[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A game theoretic approach to provide incentive and service differentiation in P2P networks

Published: 01 June 2004 Publication History

Abstract

Traditional peer-to-peer (P2P) networks do not provide service differentiation and incentive for users. Consequently, users can obtain services without themselves contributing any information or service to a P2P community. This leads to the "free-riding" and "tragedy of the commons" problems, in which the majority of information requests are directed towards a small number of P2P nodes willing to share their resources. The objective of this work is to enable service differentiation in a P2P network based on the amount of services each node has provided to its community, thereby encouraging all network nodes to share resources. We first introduce a resource distribution mechanism between all information sharing nodes. The mechanism is driven by a distributed algorithm which has linear time complexity and guarantees Pareto-optimal resource allocation. Besides giving incentive, the mechanism distributes resources in a way that increases the aggregate utility of the whole network. Second, we model the whole resource request and distribution process as a competition game between the competing nodes. We show that this game has a Nash equilibrium and is collusion-proof. To realize the game, we propose a protocol in which all competing nodes interact with the information providing node to reach Nash equilibrium in a dynamic and efficient manner. Experimental results are reported to illustrate that the protocol achieves its service differentiation objective and can induce productive information sharing by rational network nodes. Finally, we show that our protocol can properly adapt to different node arrival and departure events, and to different forms of network congestion.

References

[1]
The Gnutella Protocol Specification v0.4 1, document revision 1.2.]]
[2]
Limewire : a Gnutella client software.]]
[3]
E. Adar and B. Huberman. Free riding on Gnutella. FirstMonday, 2000.]]
[4]
D. Bertsekas and R. Gallager. Data Networks. Prentice-Hall, Englewood Cliffs, New Jersey, 1992.]]
[5]
J.-Y. Boudec. Rate adaptation, congestion control and fairness: A tutorial, http://icapeople.epfl.ch/leboudec.]]
[6]
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science, 2001.]]
[7]
A. C. Fuqua, T. Ngan, and D. S. Wallach. Economic behavior of peer-to-peer storage networks. Workshop on Economics of Peer-to-Peer Systems, June 2003.]]
[8]
P. Golle, K. Leyton-Brown, I. Mironov, and M. Lillibridge. Incentives for sharing in peer-to-peer networks. Proceedings of the ACM Conference on Electronic Commerce, 2001.]]
[9]
G. Hardin. The tragedy of the commons. Science, 162:1243--1248, 1968.]]
[10]
R. Ma, S. Lee, J. Lui, and D. Yau. Incentive P2P Networks: Theory and implementation. Technical report of Dept. of CSE, Chinese University of Hong Kong.]]
[11]
A. Mas-Colell, M. D. Whinston, and J. R. Green. Microeconomic theory. Oxford University Press, 1995.]]
[12]
N. Nisan and A. Ronen. Algorithmic mechanism design, 1999.]]
[13]
D. Parkes. Chapter 2, iterative combinatorial auctions: Achieving economic and computational efficiency ph.d. dissertation, univesity of pennsylvania, May, 2001.]]
[14]
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content addressable network. In Proceedings of ACM SIGCOMM, 2001.]]
[15]
A. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. Lecture Notes in Computer Science, 2218, 2001.]]
[16]
S. Shenker. Fundamental design issues for the future internet. IEEE Journal on Selected Areas in Communication, 13(7), September 1995.]]
[17]
J. Shneidman and D. Parkes. Rationality and self-interest in peer to peer networks. International Workshop on Peer-to-Peer Systems (IPTPS), 2003.]]
[18]
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM, 2001.]]
[19]
W. Wang and B. Li. To play or to control: a game-based control-theoretic approach to peer-to-peer incentive engineering. IWQoS, 2003.]]
[20]
B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01-1141, UC Berkeley, Apr. 2001.]]
[21]
S. Zhong, Y. Yang, and J. Chen. Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks, 2002.]]

