Making Contribution-Aware Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles

نویسندگان

  • Michael K. Reiter
  • Vyas Sekar
  • Chad Spensky
  • Zhenghao Zhang
چکیده

Many peer-assisted content-distribution systems reward a peer based on the amount of datathat this peer serves to others. However, validating that a peer did so is, to our knowledge, anopen problem; e.g., a group of colluding attackers can earn rewards by claiming to have servedcontent to one another, when they have not. We propose a bandwidth puzzle mechanism tomake contribution-aware peer-assisted content distribution robust to such collusion. