2008
DOI: 10.1109/jsac.2008.080926
|View full text |Cite
|
Sign up to set email alerts
|

Managing a Peer-to-Peer Data Storage System in a Selfish Society

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(25 citation statements)
references
References 8 publications
0
25
0
Order By: Relevance
“…Therefore, if we consider that the users of a P2P network behave selfishly, we cannot just rely on replication mechanisms and consider that the data stored in a working peer is ''safe'' without a secure control mechanism that continuously verifies this. If both peers are on-line, the problem could easily be solved by performing periodical checks of the data availability as proposed by Toka et al in [22,23]. Michiardi and Toka in [24] presented an analytical model based on game theory for the detection of selfish peer and a similar solution was provided previously by Pamies-Juarez et al in [25].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, if we consider that the users of a P2P network behave selfishly, we cannot just rely on replication mechanisms and consider that the data stored in a working peer is ''safe'' without a secure control mechanism that continuously verifies this. If both peers are on-line, the problem could easily be solved by performing periodical checks of the data availability as proposed by Toka et al in [22,23]. Michiardi and Toka in [24] presented an analytical model based on game theory for the detection of selfish peer and a similar solution was provided previously by Pamies-Juarez et al in [25].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it seems better to choose an appropriate nonce length (N bits), based on the chunk size (S bits) and digest's length of the hash function (H bits). Then: S 6 2 N Á H ) N P log 2 ðS=HÞ ð 7Þ Which means that with S ¼ 1 MB ¼ 2 23 bit-long chunks and MD5…”
Section: Security Of the Incentive And Verification Mechanismsmentioning
confidence: 99%
“…A number of related works focus on economic modeling of backup and storage systems and focus in particular on incentive mechanisms: we point the reader to [15] and its references for an overview of such works. In [15] selfish user behavior is described using non-cooperative game theory: users are modeled by their strategies on their demand (in terms of amount of data to backup) and their offer (offered resources such as storage space, available bandwidth and uptime).…”
Section: Related Workmentioning
confidence: 99%
“…However, it has been acknowledged since then [14,15] that those pure peer-to-peer architectures may fail to deliver reliable storage by exploiting the resources of peers, mainly due to the low availability of peers and the slow up-link of their network connections. One straightforward solution is to exclude peers with a low availability or a slow network connection to access the service [16]; this nevertheless excludes many participants and significant amounts of exploitable resources [1,2].…”
Section: Introductionmentioning
confidence: 99%