Price-Based Incentive Mechanism for P2P Anonymous Communication System
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [23]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    This paper proposes a price-based incentive mechanism for P2P anonymous communication system. Through pricing on dummy traffic, relay traffic and export traffic, the P2P anonymous communication system builds a pricing system. The pricing system quantifies the user's system resource production and consumption. First, it can effectively stimulate users in P2P anonymous communication system to provide relay and export services. These services effectively improve system performance. Secondly, the pricing system can motivate free-riders in providing dummy traffic. The dummy traffic enhances the system's anonymity. Finally, the pricing system is also capable of prompting the user to request the appropriate relay nodes according to their needs in order to avoid unnecessary consumption of system resources. User policy analysis based on scenarios confirms the validity of price incentives P2P anonymous communication system.

    Reference
    [1] Wright M, Adler M, Levine BN, Shields C. Defending anonymous communication against passive logging attacks. In:Proc. of the 2003 IEEE Symp. on Security and Privacy (IEEES&P2003). IEEE Computer Society Press, 2003. 28-43.
    [2] https://metrics.torproject.org
    [3] Acquisti A, Dingledine R, Syverson, P. On the economics of anonymity. In:Wright RN, ed. Proc. of the FC 2003. LNCS 2742, Heidelberg:Springer-Verlag, 2003. 84-102.
    [4] Cohen B. Incentives build robustness in BitTorrent. In:Proc. of the Workshop on Economics of Peer-to-Peer Systems. 2003.
    [5] Nandi A, Ngan TWJ, Singh A, Druschel P, Wallach DS. Scrivener:Providing incentives in cooperative content distribution systems. In:Alonso G, ed. Proc. of the Middleware 2005. LNCS 3790, Heidelberg:Springer-Verlag, 2005. 270-291.
    [6] Wallach DS, Druschel P. Enforcing fair sharing of peer-to-peer resources. In:Proc. of the 2nd Int'l Workshop on Peer-to-Peer Systems (IPTPS). 2003.
    [7] Cox LP, Noble BD. Samsara:Honor among thieves in peer-to-peer storage. In:Proc. of the 19th ACM Symp. on Operating System Principles (SOSP 2003). 2003.
    [8] Waldman M, Mazières, D. Tangler:A censorship resistant publishing system based on document entanglements. In:Proc. of the 8th ACM Conf. on Computer and Communication Security (CCS 2001). 2001.
    [9] Dingledine R, Freedman MJ, Molnar D. Accountability measures for peer-to-peer systems. In:Peer-to-Peer:Harnessing the Power of Disruptive Technologies. O'Reilly and Associates, 2000.
    [10] Resnick P. The social cost of cheap pseudonyms. Journal of Economics and Management Strategy, 2001,10(2):173-199.
    [11] Kamvar SD, Schlosser MT, Garcia-Molina H. The EigenTrust algorithm for reputation management in p2p networks. In:Proc. of the 12th Int'l World Wide Web Conf. 2003.
    [12] Blanc A, Liu YK, Vahdat A. Designing incentives for peer-to-peer routing. In:Proc. of the 24th IEEE INFOCOM. 2005.
    [13] Fu Y, Chase JS, Chun BN, Schwab S, Vahdat A. SHARP:An architecture for secure resource peering. In:Proc. of the 19th ACM Symp. on Operating System Principles (SOSP 2003). 2003.
    [14] Vishnumurthy V, Chandrakumar S, Sirer EG. KARMA:A secure economic framework for p2p resource sharing. In:Proc. of the Workshop on Economics of Peer-to-Peer Systems. 2003.
    [15] Ntarmos N, Triantafillou P. Seal:Managing accesses and data in peer-to-peer sharing networks. In:Proc. of the 4th IEEE Int'l Conf. on P2P Computing. 2004.
    [16] Androulaki E, Raykova M, Srivatsan S, Stavrou A, Bellovin SM. PAR:Payment for anonymous routing. In:Borisov N, Goldberg I, eds. Proc. of the PETS 2008. LNCS 5134, Heidelberg:Springer-Verlag, 2008. 219-236.
    [17] Golle P, Leyton-Brown K, Mironov I, Lillibridge M. Incentives for sharing in peer-to-peer networks. In:Proc. of the 3rd ACM Conf. on Electronic Commerce. 2001.
    [18] Franz E, Jerichow A, Wicke G. A payment scheme for mixes providing anonymity. In:Proc. of the Int'l IFIP/GI Conf. on Trends in Distributed Systems for Electronic Commerce (TREC'98). 1998. 94-108.
    [19] Dingledine R, Wallach DS. Building incentives into Tor. In:Proc. of the Financial Cryptography (FC 2010). 2010.
    [20] Jansen R, Hopper N, Kim Y. Recruiting new tor relays with BRAIDS. In:Proc. of the ACM Conf. on Computer and Communications Security (CCS). 2010.
    [21] Moore WB, Wacek C, Sherr M. Exploring the potential benefits of expanded rate limiting in Tor:Slow and steady wins the race with tortoise. In:Proc. of the 2011 Annual Computer Security Applications Conf. (ACSAC 2011). 2011.
    [22] Guo RL. Research and design of user incentive mechanism in P2P anonymous communication system[MS. Thesis]. Harbin:Harbin Institute of Technology, 2006(in Chinese with English abstract).
    [22] 郭人路.P2P匿名通信系统用户激励机制的研究与设计[硕士学位论文].哈尔滨:哈尔滨工业大学,2006.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

郑明,吴建平,刘武.一种基于价格的P2P匿名通信系统激励机制.软件学报,2015,26(S2):52-60

Copy
Share
Article Metrics
  • Abstract:2152
  • PDF: 3494
  • HTML: 0
  • Cited by: 0
History
  • Received:May 02,2014
  • Revised:August 22,2014
  • Online: January 11,2016
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063