misbehavior. It's orthogonal to the "economic" one. Reputations should be used when calculating credit similar approach can be used Receipts should be inspected (lazily?) for violations. This data is distributed and peers holding it are interested in detecting misbehavior. Receipts exposing violations have similar time-frames. Analysis and simulations of collusions is needed File-spreading simulations