Skip to main content
Log in

A contribution-based service differentiation scheme for peer-to-peer systems

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Trust is required in a file sharing peer-to-peer system to achieve better cooperation among peers. In reputation-based peer-to-peer systems, reputation is used to build trust among peers. In these systems, highly reputable peers will usually be selected to upload requested files, decreasing significantly malicious uploads in the system. However, these peers need to be motivated by increasing the benefits that they receive from the system. In addition, it is necessary to motivate free riders to contribute to the system by sharing files. Malicious peers should be also motivated to contribute positively by uploading authentic files instead of malicious ones. Service differentiation is required to motivate peers to get involved by sharing and uploading the requested files. To provide the right incentives for peers to contribute to the system, the new concept of Contribution Behavior is introduced for partially decentralized peer-to-peer systems. In this paper, the Contribution Behavior of the peer is used as a guideline for service differentiation instead of peer’s reputation. Both Availability and Involvement of the peer are used to assess its Contribution Behavior. Performance evaluations confirm the ability of the proposed scheme to effectively identify both free riders and malicious peers and reduce the level of service provided to them. On the other hand, good peers receive better service. Simulation results also confirm that based on a Rational Behavior, peers are motivated to increase their contribution to receive services. Moreover, using our scheme, peers must continuously participate, reducing significantly the milking phenomenon.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. Free riders are peers that take advantage of the system without contributing to it or with a very small contribution.

  2. We do not consider uploading malicious content as a contribution. Only authentic uploads are taken into consideration.

  3. To prevent peers from repeatedly sending the same request to the supernode over and over until the request is handled, a minimum time period can be enforced between consecutive requests. This will motivate peers to contribute if they want their requests to be processed by the system.

References

  1. Bharambe A, Herley C, Padmanabhan V (2006) Analyzing and improving a BitTorrent network’s performance mechanisms. In: IEEE 25th INFOCOM, pp 1–12

  2. Aberer K, Despotovic Z (2001) Managing trust in a peer-2-peer information system. In: The 9th international conference on information and knowledge management, pp 310–317

  3. Adar E, Huberman BA (2000) Free riding on Gnutella. Tech. rep., HP

  4. Axelrod R (1984) The evolution of cooperation. Basic Books, New York

    Google Scholar 

  5. Chang E, Dillon T, Hussain FK (2006) Trust and reputation for service-oriented environments. Wiley, New York (2006)

    Book  Google Scholar 

  6. Cornelli F, Damiani E , di Vimercati SDC, Paraboschi S, Samarati P (2002) Choosing reputable servents in a P2P network. In: The 11th international world wide web conference, pp 376–386

  7. Gambetta D (2000) Can we trust trust? In: Trust: making and breaking cooperative relations, chap. 13, pp 213–237. Published Online

  8. Gummadi K, Dunn RJ, Saroiu S, Gribble SD, Levy HM, Zahorjan J (2003) Measurement, modeling, and analysis of a peer-to-peer file sharing workload. In: 19th ACM symposium on operating systems principles, pp 314–329

  9. Gupta M, Ammar M (2003) Service differentiation in peer-to-peer networks utilizing reputations. In: ACM Fifth international workshop on networked group communications

  10. Gupta M, Judge P, Ammar M (2003) A reputation system for peer-to-peer networks. In: ACM 13th international workshop on network and operating systems support for digital audio and video, pp 144–152

  11. Jun S, Ahamad M (2005) Incentives in BitTorrent induce free riding. In: Workshop on economics of peer-to-peer systems, pp 116–121

  12. Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The EigenTrust algorithm for reputation management in P2P networks. In: The 12th international world wide web conference, pp 640–651

  13. Ma RTB, Lee SCM, Lui JCS, Yau DKY ((2006)) Incentive and service differentiation in P2P networks: a game theoretic approach. IEEE/ACM Trans Netw 14(5):978–991

    Article  Google Scholar 

  14. Marsh S (1994) Formalising trust as a computational concept. Ph.D. thesis, University of Stirling

  15. Marti S, Garcia-Molina H (2004) Limited reputation sharing in P2P systems. In: ACM conference on electronic commerce, pp 91–101

  16. Mekouar L, Iraqi, Y, Boutaba R (2005) Detecting malicious peers in a reputation-based peer-to-peer system. In: The IEEE consumer communications and networking conference (CCNC), pp 37–42

  17. Mekouar L, Iraqi Y, Boutaba R (2006) Peer-to-peer most wanted: malicious peers. In: International computer networks journal. Special issue on management in peer-to-peer systems: trust, reputation and security, vol 50(4). pp 545–562

  18. Shah P, Pâris JF (2007) Incorporating Trust in the BitTorrent Protocol. In: International symposium on performance evaluation of computer and telecommunication systems

  19. Papaioannou TG, Stamoulis GD (2004) Effective use of reputation in peer-to-peer environments. In: The proceedings of IEEE/ACM CCGrid: international symposium on cluster computing and the grid, pp 259–268

  20. Papaioannou TG, Stamoulis GD (2006) Reputation-based policies that provide the right incentives in peer-to-peer environments. In: The computer networks journal: special issue on management in peer-to-peer systems: trust, reputation and security

  21. Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329

    Article  Google Scholar 

  22. Ranganathan K, Ripeanu M, Sarin A, Foster I (2004) Incentive mechanisms for large collaborative resource sharing. In: The proceedings of IEEE/ACM CCGrid: International symposium on cluster computing and the grid, pp 1–8

  23. Thommes R, Coates MJ (2005) BitTorrent faireness: analysis and improvements. In: Workshop of the internet telecommunications and signal processing

  24. Yang M, Feng Q, Dai Y, Zhang Z (2007) A multi-dimensional reputation system combined with trust and incentive mechanisms in P2P file sharing systems. In: Proceedings of the 27th international conference on distributed computing systems workshops

  25. Zhang Y, Fang Y (2007) A fine-grained reputation system for reliable service selection in peer-to-peer networks. Trans. IEEE 18(8):1134–1145

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Loubna Mekouar.

Additional information

Preliminary versions were published in the Fourth International Workshop on Agents and Peer-to-Peer Computing (AP2PC), 2005, and in the IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2005.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mekouar, L., Iraqi, Y. & Boutaba, R. A contribution-based service differentiation scheme for peer-to-peer systems. Peer-to-Peer Netw. Appl. 2, 146–163 (2009). https://doi.org/10.1007/s12083-008-0026-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-008-0026-2

Keywords

Navigation