Advertisement

Charging in Peer-to-Peer Systems Based on a Token Accounting System

  • Nicolas Liebau
  • Oliver Heckmann
  • Aleksandra Kovacevic
  • Andreas Mauthe
  • Ralf Steinmetz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4033)

Abstract

Today, Peer-to-Peer applications are predominant on the internet when considered in terms of its traffic consumption. However apart from Skype, their commercial success is still very limited. This is due to the difficulties faced when trying to implement crucial functionality such as accounting and charging without violating the Peer-to-Peer paradigm. A fully decentralized accounting scheme based on tokens was presented by the authors last year. In this paper we analyse the interactions between token-based accounting and charging in order to enable peers to charge for their services. We present three different charging schemes using tokens as (1) pure receipts, as (2) Micropayment, and as (3) bill of exchange. These schemes are evaluated based on the provided security and the overhead traffic introduced into a Peer-to-Peer system.

Keywords

Service Requestor Reputation System Charge Scheme Service Session Account Holder 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wikipedia: Triple play (telecommunications) (2006), http://en.wikipedia.org/wiki/Triple_play_%28telecommunications%29
  2. 2.
    MetaMachine: eDonkey2000 (2004), http://www.edonkey2000.com
  3. 3.
    BBC: BBC integrated Media Player (2006), http://www.bbc.co.uk/imp/
  4. 4.
    Steinmetz, R., Wehrle, K.: Peer-to-Peer-Networking and -Computing. Informatik Spektrum 27(1), 51–54 (2004)CrossRefGoogle Scholar
  5. 5.
    Liebau, N., Darlagiannis, V., Mauthe, A., Steinmetz, R.: Token-based Accounting for P2P-Systems. In: Proceeding of Kommunikation in Verteilten Systemen KiVS 2005, pp. 16–28 (2005), (Received Best Paper Award)Google Scholar
  6. 6.
    Androutsellis-Theotokis, S., Spinellis, D., Karakoidas, V.: Performing peer-to-peer e-business transactions: A requirements analysis and preliminary design proposal. In: IADIS International e-Commerce 2004 Conference Proceedings, pp. 399–404 (2004)Google Scholar
  7. 7.
    Schoder, D.: Suitability of p2p for business transactions. In: Proceedings of the Peer-to-Peer Systems and Applications Daghstuhl Seminar, March 2004 (2004)Google Scholar
  8. 8.
    Gerke, J., Hausheer, D.: Peer-to-Peer Market Management. In: Steinmetz, R., Wehrle, K. (eds.) Peer-to-Peer Systems and Applications. LNCS, vol. 3485, pp. 491–507. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Gerke, J., Stiller, B.: A Service-Oriented Peer-to-Peer Middleware. In: Preceeding of 14. Fachtagung Kommunikation in Verteilten Systemen 2005 (KiVS 2005) (2005)Google Scholar
  10. 10.
    Hummel, T., Muhle, S., Schoder, D.: Business Models and Revenue Models. In: Steinmetz, R., Wehrle, K. (eds.) Peer-to-Peer Systems and Applications. LNCS, vol. 3485, pp. 473–489. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Hausheer, D., Stiller, B.: Decentralized auction-based pricing with peermart. In: Proceedings of 9th IFIP/IEEE International Symposium on Integrated Network Management (IM 2005) (2005)Google Scholar
  12. 12.
    Lang, K.R., Vragov, R.: A pricing mechanism for digital content distribution over peer-to-peer networks. In: HICSS 2005: Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS 2005) - Track 8, p. 211.1. IEEE Computer Society, Washington (2005)Google Scholar
  13. 13.
    Reichl, P., Hausheer, D., Stiller, B.: The Cumulus Pricing model as an adaptive framework for feasible, efficient, and user-friendly tariffing of Internet services. Computer Networks 43(1), 3–24 (2003)CrossRefGoogle Scholar
  14. 14.
    Heckmann, O., Darlagiannis, V., Karsten, M., Steinmetz, R.: A Price Communication Protocol for a Multi-Service Internet. In: Informatik 2001 - Wirtschaft und Wissenschaft in der Network Economy - Visionen und Wirklichkeit (2001)Google Scholar
  15. 15.
    Stiller, B., Fankhauser, G., Plattner, B., Weiler, N.: Charging and accounting for integrated internet services - state of the art, problems, and trends. In: The Internet Summit (INET 1998) (1998)Google Scholar
  16. 16.
    Briscoe, B., Darlagiannis, V., Heckmann, O., Huw, O., Siris, V., Stiller, B., Songhurst, D.: A Market Managed Multi-Service Internet. Computer Communications 26(4), 405–415 (2003)CrossRefGoogle Scholar
  17. 17.
    Hwang, J., Aravamudham, P., Liddy, E., Stanton, J., MacInnes, I.: Charging Control and Transaction Accounting Mechanisms using IRTL (Information Resource Transaction Layer) Middleware for P2P Services. In: International Workshops for Quality of Future Internet Services and Internet Charging and QoS Technologies (2002)Google Scholar
  18. 18.
    Hausheer, D., Gerke, J., Stiller, B.: A generic and modular accounting and charging system for peer-to-peer applications. In: 14. Fachtagung Kommunikation in Verteilten Systemen 2005 (KiVS 2005) (2005)Google Scholar
  19. 19.
    Roscoe, T., Hand, S.: Transaction-based charging in mnemosyne: A peer-to-peer steganographic storage system. In: Gregori, E., Cherkasova, L., Cugola, G., Panzieri, F., Picco, G.P. (eds.) NETWORKING 2002. LNCS, vol. 2376, pp. 335–350. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  20. 20.
  21. 21.
    Schoenmakers, B.: Basic Security of the ecashTM Payment System. In: Preneel, B., Rijmen, V. (eds.) State of the Art in Applied Cryptography. LNCS, vol. 1528, Springer, Heidelberg (1998)CrossRefGoogle Scholar
  22. 22.
    MMAPPS: Project Market Management of Peer-to-Peer Services (2004), http://www.mmapps.info
  23. 23.
    Gao, R.: P2P Yardsale Engine (Project Venezia) & P2P Yardsale Application (Project Gondola) (3), http://venezia-gondola.jxta.org/
  24. 24.
    Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)Google Scholar
  25. 25.
    Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Netw. 12(6), 1049–1063 (2004)CrossRefGoogle Scholar
  26. 26.
    Liebau, N., Darlagiannis, V., Heckmann, O., Steinmetz, R.: Asymmetric Incentives in Peer-to-Peer Systems. In: Proceddings of AMCIS 2005 (2005)Google Scholar
  27. 27.
    Darlagiannis, V., Liebau, N., Heckmann, O., Mauthe, A., Steinmetz, R.: Caching Indices for Efficient Lookup in Structured Overlay Networks. In: Despotovic, Z., Joseph, S., Sartori, C. (eds.) AP2PC 2005. LNCS (LNAI), vol. 4118, Springer, Heidelberg (2006)CrossRefGoogle Scholar
  28. 28.
    Sun Microsystems: Project JXTA (2004), http://www.jxta.org

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Nicolas Liebau
    • 1
  • Oliver Heckmann
    • 1
  • Aleksandra Kovacevic
    • 1
  • Andreas Mauthe
    • 2
  • Ralf Steinmetz
    • 1
  1. 1.Technische Universität Darmstadt 
  2. 2.Lancaster University 

Personalised recommendations