Academia.eduAcademia.edu

Outline

TRIBLER: a social-based peer-to-peer system

2007, Concurrency and Computation: Practice and Experience

https://doi.org/10.1002/CPE.1189

Abstract

Most current P2P file sharing systems treat their users as anonymous, unrelated entities, and completely disregard any social relationships between them. However, social phenomena such as friendship and the existence of communities of users with similar tastes may be well exploited in such systems, to increase their usability and performance. In this paper we present a novel social-based P2P file-sharing paradigm that exploits social phenomena by maintaining social networks and using these in content discovery, content recommendation, and downloading. Based on this paradigm's first class concepts such as taste groups, friends, and friends-offriends, we have designed and implemented the TRIBLER P2P filesharing system as a set of extensions to Bittorrent. We present and discuss the design of TRIBLER, and we show evidence that TRIBLER enables fast, trusted content discovery and recommendation at a low additional overhead, and a significant improvement in download performance.

References (14)

  1. E. Adar and B. A. Huberman. Free riding on gnutella. Technical report, Xerox PARC, August 2000.
  2. N. Borch. Social peer-to-peer for social people. In The Int'l Conf. on Internet Technologies and Applications, Sep 2005.
  3. J. S. Breese, D. Heckerman, and C. Kadie. Empirical analysis of predictive algorithms for collaborative filtering. In Proc. of UAI, 1998.
  4. A. Broder and M. Mitzenmacher. Network applications of bloom filters: A survey. In 40th Conference on Communication, Control, and Computing, 2002.
  5. N. Christin, A.S. Weigand, and J. Chuang. Content availibility, pollution and poisoning. In ACM E-Commerce Conference. ACM, June 2005.
  6. A. Fast, D. Jensen, and B. N. Levine. Creating social networks to improve peer-to-peer networking. In 11th ACM SIGKDD, Aug 2005.
  7. M. Jelasity and M. van Steen. Large-scale newscast computing on the Internet. Technical Report IR-503, 2002.
  8. Ralph C. Merkle. A digital signature based on a conventional encryption function. In CRYPTO '87, pages 369-378. Springer-Verlag, 1988.
  9. S. J. Nielson, S. A. Crosby, and D. S. Wallach. A taxonomy of rational attacks. In 4th Int'l Workshop on Peer-to-Peer Systems (IPTPS), Feb 2005.
  10. E. Pennisi. How did cooperative behavior evolve? Science, 309(5731):93+, July 2005.
  11. L. Plissonneau, J.-L. Costeux, and P. Brown. Analysis of Peer-to-Peer Traffic on ADSL. In Constantinos Dovrolis, editor, PAM, volume 3431 of LNCS, pages 69-82. Springer, 2005.
  12. J. A. Pouwelse, P. Garbacki, D. H. J. Epema, and H. J. Sips. The Bittorrent P2P file-sharing system: Measurements and analysis. In 4th Int'l Workshop on Peer-to-Peer Systems (IPTPS), Feb 2005.
  13. S. Voulgaris and M. van Steen. Epidemic-style management of semantic overlays for content-based searching. In EuroPar, Lisbon, Portugal, Aug 2005.
  14. J. Wong. Enhancing collaborative content delivery with helpers. Master's thesis, The University of British Columbia, Nov 2004.