Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2009

01-03-2009

Adaptive neighborhood selection in peer-to-peer networks based on content similarity and reputation

Authors: Ioannis Pogkas, Vassil Kriakov, Zhongqiang Chen, Alex Delis

Published in: Peer-to-Peer Networking and Applications | Issue 1/2009

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To address the two most critical issues in P2P file-sharing systems: efficient information discovery and authentic data acquisition, we propose a Gnutella-like file-sharing protocol termed Adaptive Gnutella Protocol (AGP) that not only improves the querying efficiency in a P2P network but also enhances the quality of search results at the same time. The reputation scheme in the proposed AGP evaluates the credibility of peers based on their contributions to P2P services and subsequently clusters nodes together according to their reputation and shared content, essentially transforming the P2P overlay network into a topology with collaborative and reputed nodes as its core. By detecting malicious peers as well as free-riders and eventually pushing them to the edge of the overlay network, our AGP propagates search queries mainly within the core of the topology, accelerating the information discovery process. Furthermore, the clustering of nodes based on authentic and similar content in our AGP also improves the quality of search results. We have implemented the AGP with the PeerSim simulation engine and conducted thorough experiments on diverse network topologies and various mixtures of honest/dishonest nodes to demonstrate improvements in topology transformation, query efficiency, and search quality by our AGP.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Another metric could be the node’s buffer space for outgoing messages, during an epoch.
 
