Incorporating trust in the BitTorrent protocol
2007
Abstract
We present a trust management system tailored to the needs of the BitTorrent protocol. Unlike other trust management systems, our system is partially decentralized and assumes unstructured BitTorrent swarms. In particular, we use the tracker of each BitTorrent swarm, to compute and distribute global trust scores complementing the local trust scores maintained by each peer. Our simulation study indicates that our system significantly minimizes the downloading by a rogue peer in the swarm. We also found out that it resulted in a fairer allocation of chunks among peers with different link bandwidths.
References (33)
- K. Aberer and Z. Despotovic, "Managing trust in a peer-to-peer information system," Proc. 10 th Int. Conf. on Information and Knowledge Management, New York, NY, 2001.
- A. Bharambe, C. Herley and V. Padmanabhan, "Analyzing and improving a BitTorrent network's performance mechanisms," Proc. IEEE 25 th INFOCOM Conf., Barcelona, Spain, 2006.
- Multitracker metadata entry specification, http://bittornado.com/docs/multitracker-spec.txt
- R. Bazzi and G. Konjevod, "On the establishment of distinct identities in overlay networks," Proc. ACM Symp. on Principles of Distributed Computing, Las Vegas, NV, 2005.
- P. Bowes, Warner to start movie downloads, http://news.bbc.co.uk/1/hi/business/4753435.stm.
- B. Cohen, "Incentives build robustness in BitTorrent," Proc. Workshop on Economics of Peer- to-Peer Systems, Berkeley, CA, 2003.
- J. Douceur, "The Sybil attack," Proc. Int. Workshop on Peer-To-Peer Systems, Cambridge, MA, 2002.
- E. Daminani, S. Vimercati, S. Paraboschi, P. Samarati and F. Violante, "A reputation-based approach for choosing reliable resources in peer-to- peer networks," Proc. ACM Conf. on Computer and Communication Security, Washington DC, 2002.
- FastTrack protocol, Available: http://en.wikipedia.org/wiki/FastTrack.
- M. Feldman, K. Lai, J. Chuang, and I Stoica, "Robust incentive techniques for peer-to-peer networks," Proc. 3 rd ACM Conf. on Electronic Commerce, New York, NY, 2004.
- M. Gupta, P. Judge, and M. Ammar, "A reputation system for peer-to-peer networks," Proc. 13 th ACM Intl. Workshop on Network and Operating System Support for Digital Audio and Video, Monterey, CA, 2003.
- Gnutella protocol, Available: http://www.gnutella.com.
- S. Jun and M. Ahamad, "Incentives in BitTorrent ISBN # 1-56555-317-9 592 SPECTS 2007
- induce free riding," Proc. Workshop on Economics of Peer-to-Peer Systems, Philadelphia, PA, 2005.
- T. Kohno, A. Broido, and K. C. Claffy, "Remote physical device fingerprinting," IEEE Trans. on Dependable and Secure Computing, 2(2), 2005
- S. Kamvar, M. Schlosser and H. Garcia-Molina, "The Eigen algorithm for reputation management in P2P networks," Proc. 12 th Intl. WWW Conf., Buda- pest, Hungary, 2003.
- T. Locher, P. Moor, S. Schmid, and R. Wattenhofer, Free riding in BitTorrent is cheap. Proc. Workshop on Hot Topics in Networks, 2006.
- N. Liokgas, R. Nelson, E. Kohler and L. Zhang, "Exploiting BitTorrent for fun (but not profit)," Proc. International Workshop on Peer-to-Peer Systems, Santa Barbara, CA, 2006.
- S. Marti and H. Garcia-Molina, "Limited reputation sharing in P2P systems," Proc. ACM Conf. on Electronic commerce, New York, NY, 2004.
- A. Parker. The true picture of peer-to-peer file sharing, http://www.cachelogic.com/
- P. Resnick, R. Zeckhauser, E. Friedman and K. Kuwabara, "Trust management systems," Communications of the ACM, 43(12), 2000.
- N. Stakhanova, S. Ferrero, J. Wong and Y. Cai, "A reputation-based trust management in peer-to-peer network systems," Proc. Intl. Workshop on Security in Parallel and Distributed Systems, San Francisco, CA, 2004.
- S. Saroiu, K. Gummadi, R. Dunn, S. Gribble and H. Levy, "An analysis of Internet content delivery systems," Proc. USENIX Symp. on Operating systems Design and Implementation, Boston, MA, 2002.
- M. Sirivianos, J. Park, R. Chen and X. Yang, "Free- riding in BitTorrent networks with the large view exploit," Proc. Intl. Workshop on Peer-to-Peer Systems, Bellevue, WA, 2007.
- R. Thommes and M.J. Coates, "BitTorrent fairness: analysis and improvements," Proc. Workshop Internet, Telecom. and Signal Proc., Noosa, Australia, 2005.
- J. Wagner, Lindows Grabs BitTorrent By The Bit, http://www.internetnews.com/dev- news/article.php/3321911.
- G. Wu and T. Chiueh, "How efficient is BitTorrent?" Proc. 2003 SPIE Multimedia Computing and Networking Conf., San Jose, CA, 2006.
- A. Wagner and B. Plattner, "Peer-to-peer systems as attack platform for distributed denial-of-service," Proc. ACM SACT Workshop, Washington, DC, 2002.
- K. Walsh and E Sirer, "Fighting peer-to-peer spam and decoys with object reputation," Proc. 3 rd Workshop on the Economics of Peer-to-Peer Systems, Philadelphia, PA, 2005.
- L. Xiong and L. Liu, "Peertrust: supporting reputation-based trust in peer-to-peer communities," IEEE Transactions on Knowledge and Data Engineering, Special Issue on Peer-to-Peer Based Data Management, 16(7), 2004.
- W. Yang and N. Abu-Ghazaleh, "GPS: a general Peer-to-Peer simulator and its use for modeling BT," Proc. 13 th Intl. Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Atlanta, GA, 2005.
- R. Zhou and K. Hwang, "PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing," IEEE Transactions on Parallel and Distributed Systems, 18(5), 2007.
- C. Ziegler and G. Lausen, "Spreading activation models for trust propagation," Proc. 2004 IEEE International Conf. on e-Technology, e-Commerce, and e-Service, Taipei, Taiwan, 2004.