Authentication-free fault-tolerant peer-to-peer service provisioning

作者: Wolfgang Kellerer , Wojciech Galuba , Karl Aberer , Zoran Despotovic

DOI:

关键词:

摘要: The correct functioning of a peer-to-peer network relies on cooperative behavior peers as service providers. Current approaches to detection and deterrence non-cooperative behavior, such reputation systems, rely (1) global sharing observations about provisioning (2) authentication. These two factors severely impair the practical applicability. We propose novel forward feedback protocol that is completely local authentication-free where locally independently learn avoid routing failures. evaluate our system in variety failure scenarios. convergence rates resilience are close those fully centralized system. High churn tolerated without significant drop performance. For increased fault tolerance takes advantage replicas existing network. proposed lightweight can readily be integrated into any architecture requests recursively routed, which includes all modern structured overlays.

参考文章(18)
S. Lee, R. Sherwood, Bobby Bhattacharjee, Cooperative peer groups in NICE international conference on computer communications. ,vol. 2, pp. 1272- 1282 ,(2003) , 10.1109/INFCOM.2003.1208963
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Tim Moreton, Andrew Twigg, None, Enforcing Collaboration in Peer-to-Peer Routing Services Lecture Notes in Computer Science. pp. 255- 270 ,(2003) , 10.1007/3-540-44875-6_18
Thomas Repantis, Vana Kalogeraki, Decentralized trust management for ad-hoc peer-to-peer networks workshop on middleware for pervasive and ad hoc computing. pp. 6- ,(2006) , 10.1145/1169075.1169081
Krishna P. Gummadi, Stefan Saroiu, Steven D. Gribble, King: estimating latency between arbitrary internet end hosts acm special interest group on data communication. ,vol. 32, pp. 5- 18 ,(2002) , 10.1145/571697.571700
Karl Aberer, Zoran Despotovic, Managing trust in a peer-2-peer information system Proceedings of the tenth international conference on Information and knowledge management - CIKM'01. pp. 310- 317 ,(2001) , 10.1145/502585.502638
Rob Sherwood, Seungjoon Lee, Bobby Bhattacharjee, Cooperative peer groups in NICE Computer Networks. ,vol. 50, pp. 523- 544 ,(2006) , 10.1016/J.COMNET.2005.07.012
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman, SybilGuard: defending against sybil attacks via social networks acm special interest group on data communication. ,vol. 36, pp. 267- 278 ,(2006) , 10.1145/1151659.1159945
L. Mui, M. Mohtashemi, A. Halberstadt, A computational model of trust and reputation hawaii international conference on system sciences. ,vol. 8, pp. 188- 188 ,(2002) , 10.1109/HICSS.2002.994181
A. Singh, T.-W. Ngan, P. Druschel, D. S. Wallach, Eclipse Attacks on Overlay Networks: Threats and Defenses ieee international conference computer and communications. pp. 1- 12 ,(2006) , 10.1109/INFOCOM.2006.231