2
Ultra-peers are nodes with high bandwidth capacity and high number of direct connections.
 
Literature
1.
go back to reference McClain L (2004) RIAA posting bad music files to deter illegal downloaders. The Dialy Texan McClain L (2004) RIAA posting bad music files to deter illegal downloaders. The Dialy Texan
2.
go back to reference BBC NEWS (2004) Viruses turn to peer-to-peer nets. BBC NEWS BBC NEWS (2004) Viruses turn to peer-to-peer nets. BBC NEWS
5.
go back to reference Castro M, Druschel P, Ganesh AJ, Rowstron AIT, Wallach DS (2002) Secure routing for structured peer-to-peer overlay networks. In: OSDI, Boston, December 2002 Castro M, Druschel P, Ganesh AJ, Rowstron AIT, Wallach DS (2002) Secure routing for structured peer-to-peer overlay networks. In: OSDI, Boston, December 2002
6.
go back to reference Chawathe Y, Ratnasamy S, Breslau L, Lanham N, Shenker S (2003) Making Gnutella-like P2P systems scalable. In: Proceedings of the 2003 ACM conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM ’03). ACM, Karlsruhe, pp 407–418CrossRef Chawathe Y, Ratnasamy S, Breslau L, Lanham N, Shenker S (2003) Making Gnutella-like P2P systems scalable. In: Proceedings of the 2003 ACM conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM ’03). ACM, Karlsruhe, pp 407–418CrossRef
7.
go back to reference Condie T, Kamvar SD, Garcia-Molina H (2004) Adaptive peer-to-peer topologies. In: Proceedings of the 4th international conference on peer-to-peer computing (P2P’04). IEEE Computer Society, Washington, DC, pp 53–62CrossRef Condie T, Kamvar SD, Garcia-Molina H (2004) Adaptive peer-to-peer topologies. In: Proceedings of the 4th international conference on peer-to-peer computing (P2P’04). IEEE Computer Society, Washington, DC, pp 53–62CrossRef
8.
go back to reference Cornelli F, Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2002) Choosing reputable servents in a P2P network. In: WWW ’02: proceedings of the 11th international conference on world wide web. ACM, New York, pp 376–386 Cornelli F, Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2002) Choosing reputable servents in a P2P network. In: WWW ’02: proceedings of the 11th international conference on world wide web. ACM, New York, pp 376–386
9.
go back to reference Crespo A, Garcia-Molina H (2004) Semantic overlay networks for P2P systems. In: AP2PC, New York, July 2004, pp 1–13 Crespo A, Garcia-Molina H (2004) Semantic overlay networks for P2P systems. In: AP2PC, New York, July 2004, pp 1–13
11.
go back to reference Exarchakos G, Antonopoulos N (2007) Resource sharing architecture for cooperative heterogeneous P2P overlays. J Netw Syst Manag 15(3):311–334CrossRef Exarchakos G, Antonopoulos N (2007) Resource sharing architecture for cooperative heterogeneous P2P overlays. J Netw Syst Manag 15(3):311–334CrossRef
12.
go back to reference Feige U, Shamir A (1990) Witness indistinguishable and witness hiding protocols. In: STOC, Baltimore, 13–17 May 1990, pp 416–426 Feige U, Shamir A (1990) Witness indistinguishable and witness hiding protocols. In: STOC, Baltimore, 13–17 May 1990, pp 416–426
13.
go back to reference Gupta M, Judge P, Ammar M (2003) A reputation system for peer-to-peer networks. In: NOSSDAV ’03: proceedings of the 13th international workshop on Network and operating systems support for digital audio and video. ACM, New York, pp 144–152CrossRef Gupta M, Judge P, Ammar M (2003) A reputation system for peer-to-peer networks. In: NOSSDAV ’03: proceedings of the 13th international workshop on Network and operating systems support for digital audio and video. ACM, New York, pp 144–152CrossRef
14.
go back to reference Hughes D, Coulson G, Walkerdine J (2005) Free riding on Gnutella revisited: the bell tolls? IEEE Distrib Syst Online 6(6):1–13CrossRef Hughes D, Coulson G, Walkerdine J (2005) Free riding on Gnutella revisited: the bell tolls? IEEE Distrib Syst Online 6(6):1–13CrossRef
16.
go back to reference Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: WWW ’03: proceedings of the 12th international conference on world wide web. ACM, New York, pp 640–651 Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: WWW ’03: proceedings of the 12th international conference on world wide web. ACM, New York, pp 640–651
17.
go back to reference Li J, Loo BT, Hellerstein JM, Kaashoek MF, Karger DR, Morris R (2003) On the feasibility of peer-to-peer web indexing and search. In: 2nd international workshop on peer-to-peer systems (IPTPS ’03), Berkeley, 20–21 February 2003, pp 207–215 Li J, Loo BT, Hellerstein JM, Kaashoek MF, Karger DR, Morris R (2003) On the feasibility of peer-to-peer web indexing and search. In: 2nd international workshop on peer-to-peer systems (IPTPS ’03), Berkeley, 20–21 February 2003, pp 207–215
18.
go back to reference Liu L, Antonopoulos N, Mackin S (2007) Social peer-to-peer for resource discovery. In: PDP. Washington, DC, pp 459–466 Liu L, Antonopoulos N, Mackin S (2007) Social peer-to-peer for resource discovery. In: PDP. Washington, DC, pp 459–466
19.
