Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory

  • Nouha Oualha
  • Yves Roudier
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5343)

Abstract

This paper discusses the efficiency of audits as incentives for reducing free-riding in P2P storage applications, that is, lessening the number of peers that can store their data without contributing to the storage infrastructure. Audits are remote data verifications that can also be used to decide whether to cooperate with a given peer based on its behavior. We demonstrate how an audit-based strategy can dominate or outperform the free-riding strategy by exhibiting the equilibria of our evolutionary game theoretical model of a P2P storage application.

Keywords

evolutionary game trust establishment audit cooperation P2P storage 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Friedman, D.: On economic applications of evolutionary game theory. Journal of Evolutionary Economics 8, 15–43Google Scholar
  2. 2.
    Brandt, H., Sigmund, K.: The good, the bad and the discriminator–errors in direct and indirect reciprocity. Journal of Theoretical Biology 239(2), 183–194 (2006)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Oualha, N., Önen, M., Roudier, Y.: A Security Protocol for Self-Organizing Data Storage. In: Proceedings of 23rd International Information Security Conference (SEC 2008) IFIP Sec 2008, Milan, Italy (September 2008)Google Scholar
  4. 4.
    Oualha, N., Önen, M., Roudier, Y.: A Security Protocol for Self-Organizing Data Storage (extended version) Technical Report Nº RR-08-208, EURECOM (January 2008)Google Scholar
  5. 5.
    Oualha, N., Roudier, Y.: Securing ad hoc storage through probabilistic cooperation assessment. In: WCAN 2007, 3rd Workshop on Cryptography for Ad hoc Networks, Wroclaw, Poland, July 8 (2007)Google Scholar
  6. 6.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 598–609. ACM, New York (2007)Google Scholar
  7. 7.
    Juels, A., Kaliski, B.S.: PORs: Proofs of retrievability for large files., Cryptology ePrint archive, Report 2007/243 (June 2007)Google Scholar
  8. 8.
    Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote Integrity Checking. In: Proceedings of Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) (2004)Google Scholar
  9. 9.
    Filho, D.G., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. In: IACR Cryptology ePrint Archive (2006)Google Scholar
  10. 10.
    Sebe, F., Domingo-Ferrer, J., Martínez-Ballesté, A., Deswarte, Y., Quisquater, J.-J.: Efficient Remote Data Possession Checking in Critical Information Infrastructures. In: IEEE Transactions on Knowledge and Data Engineering, August 06, 2007, IEEE Computer Society Digital Library. IEEE Computer Society (December 6, 2007), http://doi.ieeecomputersociety.org/10.1109/TKDE.2007.190647
  11. 11.
    Schwarz, T., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of the IEEE Int’l Conference on Distributed Computing Systems (ICDCS 2006) (July 2006)Google Scholar
  12. 12.
    Jones, D.S., Sleeman, B.D.: Differential Equations and Mathematical Biology. Allen & Unwin, London (1983)CrossRefMATHGoogle Scholar
  13. 13.
    Oualha, N., Roudier, Y.: Reputation and Audits for Self-Organizing Storage. In: Workshop on Security in Opportunistic and SOCial Networks SOSOC 2008, Turkey, Istanbul (September 2008)Google Scholar
  14. 14.
    Oualha, N., Michiardi, P., Roudier, Y.: A game theoretic model of a protocol for data possession verification. In: IEEE International Workshop on Trust, Security, and Privacy for Ubiquitous Computing TSPUC 2007, Helsinki, Finland, June 18 (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Nouha Oualha
    • 1
  • Yves Roudier
    • 1
  1. 1.EURECOMSophia AntipolisFrance

Personalised recommendations