Abstract
This paper discusses the efficiency of audits as incentives for reducing free-riding in P2P storage applications, that is, lessening the number of peers that can store their data without contributing to the storage infrastructure. Audits are remote data verifications that can also be used to decide whether to cooperate with a given peer based on its behavior. We demonstrate how an audit-based strategy can dominate or outperform the free-riding strategy by exhibiting the equilibria of our evolutionary game theoretical model of a P2P storage application.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Friedman, D.: On economic applications of evolutionary game theory. Journal of Evolutionary Economics 8, 15–43
Brandt, H., Sigmund, K.: The good, the bad and the discriminator–errors in direct and indirect reciprocity. Journal of Theoretical Biology 239(2), 183–194 (2006)
Oualha, N., Önen, M., Roudier, Y.: A Security Protocol for Self-Organizing Data Storage. In: Proceedings of 23rd International Information Security Conference (SEC 2008) IFIP Sec 2008, Milan, Italy (September 2008)
Oualha, N., Önen, M., Roudier, Y.: A Security Protocol for Self-Organizing Data Storage (extended version) Technical Report Nº RR-08-208, EURECOM (January 2008)
Oualha, N., Roudier, Y.: Securing ad hoc storage through probabilistic cooperation assessment. In: WCAN 2007, 3rd Workshop on Cryptography for Ad hoc Networks, Wroclaw, Poland, July 8 (2007)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 598–609. ACM, New York (2007)
Juels, A., Kaliski, B.S.: PORs: Proofs of retrievability for large files., Cryptology ePrint archive, Report 2007/243 (June 2007)
Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote Integrity Checking. In: Proceedings of Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) (2004)
Filho, D.G., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. In: IACR Cryptology ePrint Archive (2006)
Sebe, F., Domingo-Ferrer, J., Martínez-Ballesté, A., Deswarte, Y., Quisquater, J.-J.: Efficient Remote Data Possession Checking in Critical Information Infrastructures. In: IEEE Transactions on Knowledge and Data Engineering, August 06, 2007, IEEE Computer Society Digital Library. IEEE Computer Society (December 6, 2007), http://doi.ieeecomputersociety.org/10.1109/TKDE.2007.190647
Schwarz, T., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of the IEEE Int’l Conference on Distributed Computing Systems (ICDCS 2006) (July 2006)
Jones, D.S., Sleeman, B.D.: Differential Equations and Mathematical Biology. Allen & Unwin, London (1983)
Oualha, N., Roudier, Y.: Reputation and Audits for Self-Organizing Storage. In: Workshop on Security in Opportunistic and SOCial Networks SOSOC 2008, Turkey, Istanbul (September 2008)
Oualha, N., Michiardi, P., Roudier, Y.: A game theoretic model of a protocol for data possession verification. In: IEEE International Workshop on Trust, Security, and Privacy for Ubiquitous Computing TSPUC 2007, Helsinki, Finland, June 18 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Oualha, N., Roudier, Y. (2008). Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory. In: Hummel, K.A., Sterbenz, J.P.G. (eds) Self-Organizing Systems. IWSOS 2008. Lecture Notes in Computer Science, vol 5343. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92157-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-92157-8_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-92156-1
Online ISBN: 978-3-540-92157-8
eBook Packages: Computer ScienceComputer Science (R0)