skip to main content
article

Overcoming free-riding behavior in peer-to-peer systems

Authors Info & Claims
Published:01 July 2005Publication History
Skip Abstract Section

Abstract

While the fundamental premise of peer-to-peer (P2P) systems is that of voluntary resource sharing among individual peers, there is an inherent tension between individual rationality and collective welfare that threatens the viability of these systems. This paper surveys recent research at the intersection of economics and computer science that targets the design of distributed systems consisting of rational participants with diverse and selfish interests. In particular, we discuss major findings and open questions related to free-riding in P2P systems: factors affecting the degree of free-riding, incentive mechanisms to encourage user cooperation, and challenges in the design of incentive mechanisms for P2P systems.

References

  1. Adar, E. and Huberman, B. A. (2000). Free Riding on Gnutella. First Monday, 5(10).Google ScholarGoogle Scholar
  2. Akella, A., Karp, R., Papadimitriou, C., Seshan, S., and Shenker, S. (2002). Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP. In SIGCOMM 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Andrade, N., Mowbray, M., Lima, A., Wagner, G., and Ripeanu, M. (2005). Influences on cooperation in bittorrent communities. In To appear, ACM SIGCOMM workshop on the Economics of Peer-to-Peer Systems (P2PECON'05). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Andreoni, J. (1989). Giving with Impure Altruism: Applications to Charity and Ricardian Equivalence. Journal of Political Economy, 97(6):1447-58.Google ScholarGoogle ScholarCross RefCross Ref
  5. Buchegger, S. and LeBoudec, J.-Y. (2004). A Robust Reputation System for Peer-to-Peer and Mobile Ad-Hoc Networks. In Workshop on Economics of Peer-to-Peer Systems.Google ScholarGoogle Scholar
  6. Buttyan, L. and Hubaux, J. (2002). Enforcing Service Availability in Mobile Ad-Hoc WANs. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Camerer, C. F. (2003). Behavioral Game Theory. Princeton University Press.Google ScholarGoogle Scholar
  8. Castro, M., Druschel, P., Ganesh, A., Rowstron, A., and Wallach, D. S. (2002). Security for Structured Peer-to-Peer Overlay Networks. In Proceedings of Multimedia Computing and Networking 2002 (MMCN '02).Google ScholarGoogle Scholar
  9. Castro, M., Druschel, P., Kermarrec, A.-M., Nandi, A., Rowstron, A., and Singh, A. (2003). Splitstream: High-bandwidth multicast in cooperative environments. In Proceedings of 19th ACM Symposium on Operating Systems Principles. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cheng, A. and Friedman, E. (2005). Sybilproof reputation mechanisms. In To appear, ACM SIGCOMM workshop on the Economics of Peer-to-Peer Systems (P2PECON'05). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Christin, N. and Chuang, J. (2005). A cost-based analysis of overlay routing geometries. In IEEE INFOCOM.Google ScholarGoogle Scholar
  12. Christin, N., Grossklags, J., and Chuang, J. (2004). Near Rationality and Competitive Equilibria in Networked Systems. In Proc. SIGCOMM workshop on Practice and Theory of Incentives and Game Theory in Networked Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Chu, Y.-H., Chuang, J., and Zhang, H. (2004). A Case for Taxation in Peer-to-Peer Streaming Broadcast. In Proc. SIGCOMM workshop on Practice and Theory of Incentives and Game Theory in Networked Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chun, B., Chaudhuri, K., Wee, H., Barreno, M., Papadimitriou, C., and Kubiatowicz, J. D. (2004). Selfish caching in distributed systems. In ACM Principles of Distributed Computing (PODC). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Clarke, E. (1971). Multipart Pricing of Public Goods. Public Choice, 1:17-33.Google ScholarGoogle ScholarCross RefCross Ref
  16. Cohen, B. (2003). Incentives build robustness in bittorrent. In Workshop on Economics of Peer-to-Peer Systems.Google ScholarGoogle Scholar
  17. Cole, R., Dodis, Y., and TimRoughgarten (2003). Pricing Networks with Selfish Routing. In Workshop on Economics of Peer-to-Peer Systems.Google ScholarGoogle ScholarCross RefCross Ref
  18. Dellarocas, C. (2000). Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior. In Second ACM Conference on Electronic Commerce. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Dellarocas, C. and Resnick, P. (2003). Online Reputation Mechanisms: A Roadmap for Future Research. Summary Report of the First Interdisciplinary Symposium on Online Reputation Mechanisms. In Workshop on economics of peer-to-peer networks.Google ScholarGoogle Scholar
  20. Douceur, J. R. (2002). The Sybil Attack. In Electronic Proceedings of the International Workshop on Peer-to-Peer Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Fabrikant, A., Luthra, A., Maneva, E., Papadimitriou, C., and Shenker, S. (2003). On a network creation game. In ACM Symposium on Principles of Distriubted Computing (PODC). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Feigenbaum, J., Papadimitriou, C., Sami, R., and Shenker, S. (2002). A BGP-based Mechanism for Lowest-Cost Routing. In Proceedings of the ACM Symposium on Principles of Distributed Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Feigenbaum, J., Papadimitriou, C., and Shenker, S. (2001). Sharing the Cost of Multicast Transmissions. In Journal of Computer and System Sciences, volume 63, pages 21-41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Feigenbaum, J. and Shenker, S. (2002). Distributed Algorithmic Mechanism Design: Recent Results and Future Directions. In Proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Feldman, M. and Chuang, J. (2005). The Evolution of Cooperation Under Cheap Pseudonyms. In Proc. of the seventh international IEEE conference on E-Commerce Technology. