Analyzing the Influence of Free-Riding Behavior and Approaches to Overcoming it in Peer-to-peer Systems

Volume 5, Issue 3, June 2020     |     PP. 78-88      |     PDF (275 K)    |     Pub. Date: June 28, 2020
DOI:    191 Downloads     3083 Views  

Author(s)

Margulan Yermek, School of Engineering and Digital Sciences, Nazarbayev University (NU), Kabanbay batyr 53, 010000 Nur-Sultan, Kazakhstan
Dias Sadykov, School of Engineering and Digital Sciences, Nazarbayev University (NU), Kabanbay batyr 53, 010000 Nur-Sultan, Kazakhstan
Zhansen Akhmetov, School of Engineering and Digital Sciences, Nazarbayev University (NU), Kabanbay batyr 53, 010000 Nur-Sultan, Kazakhstan
Ikechi A. Ukaegbu, School of Engineering and Digital Sciences, Nazarbayev University (NU), Kabanbay batyr 53, 010000 Nur-Sultan, Kazakhstan

Abstract
Performance, Reliability, Free Riders, Peer to Peer System

Keywords
Peer-to-peer systems are alternative systems to traditional client-server systems, which is becoming popular nowadays. However, as the system is dependent on each individual user contribution, the P2P system is facing problems due to users that consume more than they contribute to the system; so called free- riders. This paper offers solutions with the free-riding behavior of users introducing various mechanisms which would force users to actively participate in contribution to the system.

Cite this paper
Margulan Yermek, Dias Sadykov, Zhansen Akhmetov, Ikechi A. Ukaegbu, Analyzing the Influence of Free-Riding Behavior and Approaches to Overcoming it in Peer-to-peer Systems , SCIREA Journal of Electrical Engineering. Volume 5, Issue 3, June 2020 | PP. 78-88.

References

[ 1 ] D. Banerjee, S. Saha, S. Sen and P. Dasgupta, ”Reciprocal Resource Sharing in P2P Environments,” AAMAS’05, pp. 25-29, 2005,
[ 2 ] M. Feldman and J. Chuang, “Overcoming Free-Riding Behavior in Peer- to-Peer Systems,” ACM SIGecom Exchanges, Vol. 5, No. 4, pp. 41-50, July 2005.
[ 3 ] B. O. Obele, A. I. Ukaegbu and M. Kang, ”On Tackling Free-Riders in P2P Networks,” International Conference on Advanced Communication technology (ICACT), Feb. 15-18, pp. 2084-2089, 2009.
[ 4 ] S. Saroiu, P. K. Gummadi, and S. D. Gribble, “A measurement study of peer-to-peer file sharing systems,” In. Proc. of Multimedia Computing and Networking. (MMCN), 2002.
[ 5 ] J. Miller, “Characterization of Data on the Gnutella Peer-to-Peer Network,” In. Proc. of the 1st IEEE Consumer Communications and Networking Conference, 2004.
[ 6 ] M. Zhou, Y. Dai, and X. Li, “A measurement study of the structure overlay network in p2p file-sharing systems,” Advances in Multimedia, 2007.
[ 7 ] L. Xiong and L. Liu. “A reputation-based trust model for peer-to-peer ecommerce communities,” In ACM Conference on Electronic Commerce, 2003, pages 228-229, 2003.
[ 8 ] M. Karakaya, I. Ko¨rpeog˘lu, and O¨. Ulusoy, “Counteracting free riding in Peer-to-Peer networks. Computer Networks, 52(3), pp.675-694, 2008.
[ 9 ] J. Lee, R. Choi, S. Kim, K.Kim. ”Security Analysis of End-to-End Encryption in Telegram. Computer Networks” 2017 Symposium on Cryptography and Information Security Naha, Japan, Jan. 2017
[ 10 ] J.Jakobsen, C.Orlandi, “On the CCA (in) Security of MTProto” SPSM ’16 Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 113-116, Vienna, Austria, October 24 - 24, 2016.
[ 11 ] B. Alotibi, N. Alarifi, M. Abdulghani, L. Altoaimy, “Overcoming Free-Riding Behaviour in Peer-to-Peer Netwrks Using Points System Approach,” International Workshop on Peer-to-Peer architectures, Networks, and Systems (P2PANS), pp. 1060-1065, Belgium, May 2019.