Cited By

View all
  • (2024)Barriers to Peer-to-Peer Energy Trading Networks: A Multi-Dimensional PESTLE AnalysisSustainability10.3390/su1604151716:4(1517)Online publication date: 10-Feb-2024
  • (2022)Incentive Scheme for Shared Parking Space based on NFT2022 2nd International Conference on Computer Science and Blockchain (CCSB)10.1109/CCSB58128.2022.00012(26-33)Online publication date: Oct-2022
  • (2018)Motivating Content Sharing and Trustworthiness in Mobile Social NetworksIEEE Access10.1109/ACCESS.2018.28343596(28339-28355)Online publication date: 2018
  • Show More Cited By

Recommendations

Reviews

Takeshi Takahashi

Thanks to the massive development of peer-to-peer (P2P) technologies, we can easily exchange files among many users by using specific applications such as Gnutella. The P2P file-sharing system depends on users' willingness to share their files. Currently, however, only a small number of P2P users are willing to share their resources. This paper describes a scheme-RBM-IU-that provides people with incentives to share their own resources. RBM-IU allows users with higher contribution values to gain more priority and resources. RBM-IU considers the contribution values, as well as user satisfaction. Contribution values come from how many resources a user has shared, while user satisfaction values come from the percentage of a user's bandwidth requests (bidding) that are fulfilled. This paper also describes how to determine the bidding value based on game theory. Both theoretical issues and practical issues are discussed. The simulation experiments are very clear; you can see how many resources each user receives, based on the RBM-IU algorithm. If you are thinking about providing differentiated quality of service for each user, this paper will give you a lot to think about. For instance, the author's proposed RBM-IU algorithm maximizes the total sum of satisfaction value. Is it always the best solution__?__ Sometimes, it is also nice to have balanced satisfaction values among users, depending on the objectives and applications. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGMETRICS Performance Evaluation Review
ACM SIGMETRICS Performance Evaluation Review  Volume 32, Issue 1
June 2004
432 pages
ISSN:0163-5999
DOI:10.1145/1012888
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGMETRICS '04/Performance '04: Proceedings of the joint international conference on Measurement and modeling of computer systems
    June 2004
    450 pages
    ISBN:1581138733
    DOI:10.1145/1005686
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2004
Published in SIGMETRICS Volume 32, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Barriers to Peer-to-Peer Energy Trading Networks: A Multi-Dimensional PESTLE AnalysisSustainability10.3390/su1604151716:4(1517)Online publication date: 10-Feb-2024
  • (2022)Incentive Scheme for Shared Parking Space based on NFT2022 2nd International Conference on Computer Science and Blockchain (CCSB)10.1109/CCSB58128.2022.00012(26-33)Online publication date: Oct-2022
  • (2018)Motivating Content Sharing and Trustworthiness in Mobile Social NetworksIEEE Access10.1109/ACCESS.2018.28343596(28339-28355)Online publication date: 2018
  • (2017)Modeling max---min fair bandwidth allocation in BitTorrent communitiesComputational Optimization and Applications10.1007/s10589-016-9866-566:2(383-400)Online publication date: 1-Mar-2017
  • (2016)Network security as public good: A mean-field-type game theory approach2016 13th International Multi-Conference on Systems, Signals & Devices (SSD)10.1109/SSD.2016.7473659(601-606)Online publication date: Mar-2016
  • (2014)An online auction framework for dynamic resource provisioning in cloud computingACM SIGMETRICS Performance Evaluation Review10.1145/2637364.259198042:1(71-83)Online publication date: 16-Jun-2014
  • (2014)An online auction framework for dynamic resource provisioning in cloud computingThe 2014 ACM international conference on Measurement and modeling of computer systems10.1145/2591971.2591980(71-83)Online publication date: 16-Jun-2014
  • (2013)Game theory meets network security and privacyACM Computing Surveys10.1145/2480741.248074245:3(1-39)Online publication date: 3-Jul-2013
  • (2012)A mathematical framework for analyzing adaptive incentive protocols in P2P networksIEEE/ACM Transactions on Networking10.1109/TNET.2011.216177020:2(367-380)Online publication date: 1-Apr-2012
  • (2012)A game-theoretic analysis of cooperation in anonymity networksProceedings of the First international conference on Principles of Security and Trust10.1007/978-3-642-28641-4_15(269-289)Online publication date: 24-Mar-2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media