go back to reference Liu L, Mackin S, Antonopoulos N (2006) Small world architecture for peer-to-peer networks. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology. IEEE Computer Society, Washington, DC, pp 451–454CrossRef Liu L, Mackin S, Antonopoulos N (2006) Small world architecture for peer-to-peer networks. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology. IEEE Computer Society, Washington, DC, pp 451–454CrossRef
20.
go back to reference Marti S, Garcia-Molina H (2004) Limited reputation sharing in P2P systems. In: EC ’04: proceedings of the 5th ACM conference on electronic commerce. ACM, New York, pp 91–101CrossRef Marti S, Garcia-Molina H (2004) Limited reputation sharing in P2P systems. In: EC ’04: proceedings of the 5th ACM conference on electronic commerce. ACM, New York, pp 91–101CrossRef
21.
go back to reference Marti S, Garcia-Molina H (2006) Taxonomy of trust: categorizing P2P reputation systems. Comput Netw 50(4):472–484MATHCrossRef Marti S, Garcia-Molina H (2006) Taxonomy of trust: categorizing P2P reputation systems. Comput Netw 50(4):472–484MATHCrossRef
22.
go back to reference Mekouar L, Iraqi Y, Boutaba R (2006) Peer-to-peer’s most wanted: malicious peers. Comput Netw 50(4):545–562MATHCrossRef Mekouar L, Iraqi Y, Boutaba R (2006) Peer-to-peer’s most wanted: malicious peers. Comput Netw 50(4):545–562MATHCrossRef
23.
go back to reference Ramaswamy L, Liu L (2003) Free riding: a new challenge to peer-to-peer file sharing systems. In: Proceedings of the 36th annual Hawaii international conference on system sciences, 2003, 6–9 January 2003, p 10 Ramaswamy L, Liu L (2003) Free riding: a new challenge to peer-to-peer file sharing systems. In: Proceedings of the 36th annual Hawaii international conference on system sciences, 2003, 6–9 January 2003, p 10
25.
go back to reference Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MATHCrossRefMathSciNet Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MATHCrossRefMathSciNet
26.
go back to reference Saroiu S, Gummadi PK Gribble SD (2002) A measurement study of peer-to-peer file sharing systems. In: MMCN ’02: proceedings of multimedia computing and networking, San Jose, January 2002 Saroiu S, Gummadi PK Gribble SD (2002) A measurement study of peer-to-peer file sharing systems. In: MMCN ’02: proceedings of multimedia computing and networking, San Jose, January 2002
27.
go back to reference Singh A, Liu L (2003) TrustMe: anonymous management of trust relationships in decentralized P2P systems. In: P2P ’03: proceedings of the 3rd international conference on peer-to-peer computing. IEEE Computer Society, Washington, DC, p 142 Singh A, Liu L (2003) TrustMe: anonymous management of trust relationships in decentralized P2P systems. In: P2P ’03: proceedings of the 3rd international conference on peer-to-peer computing. IEEE Computer Society, Washington, DC, p 142
28.
go back to reference Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 ACM SIGCOMM conference. San Diego, California, pp 149–160 Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 ACM SIGCOMM conference. San Diego, California, pp 149–160
29.
go back to reference Stutzbach D, Rejaie R, Sen S (2005) Characterizing unstructured overlay topologies in modern P2P file-sharing systems. In: Proceedings of the ACM SIGCOMM internet measurement conference. Berkeley, California Stutzbach D, Rejaie R, Sen S (2005) Characterizing unstructured overlay topologies in modern P2P file-sharing systems. In: Proceedings of the ACM SIGCOMM internet measurement conference. Berkeley, California
30.
go back to reference Tsoumakos D, Roussopoulos N (2003) A comparison of peer-to-peer search methods. In: WebDB, San Diego, 12–13 June 2003 Tsoumakos D, Roussopoulos N (2003) A comparison of peer-to-peer search methods. In: WebDB, San Diego, 12–13 June 2003
31.
go back to reference Xiong L, Liu L (2003) A reputation-based trust model for peer-to-peer ecommerce communities. In: ACM conference on electronic commerce. San Diego, California, pp 228–229 Xiong L, Liu L (2003) A reputation-based trust model for peer-to-peer ecommerce communities. In: ACM conference on electronic commerce. San Diego, California, pp 228–229
32.
go back to reference Zhu Y, Yang X, Hu Y (2005) Making search efficient on Gnutella-Like P2P systems. In: IPDPS ’05: proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS’05) – papers. IEEE Computer Society, Washington, DC, p 56.1 Zhu Y, Yang X, Hu Y (2005) Making search efficient on Gnutella-Like P2P systems. In: IPDPS ’05: proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS’05) – papers. IEEE Computer Society, Washington, DC, p 56.1
Metadata
Title
Adaptive neighborhood selection in peer-to-peer networks based on content similarity and reputation
Authors
Ioannis Pogkas
Vassil Kriakov
Zhongqiang Chen
Alex Delis
Publication date
01-03-2009
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2009
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-008-0018-2

Other articles of this Issue 1/2009

Peer-to-Peer Networking and Applications 1/2009 Go to the issue

Premium Partner