Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1719850.1719862guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Uncoordinated peer selection in P2P backup and storage applications

Published: 19 April 2009 Publication History

Abstract

In this work we tackle the problem of on-line backup and storage with a peer-to-peer approach. We propose a novel system architecture involving the users' devices that confederate by pooling their resources and offer an alternative to capital-intensive data-centers. In contrast to current peer-to-peer architectures that build upon distributed hash-tables, we investigate whether an uncoordinated approach to data placement would prove effective in providing embedded incentives for users to offer local resources to the system. By modeling peers as selfish entities striving for minimizing their cost in participating to the system, we analyze equilibrium topologies that materialize from the process of peer selection, whereby peers establish bi-lateral links that involve storing data in a symmetric way. System stratification, colluding peers with similar contribution efforts, is an essential outcome of the peer selection process: peers are lured to improve the "quality" of local resources they provide to reach lower operational costs. Our results are corroborated by both a game-theoretic analysis and a numerical evaluation of several system configurations.

References

[1]
Amazon S3, http://aws.amazon.com
[2]
Wuala, http://wua.la
[3]
AllMyData, http://allmydata.org
[4]
UbiStorage, http://www.ubistorage.com
[5]
D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, D. Lewin, "Consistent hashing and random trees," STOC, 1997
[6]
D. Grolimund, L. Meisser, S. Schmid, R. Wattenhofer, "Havelaar: A Robust and Efficient Reputation System for Active Peer-to-Peer Systems," NetEcon, 2006
[7]
J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, B. Zhao, "Oceanstore: An architecture for global-scale persistent storage," ASPLOS, 2000
[8]
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, R. P. Wattenhofer, "FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment," OSDI, 2002
[9]
R. Bhagwan, K. Tati, Y. Cheng, S. Savage, G. M. Voelker, "TotalRecall: System Support for Automated Availability Management," NSDI, 2004
[10]
A. G. Dimakis, P. Brighten Godfrey, M. J. Wainwright, K. Ramchandran, "Network Coding for Distributed Storage Systems", INFOCOM, 2007
[11]
P. Antoniadis, C. Courcoubetis, R. Mason, "Comparing economic incentives in peer-to-peer networks," Computer Networks, Vol. 46, N. 1, 2004
[12]
A. Fabrikant, A. Luthra, E. Maneva, C. H. Papadimitriou, S. Shenker, "On a Network Creation Game," PODC, 2003
[13]
N. Laoutaris, G. Smaragdakis, A. Bestavros, J. W. Byers, "Implications of Selfish Neighbor Selection in Overlay Networks," INFOCOM, 2007
[14]
R. Bhagwan, S. Savage, G. M. Voelker, "Understanding Availability," IPTPS, 2003
[15]
R. W. Irving, S. Scott, "The stable fixtures problem - A many-to-many extension of stable roommates," Discrete Applied Mathematics, V. 155 N. 17, 2007
[16]
L. Toka, P. Michiardi, "A dynamic exchange game," PODC, 2008
[17]
L. Toka, P. Michiardi, "Analysis of user-driven peer selection in peer-to-peer backup and storage systems," GameComm, 2008
[18]
J. Corbo, D. C. Parkes, "The price of selfish behavior in bilateral network formation," PODC, 2005
[19]
S. Kirkpatrick, C. D. Gelatt, M. P. Vecchi, "Optimization by Simulated Annealing," Science, Vol. 220, N. 4598, 1983.

Cited By

View all
  • (2013)An authentication framework for peer-to-peer cloudProceedings of the 6th International Conference on Security of Information and Networks10.1145/2523514.2523531(94-101)Online publication date: 26-Nov-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
INFOCOM'09: Proceedings of the 28th IEEE international conference on Computer Communications Workshops
April 2009
418 pages
ISBN:9781424439683

Publisher

IEEE Press

Publication History

Published: 19 April 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2013)An authentication framework for peer-to-peer cloudProceedings of the 6th International Conference on Security of Information and Networks10.1145/2523514.2523531(94-101)Online publication date: 26-Nov-2013

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media