Skip to main content

Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5343))

Abstract

This paper discusses the efficiency of audits as incentives for reducing free-riding in P2P storage applications, that is, lessening the number of peers that can store their data without contributing to the storage infrastructure. Audits are remote data verifications that can also be used to decide whether to cooperate with a given peer based on its behavior. We demonstrate how an audit-based strategy can dominate or outperform the free-riding strategy by exhibiting the equilibria of our evolutionary game theoretical model of a P2P storage application.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Friedman, D.: On economic applications of evolutionary game theory. Journal of Evolutionary Economics 8, 15–43

    Google Scholar 

  2. Brandt, H., Sigmund, K.: The good, the bad and the discriminator–errors in direct and indirect reciprocity. Journal of Theoretical Biology 239(2), 183–194 (2006)

    Article  MathSciNet  Google Scholar 

  3. Oualha, N., Önen, M., Roudier, Y.: A Security Protocol for Self-Organizing Data Storage. In: Proceedings of 23rd International Information Security Conference (SEC 2008) IFIP Sec 2008, Milan, Italy (September 2008)

    Google Scholar 

  4. Oualha, N., Önen, M., Roudier, Y.: A Security Protocol for Self-Organizing Data Storage (extended version) Technical Report Nº RR-08-208, EURECOM (January 2008)

    Google Scholar 

  5. Oualha, N., Roudier, Y.: Securing ad hoc storage through probabilistic cooperation assessment. In: WCAN 2007, 3rd Workshop on Cryptography for Ad hoc Networks, Wroclaw, Poland, July 8 (2007)

    Google Scholar 

  6. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 598–609. ACM, New York (2007)

    Google Scholar 

  7. Juels, A., Kaliski, B.S.: PORs: Proofs of retrievability for large files., Cryptology ePrint archive, Report 2007/243 (June 2007)

    Google Scholar 

  8. Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote Integrity Checking. In: Proceedings of Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) (2004)

    Google Scholar 

  9. Filho, D.G., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. In: IACR Cryptology ePrint Archive (2006)

    Google Scholar 

  10. Sebe, F., Domingo-Ferrer, J., Martínez-Ballesté, A., Deswarte, Y., Quisquater, J.-J.: Efficient Remote Data Possession Checking in Critical Information Infrastructures. In: IEEE Transactions on Knowledge and Data Engineering, August 06, 2007, IEEE Computer Society Digital Library. IEEE Computer Society (December 6, 2007), http://doi.ieeecomputersociety.org/10.1109/TKDE.2007.190647

  11. Schwarz, T., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of the IEEE Int’l Conference on Distributed Computing Systems (ICDCS 2006) (July 2006)

    Google Scholar 

  12. Jones, D.S., Sleeman, B.D.: Differential Equations and Mathematical Biology. Allen & Unwin, London (1983)

    Book  MATH  Google Scholar 

  13. Oualha, N., Roudier, Y.: Reputation and Audits for Self-Organizing Storage. In: Workshop on Security in Opportunistic and SOCial Networks SOSOC 2008, Turkey, Istanbul (September 2008)

    Google Scholar 

  14. Oualha, N., Michiardi, P., Roudier, Y.: A game theoretic model of a protocol for data possession verification. In: IEEE International Workshop on Trust, Security, and Privacy for Ubiquitous Computing TSPUC 2007, Helsinki, Finland, June 18 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Oualha, N., Roudier, Y. (2008). Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory. In: Hummel, K.A., Sterbenz, J.P.G. (eds) Self-Organizing Systems. IWSOS 2008. Lecture Notes in Computer Science, vol 5343. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92157-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92157-8_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92156-1

  • Online ISBN: 978-3-540-92157-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics