Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Incentives for sharing in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Implementing a Reputation-Aware Gnutella Servent
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
PayWord and MicroMint: Two Simple Micropayment Schemes
Proceedings of the International Workshop on Security Protocols
Should we build Gnutella on a structured overlay?
ACM SIGCOMM Computer Communication Review
Computing trusted authority scores in peer-to-peer web search networks
AIRWeb '07 Proceedings of the 3rd international workshop on Adversarial information retrieval on the web
FairPeers: Efficient Profit Sharing in Fair Peer-to-Peer Market Places
Journal of Network and Systems Management
Quantifying Resistance to the Sybil Attack
Financial Cryptography and Data Security
Scrivener: providing incentives in cooperative content distribution systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Informant: detecting sybils using incentives
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Collusion in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
AESOP: altruism-endowed self-organizing peers
DBISP2P'04 Proceedings of the Second international conference on Databases, Information Systems, and Peer-to-Peer Computing
PeerMint: decentralized and secure accounting for peer-to-peer applications
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Scrivener: providing incentives in cooperative content distribution systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Hi-index | 0.00 |
We present SeAl1, a novel data/resource and data-access management infrastructure designed for the purpose of addressing a key problem in P2P data sharing networks, namely the problem of wide-scale selfish peer behavior. Selfish behavior has been manifested and well documented and it is widely accepted that unless this is dealt with, the scalability, efficiency, and the usefulness of P2P sharing networks will be diminished. SeAl essentially consists of a monitoring/accounting subsystem, an auditing/verification subsystem, and incentive mechanisms. The monitoring subsystem facilitates the classification of peers into selfish/altruistic. The auditing/verification layer provides a shield against perjurer/slandering and colluding peers that may try to cheat the monitoring subsystem. The incentives mechanisms efectively utilize these layers so to increase the computational/networking and data resources that are available to the community. Our extensive performance results show that SeAl performs its tasks swiftly, while the overhead introduced by our accounting and auditing mechanisms in terms of response time, network, and storage overheads are very small.