Skip to main content
Log in

Analysis of user-driven peer selection in peer-to-peer backup and storage systems

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In this paper we present a model of peer-to-peer backup and storage systems in which users have the ability to selfishly select remote peers they want to exchange data with. In our work, peer characteristics (e.g., on-line availability, dedicated bandwidth) play an important role and are reflected in the model through a single parameter, termed profile. We show that selecting remote peers selfishly, based on their profiles, creates incentives for users to improve their contribution to the system. Our work is based on an extension to well known results in Matching Theory, which allows us to formulate the Stable Exchange Game, in which we shift the algorithmic nature of matching problems to a game theoretic framework. We propose a polynomial-time algorithm to compute welfare-maximizing stable exchanges between peers and show, using an evolutionary game theoretic framework, that even semi-random peer selection strategies, that are easily implementable in practice, can be effective in providing incentives to users in order to improve their profiles.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Antoniadis, P., Courcoubetis, C., & Mason, R. (2004). Comparing economic incentives in peer-to-peer networks. Computer Networks, 46(1), 133–146.

    Article  Google Scholar 

  2. Cechlárová, K., & Fleiner, T. (2005). On a generalization of the stable roommates problem. ACM Transactions of Algorithms, 1(1), 143–156.

    Article  Google Scholar 

  3. Chun, B., Dabek, F., Haeberlen, A., Sit, E., Weatherspoon, H., Kaashoek, M. F., Kubiatowicz, J., & Morris, R. (2006). Efficient replica maintenance for distributed storage systems. In Symposium on networked systems design and implementation (NSDI).

  4. Cohen, B. (2003). Incentives build robustness in bittorrent. In Proc. of 1st workshop on economics of peer-to-peer systems (P2PECON).

  5. Corbo, J., & Parkes, D. (2005). The price of selfish behavior in bilateral network formation. In Proc. of 24th ACM symposium on principles of distributed computing (PODC).

  6. Fabrikant, A., Luthra, A., Maneva, E., Papadimitriou, C. H., & Shenker, S. (2003). On a network creation game. In Proc. of 22nd ACM symposium on principles of distributed computing (PODC).

  7. Gale, D., & Shapley, L. S. (1962). College admissions and the stability of marriage. The American Mathematical Monthly, 69(1), 9–15.

    Article  Google Scholar 

  8. Godfrey, P. B., Shenker, S., & Stoica, I. (2006). Minimizing churn in distributed systems. SIGCOMM Computer Communication Review, 36(4), 147–158.

    Article  Google Scholar 

  9. Grolimund, D., Meisser, L., Schmid, S., & Wattenhofer, R. (2006). Havelaar: a robust and efficient reputation system for active peer-to-peer systems. In 1st workshop on the economics of networked systems (NetEcon).

  10. Hofbauer, J., & Sigmund, K. (1998). Evolutionary games and population dynamics. Cambridge: Cambridge University Press.

    Google Scholar 

  11. Irving, R. W. (1985). An efficient algorithm for the “stable roommates” problem. Journal of Algorithms, 6(4), 577–595.

    Article  Google Scholar 

  12. Irving, R. W., & Scott, S. (2007). The stable fixtures problem—a many-to-many extension of stable roommates. Discrete Applied Mathematics, 155(16), 2118–2129.

    Article  Google Scholar 

  13. Laoutaris, N., Smaragdakis, G., Bestavros, A., & Byers, J. W. (2007). Implications of selfish neighbor selection in overlay networks. In IEEE INFOCOM, pp. 490–498.

  14. Lebedev, D., Mathieu, F., Viennot, L., Gai, A.-T., Reynier, J., & de Montgolfier, F. (2007). On using matching theory to understand p2p network design. In International network optimization conference.

  15. Maille, P., & Toka, L. (2008). Managing a peer-to-peer data storage system in a selfish society. IEEE JSAC Special issue on Game Theory in Communication Systems, 26(7), 1295–1301.

    Google Scholar 

  16. Rodrigues, R., & Liskov, B. (2005). High availability in dhts: erasure coding vs. replication. In International workshop on peer-to-peer systems (IPTPS).

  17. Smith, J. M. (1982). Evolution and the theory of games. Cambridge: Cambridge University Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laszlo Toka.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Toka, L., Michiardi, P. Analysis of user-driven peer selection in peer-to-peer backup and storage systems. Telecommun Syst 47, 49–63 (2011). https://doi.org/10.1007/s11235-010-9301-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-010-9301-7

Keywords

Navigation