Abstract
The goal of this paper is to present a formal framework specially defined for the analysis of cooperative behavior in self–organizing multi–party security protocols. To illustrate the formalism, we formally analyze a multi–party peer to peer (MP–P2P) content authentication protocol which ensures content integrity in a decentralized P2P file sharing system. Our approach, based on Game Theory, will serve to formally analyze and verify cooperation among a variable number of selfish and untrustworthy participant peers.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Zhang, Y., Lin, L., Huai, J.: Balancing trust and incentive in peer-to-peer collaborative system. Int. Journal of Network Security 5(1), 73–81 (2007)
Marti, S., Garcia-Molina, H.: Taxonomy of trust: Categorizing p2p reputation systems. Computer Networks 50, 472–484 (2006)
Andrade, N., Mowbray, M., Lima, A., Wagner, G., Ripeanu, M.: Influences on cooperation in bittorrent communities. In: Proceedings of the 2005 ACM SIGCOMM workshop on Economics of Peer-to-Peer systems, pp. 111–115. ACM, New York (2005)
Cheng, J., Li, Y., Jiao, W., Ma, J.: A utility-based auction cooperation incentive mechanism in peer-to-peer network. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC Workshops 2006. LNCS, vol. 4097, pp. 11–21. Springer, Heidelberg (2006)
Zambonelli, F., Gleizesb, M., Mameia, M., Tolksdorf, R.: Spray computers: Explorations in self-organization. Pervasive and Mobile Computing 1, 1–20 (2005)
Ellis, T., Yao, X.: Evolving cooperation in the non-iterated prisoner’s dilemma: A social network inspired approach. In: Proceedings of the IEEE Congress on Evolutionary Computation, Singapore, September 2007, pp. 25–28 (2007)
Palomar, E., Tapiador, J., Hernandez-Castro, J., Ribagorda, A.: Certificate-based access control in pure p2p networks. In: Proceedings of the 6th Int. Conference on Peer-to-Peer Computing, Cambridge, UK, September 2006, pp. 177–184. IEEE, Los Alamitos (2006)
Palomar, E., Estevez-Tapiador, J., Hernandez-Castro, J., Ribagorda, A.: Secure content access and replication in pure p2p networks. Computer Communications 31(2), 266–279 (2008)
Palomar, E., Alcaide, A., Estevez-Tapiador, J., Hernandez-Castro, J.: Bayesian analysis of secure p2p sharing protocols. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1701–1717. Springer, Heidelberg (2007)
Abadi, M., Gordon, A.: A calculus for cryptographic protocols: the spi calculus. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 36–47. ACM, New York (1997)
Aristizabal, A., Lopez, H., Rueda, C., Valencia, F.: Formally reasoning about security issues in p2p protocols: A case study. In: Proceedings of the 3rd Taiwanese-French Conference on Information Technology, Nancy, France, INRIA Technical report (March 2006)
Schneider, S., Borgstrom, J., Nestmann, U.: Towards the application of process calculi in the domain of peer-to-peer algorithms. In: Proceedings of the 8th Int. Workshop on Autonomous Systems–Self-Organization, Management and Control, Shanghai, China, October 2008. Springer, Heidelberg (2008)
Velipasalar, S., Chang-Hong, L., Schlessman, J., Wolf, W.: Design and verification of communication protocols for peer-to-peer multimedia systems. In: Proceedings of the IEEE International Conference on Multimedia and Expo., Toronto, Canada, July 2006, pp. 1421–1424. IEEE, Los Alamitos (2006)
Buragohain, C., Agrawal, D., Suri, S.: A game theoretic framework for incentives in p2p systems. In: Proceedings of the 3rd Int. Conf. on Peer-to-Peer Computing, Linkping, Sweden, September 2003, pp. 48–56. IEEE Computer Society, Los Alamitos (2003)
Gupta, R., Somani, A.K.: Game theory as a tool to strategize as well as predict nodes behavior in peer-to-peer networks. In: ICPADS, pp. 244–249 (2005)
Morselli, R., Katz, J., Bhattacharjee, B.: A game-theoretic framework for analyzing trust-inference protocols. In: Second Workshop on the Economics of Peer-to-Peer Systems (2004)
Palomar, E.: Content authentication and access control in pure peer-to-peer networks. Technical report, University Carlos III of Madrid. Computer Science Department. Spain, Ph.D. Thesis (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alcaide, A., Palomar, E., González–Tablas, A.I., Ribagorda, A. (2010). Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol. In: Katsikas, S., Lopez, J., Soriano, M. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2010. Lecture Notes in Computer Science, vol 6264. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15152-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-15152-1_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15151-4
Online ISBN: 978-3-642-15152-1
eBook Packages: Computer ScienceComputer Science (R0)