Skip to main content

2018 | OriginalPaper | Buchkapitel

DogFish: Decentralized Optimistic Game-theoretic FIle SHaring

verfasst von : Seny Kamara, Alptekin Küpçü

Erschienen in: Applied Cryptography and Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Peer-to-peer (p2p) file sharing accounts for the most uplink bandwidth use in the Internet. Therefore, in the past few decades, many solutions tried to come up with better proposals to increase the social welfare of the participants. Social welfare in such systems are categorized generally as average download time or uplink bandwidth utilization. One of the most influential proposals was the BitTorrent. Yet, soonafter studies showed that BitTorrent has several problems that incentivize selfish users to game the system and hence decrease social welfare.
Previous work, unfortunately, did not develop a system that maximizes social welfare in a decentralized manner (without a trusted party getting involved in every exchange), while the proposed strategy and honest piece revelation being the only equilibrium for the rational players. This is what we achieve, by modeling a general class of p2p file sharing systems theoretically, then showing honest piece revelation will help achieve social welfare, and then introducing a new cryptographic primitive, called randomized fair exchange, to instantiate our solution.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
2
For simplicity, representing common behavior, assume each \(P_i\) leaves the system the moment she finishes downloading (at the end of round \(m+i-1\)). Afterward, at round \(m+i\), the seeder sends the last block to peer \(P_{i+1}\) (thus every peer receives the last block from the seeder).
 
3
More precisely, the zeros in the game should be replaced with negligible utilities (of managing to break PoS security), \({<}1\) values should be \({<}1-1/m\) (one minus non-negligible, where the file has m blocks), and ones should be one minus negligible (due to the negligible probability of the fair exchange failing). Overall, we chose not to complicate the presentation with these details, but indeed our equilibrium is a computational Nash equilibrium.
 
4
RFE is also related to oblivious transfer [47]. Indeed, at first, we were imagining a randomized oblivious fair exchange would be necessary, but it turns out we do not need obliviousness for the game theoretic analysis to go through.
 
