TITLE

iRep: indirect reciprocity reputation based efficient content delivery in BT-like systems

AUTHOR(S)
Wei, Xianglin; Chen, Ming; Tang, Chaogang; Bai, Huali; Zhang, Guomin; Wang, Zhanfeng
PUB. DATE
September 2013
SOURCE
Telecommunication Systems;Sep2013, Vol. 54 Issue 1, p47
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Delivering content efficiently through biased neighbor selection has attracted a lot of researchers' attention in recent years. Meanwhile, how to help peers understand each other is a crucial precondition of biased neighbor selection in distributed P2P context. Recent researches have showed that reciprocation based schemes provide a feasible way of categorizing peers. These schemes can perform in direct or indirect ways. For example, tit-for-tat is a typical example of direct ways, while reputation-based schemes are the representative examples of indirect ways. Although tit-for-tat has been proved to be successful from practical deployment and academic studies, it still suffers from free-riding, malicious peers and other problems. On the other hand, reputation-based schemes pay little attention to malicious peers. However, in this paper we propose an approach to promote the whole system performance as well as cope with malicious peers. Firstly, by building a simple mathematical model for the content delivery process in BT-like system, we find that the delivery order is critical to system performance, after that we present the best selection policy from system and single peer's perspective respectively. Secondly, according to analysis results, we bring forward indirect reciprocate Reputation (iRep), detail the design issues and sketch security and overhead introduced by iRep. Finally, several simulation experiments are conducted to evaluate the performance of iRep through comparison with tit-for-tat and Eigentrust. The comparison results validate that iRep can efficiently promote system performance with limited overheads.
ACCESSION #
91842737

 

Related Articles

  • Traffic Modeling and Analysis on BitTorrent-Like Peer-to-Peer Networks. Hong Tang; Yu Yan; Rong Hu; Cong-Cong Xing // Journal of Convergence Information Technology;Feb2013, Vol. 8 Issue 4, p1 

    Although extensive research has been conducted on the complex nature of P2P networks, there is still a lack of systematic understanding on the cause of these complexities. In particular, the issue of how the internal operating mechanism and structure exactly lead to the external and observable...

  • Peer To Peer Association in Content Distribution Network. Aruna, A.; Amrita, D. // International Journal of Advanced Research in Computer Science;Jan/Feb2014, Vol. 5 Issue 1, p145 

    The difficult issue of process and implementing an efficient law for load reconciliation in Content Delivery Networks (CDNs). We tend to base our proposal on a proper study of a CDN system, disbursed through the exploitation of a fluid flow model characterization of the network of SERVERS....

  • WHAT YOU MUST NOT DOWNLOAD IN 2016. Williams, Wayne // Web User;12/30/2015, Issue 387, p38 

    The article reviews several free downloadable programs in 2016 including uTorrent at utorrent.com, PC Matic system tool at www.pcpitstop.com, and Advanced SystemCare 9 at www.iobit.com.

  • Methodology and implementation for tracking the file sharers using BitTorrent. Park, Sooyoung; Chung, Hyunji; Lee, Changhoon; Lee, Sangjin; Lee, Kyungho // Multimedia Tools & Applications;Jan2015, Vol. 74 Issue 1, p271 

    Sharing copyright protected content without the copyright holder's permission is illegal in many countries. Regardless, the number of illegal file sharing using BitTorrent continues to grow and most of file sharers and downloader are unconcerned legal action to transfer copywrite-protected...

  • On the Mobility Scenario Implementation Using a Graphical P2P Discrete Event Simulator for the Bittorrent Protocol. Charalambous, Marios; Mavromoustakis, Constandinos X.; Violaris, George C.; Yassein, Muneer Bani // Journal of Algorithms & Computational Technology;Dec2013, Vol. 7 Issue 4, p449 

    Peer-to-Peer computing is nowadays the application platform which utilizes a novel distributed computing paradigm. It allows any number of participants to exchange and coordinate their resources with minimum overhead through centralized servers/services. This paradigm is also gaining ground in...

  • A Measurement Study on Resource Popularity and Swarm Evolution of BitTorrent System. Majing Su; Hongli Zhang; Binxing Fang; Lin Ye // International Journal of Communications, Network & System Scienc;Jun2013, Vol. 6 Issue 6, p300 

    Analyzing and modeling of the BitTorrent (BT) resource popularity and swarm evolution is important for better understanding current BT system and designing accurate BT simulators. Although lots of measurement studies on BT almost cover each important aspect, little work reflects the recent...

  • ON CLIENT'S INTERACTIVE BEHAVIOUR TO DESIGN PEER SELECTION POLICIES FOR BITTORRENT-LIKE PROTOCOLS. Rocha, Marcus V. M.; da S. Rodrigues, Carlo Kleber // International Journal of Computer Networks & Communications;Sep2013, Vol. 5 Issue 5, p141 

    Peer-to-peer swarming protocols have been proven to be very efficient for content replication over Internet. This fact has certainly motivated proposals to adapt these protocols to meet the requirements of on-demand streaming system. The vast majority of these proposals focus on modifying the...

  • On the Presence of Child Sex Abuse in BitTorrent Networks. Shavitt, Yuval; Zilberman, Noa // IEEE Internet Computing;May2013, Vol. 17 Issue 3, p60 

    Peer-to-peer networks' widespread use makes multimedia files available to users worldwide. However, such networks are often used to spread illegal material while the data source and acquiring users remain anonymous. This article analyzes activity measurements in the BitTorrent network and...

  • Classification of Bit Torrent Attacks from the Protocol's Operational Viewpoints. Soojin Kim; Seungoh Choi; Byeong-hee Roh // Journal of Convergence Information Technology;Sep2013, Vol. 8 Issue 14, p274 

    As the BitTorrent has become one of the most popular peer-to-peer file sharing systems, various security threats appear based on its operation. In this paper, we analyzed the vulnerabilities of the BitTorrent protocol, and surveyed existing attacks on the protocol. Then, we classified the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics