Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive

Published: 24 February 2022 Publication History

Abstract

In a distributed cloud, unlike centralized resource management, users provide and share resources. However, this allows for the existence of free riders who do not provide resources to others, but at the same time use resources that others provide. In a distributed cloud, resource providers share resources in a P2P fashion. In this paper, we propose a 3-pronged solution KeyPIn—a Key-based, Participation-based, and Incentive-based scheme to mitigate the free rider problem in a distributed cloud environment. We propose an incentive-based scheme based on game theory for providers to participate in the cloud by providing resources. This participation will be low for free riders thereby limiting their access to resources. A secure time instant key is generated based on a key management scheme that enables good users’ more time to access resources as their participation is high, whereas free riders are given limited or no time as their participation is low. Simulation results show that our scheme is effective in mitigating the free rider problem in the distributed cloud.

References

[1]
Michael Armbrust, Armando Fox, Rean Griffith, Anthony Joseph, Randy Katz, Andrew Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica and Matei Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing”, Technical report EECS-2009–28, UC Berkeley, 2009
[2]
Peter Mell and Timothy Grance, “NIST definition of cloud computing, National Institute of Standards and Technology”, Special Publication 800–145, 2011, “http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf”, Retreived July 22, 2014
[3]
Buyya, R. and Chee Shin Yeo and Venugopal, S., “Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities”, Proccedings 10th IEEE International Conference on. High Performance Computing and Communications, HPCC’08. IEEE, 2008.
[4]
Amazon EC2, “http://aws.amazon.com/ec2/”, Retrieved July 22, 2016
[6]
Fox A Cloud computing-what's in it for me as a scientist Science 2011 331 406-407
[7]
Praveen Khethavath, Johnson P Thomas, and Eric Chan-Tin, “Towards an efficient Distributed cloud computing architecture”, Peer-to-peer Networking and Applications (Springer), 2016
[8]
Hughes, Daniel, Geoff Coulson, and James Walkerdine. "Free riding on Gnutella revisited: the bell tolls?" IEEE distributed systems online 6.6 (2005).
[9]
Ramaswamy, Lakshmish, and Ling Liu. "Free riding: A new challenge to peer-to-peer file sharing systems." System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on. IEEE, 2003.
[10]
Krishnan, Ramayya, et al. "The impact of free-riding on peer-to-peer networks." System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on. IEEE, 2004.
[11]
Karakaya M, Korpeoglu I, and Ulusoy Ö Free riding in peer-to-peer networks IEEE Internet Comput 2009 13 2 92-98
[12]
Li X, Zhou F, and Yang X A multi-dimensional trust evaluation model for large-scale P2P computing Journal of Parallel and Distributed Computing 2011 71 6 837-847
[13]
Feldman M and Chuang J Overcoming free-riding behavior in peer-to-peer systems ACM sigecom exchanges 2005 5 4 41-50
[14]
Wang Y, Cai Z, Yin G, Gao Y, Tong X, and Han Q A game theory-based trust measurement model for social networks Computational Social Networks 2016 3 1 1-16
[15]
Tian C and Yang B Trust, a reputation and risk-based trust management framework for large-scale, fully decentralized overlay networks Futur Gener Comput Syst 2011 27 8 1135-1141
[16]
Boukerche A and Ren Y A trust-based security system for ubiquitous and pervasive computing environments Comput Commun 2008 31 18 4343-4351
[17]
P. Maymounkov and D. Mazieres. Kademlia: A peer-to-peer information system based on the xor metric. In Proceedings of IPTPS02, Cambridge, USA, Mar. 2002.
[18]
M. J. Osborne and A. Rubenstein, A Course in Game Theory. MIT Press, 1994.
[19]
Pal, D., Khethavath, P., Thomas, J.P. and Chen, T., 2015, August. Multilevel Threshold Secret Sharing in Distributed Cloud. In International Symposium on Security in Computing and Communication (pp. 13–23). Springer International Publishing.
[20]
[21]
QinLiu, GuojunWang, JieWu, “Time-based proxy re-encryption scheme for secure data sharing in a cloud environment” Information Sciences Volume 258, February 2014, Pages 355–370
[22]
Kenneth G. Paterson and Elizabeth A. Quaglia, “Time-Specic Encryption”, International Conference on Security and Cryptography for Networks SCN 2010: Security and Cryptography for Networks pp 1–16

Cited By

View all
  • (2023)Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature ReviewACM Computing Surveys10.1145/357858155:14s(1-69)Online publication date: 24-Jan-2023
  • (2022)Innovation input-output and output-lagged input relationships of the next-generation information industry in ChinaInformation Processing and Management: an International Journal10.1016/j.ipm.2022.10306659:6Online publication date: 1-Nov-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Cloud Computing: Advances, Systems and Applications
Journal of Cloud Computing: Advances, Systems and Applications  Volume 11, Issue 1
Dec 2022
1609 pages
ISSN:2192-113X
EISSN:2192-113X
Issue’s Table of Contents

Publisher

Hindawi Limited

London, United Kingdom

Publication History

Published: 24 February 2022
Accepted: 11 February 2022
Received: 06 September 2021

Author Tags

  1. Distributed cloud
  2. Free rider
  3. Game theory
  4. Trust
  5. Participation
  6. Key
  7. and Incentive

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature ReviewACM Computing Surveys10.1145/357858155:14s(1-69)Online publication date: 24-Jan-2023
  • (2022)Innovation input-output and output-lagged input relationships of the next-generation information industry in ChinaInformation Processing and Management: an International Journal10.1016/j.ipm.2022.10306659:6Online publication date: 1-Nov-2022

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media