Literatur
1.
Zurück zum Zitat Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., Porth, C.: Bar fault tolerance for cooperative services. ACM SIGOPS Oper. Syst. Rev. 39(5), 45–58 (2005)CrossRef Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., Porth, C.: Bar fault tolerance for cooperative services. ACM SIGOPS Oper. Syst. Rev. 39(5), 45–58 (2005)CrossRef
3.
Zurück zum Zitat Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE Sel. Areas Commun. 18, 591–610 (2000)CrossRef Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE Sel. Areas Commun. 18, 591–610 (2000)CrossRef
4.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 12:1–12:34 (2011)CrossRef Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 12:1–12:34 (2011)CrossRef
6.
Zurück zum Zitat Axelrod, R.: Effective choice in the Prisoner’s Dilemma. J. Conflict Resolut. 24(1), 3–25 (1980)CrossRef Axelrod, R.: Effective choice in the Prisoner’s Dilemma. J. Conflict Resolut. 24(1), 3–25 (1980)CrossRef
7.
Zurück zum Zitat Axelrod, R.: More effective choice in the Prisoner’s Dilemma. J. Conflict Resolut. 24(3), 379–403 (1980)CrossRef Axelrod, R.: More effective choice in the Prisoner’s Dilemma. J. Conflict Resolut. 24(3), 379–403 (1980)CrossRef
9.
Zurück zum Zitat Barak, B.: Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In: IEEE FOCS (2002) Barak, B.: Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In: IEEE FOCS (2002)
10.
Zurück zum Zitat Belenkiy, M., Chase, M., Erway, C., Jannotti, J., Küpçü, A., Lysyanskaya, A., Rachlin, E.: Making P2P accountable without losing privacy. In: ACM WPES (2007) Belenkiy, M., Chase, M., Erway, C., Jannotti, J., Küpçü, A., Lysyanskaya, A., Rachlin, E.: Making P2P accountable without losing privacy. In: ACM WPES (2007)
11.
Zurück zum Zitat Berciu, R.M.: Designing incentives in P2P systems. Master’s thesis, Baylor University (2013) Berciu, R.M.: Designing incentives in P2P systems. Master’s thesis, Baylor University (2013)
15.
Zurück zum Zitat Cash, D., Küpçü, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. J. Cryptol. 30(1), 22–57 (2017)MathSciNetCrossRef Cash, D., Küpçü, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. J. Cryptol. 30(1), 22–57 (2017)MathSciNetCrossRef
16.
Zurück zum Zitat Chen, K., Shen, H., Sapra, K., Liu, G.: A social network based reputation system for cooperative P2P file sharing. IEEE Trans. Parallel Distrib. Syst. 26(8), 2140–2153 (2015)CrossRef Chen, K., Shen, H., Sapra, K., Liu, G.: A social network based reputation system for cooperative P2P file sharing. IEEE Trans. Parallel Distrib. Syst. 26(8), 2140–2153 (2015)CrossRef
17.
Zurück zum Zitat Ciccarelli, G., Cigno, R.L.: Collusion in peer-to-peer systems. Comput. Netw. 55(15), 3517–3532 (2011)CrossRef Ciccarelli, G., Cigno, R.L.: Collusion in peer-to-peer systems. Comput. Netw. 55(15), 3517–3532 (2011)CrossRef
18.
Zurück zum Zitat Cohen, B.: Incentives build robustness in BitTorrent. In: WEPS (2003) Cohen, B.: Incentives build robustness in BitTorrent. In: WEPS (2003)
20.
Zurück zum Zitat Ellison, G.: Cooperation in the Prisoner’s Dilemma with anonymous random matching. Rev. Econ. Stud. 61(3), 567–588 (1994)MathSciNetCrossRef Ellison, G.: Cooperation in the Prisoner’s Dilemma with anonymous random matching. Rev. Econ. Stud. 61(3), 567–588 (1994)MathSciNetCrossRef
22.
Zurück zum Zitat Fader, P.S., Hauser, J.R.: Implicit coalitions in a generalized Prisoner’s Dilemma. J. Conflict Resolut. 32(3), 553–582 (1988)CrossRef Fader, P.S., Hauser, J.R.: Implicit coalitions in a generalized Prisoner’s Dilemma. J. Conflict Resolut. 32(3), 553–582 (1988)CrossRef
23.
Zurück zum Zitat Fan, B., Chiu, D., Lui, J.: The delicate tradeoffs in BitTorrent-like file sharing protocol design. Technical report, The Chinese University of Hong Kong (2006) Fan, B., Chiu, D., Lui, J.: The delicate tradeoffs in BitTorrent-like file sharing protocol design. Technical report, The Chinese University of Hong Kong (2006)
24.
