Abstract
In reputation-based peer-to-peer systems, reputation is used to build trust between peers and help selecting the right peers to download from. In this paper, we argue that reputation should not be used for service differentiation among the peers. To provide the right incentives for peers to share files and contribute to the system, the new concept of Contribution Behavior is introduced for partially decentralized peer-to-peer systems. Service differentiation is achieved based on the Contribution Behavior of the peers rather than their reputations. Simulation results assess the ability of the proposed algorithm to effectively identify free riders and malicious peers that upload malicious content, hence reducing the level of service provided to these peers and preserving network resources. On the other hand, good peers that contribute to the system receive better services which increases their satisfaction significantly.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: The 9th International Conference on Information and Knowledge Management, Atlanta, USA, pp. 310–317 (2001)
Cornelli, F., Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Choosing Reputable Servents in a P2P Network. In: The 11th International World Wide Web Conference, Honolulu, USA, pp. 376–386 (2002)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: The 12th International World Wide Web Conference, Budapest, Hungary, pp. 640–651 (2003)
Gupta, M., Judge, P., Ammar, M.: A Reputation System for Peer-to-Peer Networks. In: ACM 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video, Monterey, USA, pp. 144–152 (2003)
Mekouar, L., Iraqi, Y., Boutaba, R.: Peer-to-peer most wanted: Malicious peers. The Computer Networks Journal (to appear, 2005)
Axelrod, R.: The Evolution of Cooperation. Basic Books, New York (1984)
Adar, E., Huberman, B.A.: Free Riding on Gnutella. Technical report, HP (2000), http://www.hpl.hp.com/research/idl/papers/gnutella/
Mekouar, L., Iraqi, Y., Boutaba, R.: Detecting Malicious Peers in A Reputation-Based Peer-to-Peer System. In: The IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, USA (2005)
Gummadi, K., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, Modeling, and analysis of a Peer-to-Peer File Sharing Workload. In: The 19th ACM Symposium on Operating Systems Principles, New York, USA, pp. 314–329 (2003)
Gupta, M., Ammar, M.: Service Differentiation in Peer-to-Peer Networks Utilizing Reputations. In: ACM Fifth International Workshop on Networked Group Communications, Munich, Germany (2003)
Papaioannou, T.G., Stamoulis, G.D.: Effective use of reputation in peer-to-peer environments. In: Proceedings of IEEE/ACM CCGrid: International Symposium on Cluster Computing and the Grid (2004)
Ranganathan, K., Ripeanu, M., Sarin, A., Foster, I.: Incentive mechanisms for large collaborative resource sharing. In: Proceedings of IEEE/ACM CCGrid: International Symposium on Cluster Computing and the Grid (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mekouar, L., Iraqi, Y., Boutaba, R. (2006). Handling Free Riders in Peer-to-Peer Systems. In: Despotovic, Z., Joseph, S., Sartori, C. (eds) Agents and Peer-to-Peer Computing. AP2PC 2005. Lecture Notes in Computer Science(), vol 4118. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11925941_5
Download citation
DOI: https://doi.org/10.1007/11925941_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49025-8
Online ISBN: 978-3-540-68967-6
eBook Packages: Computer ScienceComputer Science (R0)