5,047 research outputs found

    A connection management protocol for promoting cooperation in Peer-to-Peer networks

    Get PDF
    Cataloged from PDF version of article.The existence of a high degree of free riding in Peer-to-Peer (P2P) networks is an important threat that should be addressed while designing P2P protocols. In this paper we propose a connection-based solution that will help to reduce the free riding effects on a P2P network and discourage free riding. Our solution includes a novel P2P connection type and an adaptive connection management protocol that dynamically establishes and adapts a P2P network topology considering the contributions of peers. The aim of the protocol is to bring contributing peers closer to each other on the adapted topology and to push the free riders away from the contributors. In this way contribution is promoted and free riding is discouraged. Unlike some other proposals against free riding, our solution does not require any permanent identification of peers or a security infrastructure for maintaining a global reputation system. It is shown through simulation experiments that there is a significant improvement in performance for contributing peers in a network that applies our protocol. © 2007 Elsevier B.V. All rights reserved

    Dynamic analysis of an institutional conflict within the music industry

    Get PDF
    Peer-to-peer technology has made massive music piracy possible, which, in turn, has arguably had a significant economic impact on the recording industry. Record labels have responded to online piracy with litigation and are also considering self-help measures. It is currently not obvious whether or not these counter-piracy strategies will ultimately stifle online file sharing in the long term. With this paper we attempt to add to our understanding of the conflict within the institution that is the commercial music industry. We conduct an institutional analysis of the industry in transition and extend the traditional pattern modeling methodology with a formal resource-based model of a representative online music network. The model accounts for complex causal interactions between resources, private provision of common goods, free riding and membership dynamics. The numerical implementation of the model is the basis of a decision support system, which is used in a series of computer experiments that emulate anti-piracy scenarios. We show that a peer-to-peer system may be quite resilient to outside disturbances. The experiments also demonstrate that policies rank differently in their effectiveness based on a selected yardstick.Peer-to-peer (P2P) networks; Online File Sharing; Copyright; Simulation

    Peer-to-Peer Networks and Computation: Current Trends and Future Perspectives

    Get PDF
    This research papers examines the state-of-the-art in the area of P2P networks/computation. It attempts to identify the challenges that confront the community of P2P researchers and developers, which need to be addressed before the potential of P2P-based systems, can be effectively realized beyond content distribution and file-sharing applications to build real-world, intelligent and commercial software systems. Future perspectives and some thoughts on the evolution of P2P-based systems are also provided

    A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks

    Get PDF
    File sharing peer-to-peer networks have become quite popular of late as a new paradigm for information exchange among large number of users in the Internet. However, these networks suffer from several problems such as fake content distribution, free riding, whitewashing, poor search scalability, lack of a robust trust model and absence of user privacy protection mechanism. In this paper, a secure and efficient searching scheme for peer-to-peer networks has been proposed that utilizes topology adaptation by constructing an overlay of trusted peers where the neighbors are selected based on their trust ratings and content similarities. While increasing the search efficiency by intelligently exploiting the formation of semantic community structures among the trustworthy peers, the scheme provides a highly reliable module for protecting the privacy of the users and data in the network. Simulation results have demonstrated that the proposed scheme provides efficient searching to good peers while penalizing the malicious peers by increasing their search times
    • …
    corecore