Zurück zum Zitat Fan, B., Chiu, D., Lui, J.C.: The delicate tradeoffs in BitTorrent-like file sharing protocol design. In: IEEE ICNP (2006) Fan, B., Chiu, D., Lui, J.C.: The delicate tradeoffs in BitTorrent-like file sharing protocol design. In: IEEE ICNP (2006)
25.
Zurück zum Zitat Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust incentive techniques for peer-to-peer networks. In: ACM EC (2004) Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust incentive techniques for peer-to-peer networks. In: ACM EC (2004)
26.
Zurück zum Zitat Guo, D., Kwok, Y.-K., Jin, X.: Valuation of information and the associated overpayment problem in peer-to-peer systems. Comput. Commun. 80, 59–71 (2016)CrossRef Guo, D., Kwok, Y.-K., Jin, X.: Valuation of information and the associated overpayment problem in peer-to-peer systems. Comput. Commun. 80, 59–71 (2016)CrossRef
27.
Zurück zum Zitat Halpern, J.Y.: Beyond Nash equilibrium: solution concepts for the 21st century. In: ACM PODC (2008) Halpern, J.Y.: Beyond Nash equilibrium: solution concepts for the 21st century. In: ACM PODC (2008)
28.
Zurück zum Zitat Juels, A., Kaliski, B.S.: PORs: proofs of retrievability for large files. In: ACM CCS (2007) Juels, A., Kaliski, B.S.: PORs: proofs of retrievability for large files. In: ACM CCS (2007)
29.
Zurück zum Zitat Kash, I.A., Friedman, E.J., Halpern, J.Y.: An equilibrium analysis of scrip systems. ACM Trans. Econ. Comput. 3(3), 13:1–13:32 (2015)MathSciNetCrossRef Kash, I.A., Friedman, E.J., Halpern, J.Y.: An equilibrium analysis of scrip systems. ACM Trans. Econ. Comput. 3(3), 13:1–13:32 (2015)MathSciNetCrossRef
30.
Zurück zum Zitat Keidar, I., Melamed, R., Orda, A.: Equicast: scalable multicast with selfish users. Comput. Netw. 53(13), 2373–2386 (2009)CrossRef Keidar, I., Melamed, R., Orda, A.: Equicast: scalable multicast with selfish users. Comput. Netw. 53(13), 2373–2386 (2009)CrossRef
32.
Zurück zum Zitat Kipnis, A., Patt-Shamir, B.: A note on distributed stable matching. In: IEEE ICDCS (2009) Kipnis, A., Patt-Shamir, B.: A note on distributed stable matching. In: IEEE ICDCS (2009)
33.
Zurück zum Zitat Kumar, R., Ross, K.W.: Peer-assisted file distribution: the minimum distribution time. In: IEEE HOTWEB (2006) Kumar, R., Ross, K.W.: Peer-assisted file distribution: the minimum distribution time. In: IEEE HOTWEB (2006)
34.
Zurück zum Zitat Küpçü, A.: Official arbitration with secure cloud storage application. Comput. J. 58(4), 831–852 (2015)CrossRef Küpçü, A.: Official arbitration with secure cloud storage application. Comput. J. 58(4), 831–852 (2015)CrossRef
36.
Zurück zum Zitat Küpçü, A., Lysyanskaya, A.: Usable optimistic fair exchange. Comput. Netw. 56, 50–63 (2012)CrossRef Küpçü, A., Lysyanskaya, A.: Usable optimistic fair exchange. Comput. Netw. 56, 50–63 (2012)CrossRef
37.
Zurück zum Zitat Levin, D., LaCurts, K., Spring, N., Bhattacharjee, B.: BitTorrent is an auction: analyzing and improving BitTorrent’s incentives. ACM SIGCOMM Comput. Commun. Rev. 38(4), 243–254 (2008)CrossRef Levin, D., LaCurts, K., Spring, N., Bhattacharjee, B.: BitTorrent is an auction: analyzing and improving BitTorrent’s incentives. ACM SIGCOMM Comput. Commun. Rev. 38(4), 243–254 (2008)CrossRef
38.
Zurück zum Zitat Levin, D., Sherwood, R., Bhattacharjee, B.: Fair file swarming with fox. In: IPTPS (2006) Levin, D., Sherwood, R., Bhattacharjee, B.: Fair file swarming with fox. In: IPTPS (2006)
39.
Zurück zum Zitat Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. J. Cryptol. 16(3), 143–184 (2003)MathSciNetCrossRef Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. J. Cryptol. 16(3), 143–184 (2003)MathSciNetCrossRef
40.
Zurück zum Zitat Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free riding in BitTorrent is cheap. In: HotNets (2006) Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free riding in BitTorrent is cheap. In: HotNets (2006)
41.