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Feldman, M., Chuang, J., Stoica, I., and Shenker, S. (2005b). Hidden-Action in Multi-Hop Routing. In ACM Conference on Electronic Commerce (EC'05). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Feldman, M., Lai, K., Stoica, I., and Chuang, J. (2004a). Robust Incentive Techniques for Peer-to-Peer Networks. In ACM Conference on Electronic Commerce (EC'04). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Feldman, M., Papadimitriou, C., Stoica, I., and Chuang, J. (2004b). Free-Riding and Whitewashing in Peer-to-Peer Systems. In Proc. SIGCOMM workshop on Practice and Theory of Incentives and Game Theory in Networked Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Ferreira, P. and Sirbu, M. (2005). Interconnected Communication Networks Provisioned Selfishly. In ACM Conference on Electronic Commerce (EC'05). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Friedman, E. and Resnick, P. (1998). The Social Cost of Cheap Pseudonyms. Journal of Economics and Management Strategy, 10(2):173-199.Google ScholarGoogle ScholarCross RefCross Ref
  31. Friedman, E. and Shenker, S. (1997). Learning and implementation on the internet. In Manuscript. New Brunswick: Rutgers University, Department of Economics.Google ScholarGoogle Scholar
  32. Golle, P., Leyton-Brown, K., Mironov, I., and Lillibridge, M. (2001). Incentives For Sharing in Peer-to-Peer Networks. In Proceedings of the 3rd ACM conference on Electronic Commerce, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Groves, T. (1973). Incentives in Teams. Econometrica, 41:617-663.Google ScholarGoogle ScholarCross RefCross Ref
  34. Gupta, M., Judge, P., and Ammar, M. (2003). A reputation system for peer-to-peer networks. In Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Hughes, D., Coulson, G., and Walkerdine, J. (2005). Freeriding on gnutella revisited: The bell tolls? In Submitted to IEEE Distributed Systems Online. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Jakobsson, M., Hubaux, J.-P., and Buttyan, L. (2003). A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. In Financial Cryptography.Google ScholarGoogle Scholar
  37. Jun, S. and Ahamad, M. (2005). Incentives in bittorrent induce free riding. In To appear, ACM SIGCOMM workshop on the Economics of Peer-to-Peer Systems (P2PECON'05). Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Jurca, R. and Faltings, B. (2005). Reputation-based pricing of p2p services. In To appear, ACM SIGCOMM workshop on the Economics of Peer-to-Peer Systems (P2PECON'05). Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. (2003). The EigenTrust Algorithm for Reputation Management in P2P Networks. In Proceedings of the Twelfth International World Wide Web Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Morselli, R., Katz, J., and Bhattacharjee, B. (2004). A game-theoretic framework for analyzing trust-inference protocols. In 2nd Workshop on Economics of Peer-to-Peer Systems.Google ScholarGoogle Scholar
  41. Ngan, T.-W. J., Wallach, D. S., and Druschel, P. (2004). Incentive-compatible peer-to-peer multicast. In Workshop on Economics of Peer-to-Peer Systems.Google ScholarGoogle Scholar
  42. Nisan, N. and Ronen, A. (1999). Algorithmic Mechanism Design. In Proceedings of the 31st Symposium on Theory of Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Rosenschein, J. S. and Zlotkin, G. (1994). Rules of Encounter. MIT Press.Google ScholarGoogle Scholar
  44. Saroiu, S., Gummadi, P. K., and Gribble, S. D. (2002). A Measurement Study of Peer-to-Peer File Sharing Systems. In Proceedings of Multimedia Computing and Networking 2002 (MMCN '02).Google ScholarGoogle Scholar
  45. Shneidman, J. and Parkes, D. C. (2004). Overcoming rational manipulation in mechanism implementation.Google ScholarGoogle Scholar
  46. Varian, H. R. (1995). Economic Mechanism Design for Computerized Agents. In Proc. of Usenix Workshop on Electronic Commerce. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Vickrey, W. (1961). Counterspeculation, Auctions, and Competitive Sealed Tenders. Journal of Finance, 16:8-37.Google ScholarGoogle ScholarCross RefCross Ref
  48. Yu, B. and Singh, M. P. (2000). A Social Mechanism of Reputation Management in Electronic Communities. In Proceedings of fourth international workshop in cooperative information. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Zhong, S., Chen, J., and Yang, Y. R. (2003). Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. In 22nd Annual Joint Conference of the IEEE Computer and Communications Societies.Google ScholarGoogle Scholar

Index Terms

  1. Overcoming free-riding behavior in peer-to-peer systems

                          Recommendations

                          Comments

                          Login options

                          Check if you have access through your login credentials or your institution to get full access on this article.

                          Sign in

                          Full Access

                          PDF Format

                          View or Download as a PDF file.

                          PDF

                          eReader

                          View online with eReader.

                          eReader