Zurück zum Zitat Luo, J., Xiao, B., Bu, K., Zhou, S.: Understanding and improving piece-related algorithms in the BitTorrent protocol. IEEE Trans. Parallel Distrib. Syst. 24(12), 2526–2537 (2013)CrossRef Luo, J., Xiao, B., Bu, K., Zhou, S.: Understanding and improving piece-related algorithms in the BitTorrent protocol. IEEE Trans. Parallel Distrib. Syst. 24(12), 2526–2537 (2013)CrossRef
42.
Zurück zum Zitat Meng, X., Tsang, P.-S., Lui, K.-S.: Analysis of distribution time of multiple files in a P2P network. Comput. Netw. 57(15), 2900–2915 (2013)CrossRef Meng, X., Tsang, P.-S., Lui, K.-S.: Analysis of distribution time of multiple files in a P2P network. Comput. Netw. 57(15), 2900–2915 (2013)CrossRef
43.
Zurück zum Zitat Neyman, A.: Bounded complexity justifies cooperation in the finitely repeated Prisoners’ Dilemma. Econ. Lett. 19(3), 227–229 (1985)MathSciNetCrossRef Neyman, A.: Bounded complexity justifies cooperation in the finitely repeated Prisoners’ Dilemma. Econ. Lett. 19(3), 227–229 (1985)MathSciNetCrossRef
44.
Zurück zum Zitat Okumuşoğlu, O., Bayraktar, M.F., Küpçü, A.: JustTorrent: value based-fairer and faster protocols for P2P file sharing. Int. J. Eng. Sci. Appl. 1(1), 1–10 (2017) Okumuşoğlu, O., Bayraktar, M.F., Küpçü, A.: JustTorrent: value based-fairer and faster protocols for P2P file sharing. Int. J. Eng. Sci. Appl. 1(1), 1–10 (2017)
45.
Zurück zum Zitat Pagnia, H., Gartner, F.C.: On the impossibility of fair exchange without a trusted third party. Technical report, Darmstadt University of Technology TUD-BS-1999-02 (1999) Pagnia, H., Gartner, F.C.: On the impossibility of fair exchange without a trusted third party. Technical report, Darmstadt University of Technology TUD-BS-1999-02 (1999)
46.
Zurück zum Zitat Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., Venkataramani, A.: Do incentives build robustness in BitTorrent. In: NSDI (2007) Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., Venkataramani, A.: Do incentives build robustness in BitTorrent. In: NSDI (2007)
47.
Zurück zum Zitat Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical report, Harvard Aiken Computation Laboratory Technical report TR-81 (1981) Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical report, Harvard Aiken Computation Laboratory Technical report TR-81 (1981)
48.
Zurück zum Zitat Radner, R.: Can bounded rationality resolve the Prisoner’s Dilemma? In: Essays in Honor of Gerard Debreu, pp. 387–399 (1986) Radner, R.: Can bounded rationality resolve the Prisoner’s Dilemma? In: Essays in Honor of Gerard Debreu, pp. 387–399 (1986)
49.
Zurück zum Zitat Roy, S.D., Zeng, W.: prTorrent: on establishment of piece rarity in the BitTorrent unchoking algorithm. In: IEEE P2P (2009) Roy, S.D., Zeng, W.: prTorrent: on establishment of piece rarity in the BitTorrent unchoking algorithm. In: IEEE P2P (2009)
50.
Zurück zum Zitat Sandvine. Global Internet Phenemona, December 2015 Sandvine. Global Internet Phenemona, December 2015
52.
Zurück zum Zitat Sirivianos, M., Yang, X., Jarecki, S.: Robust and efficient incentives for cooperative content distribution. IEEE/ACM Trans. Netw. 17(6), 1766–1779 (2009)CrossRef Sirivianos, M., Yang, X., Jarecki, S.: Robust and efficient incentives for cooperative content distribution. IEEE/ACM Trans. Netw. 17(6), 1766–1779 (2009)CrossRef
53.
Zurück zum Zitat Vilaça, X., Rodrigues, L.: On the range of equilibria utilities of a repeated epidemic dissemination game with a mediator. In: ACM ICDCN (2015) Vilaça, X., Rodrigues, L.: On the range of equilibria utilities of a repeated epidemic dissemination game with a mediator. In: ACM ICDCN (2015)
54.
Zurück zum Zitat Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: Karma: a secure economic framework for peer-to-peer resource sharing. In: P2PECON (2003) Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: Karma: a secure economic framework for peer-to-peer resource sharing. In: P2PECON (2003)
Metadaten
Titel
DogFish: Decentralized Optimistic Game-theoretic FIle SHaring
verfasst von
Seny Kamara
Alptekin Küpçü
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-93387-0_36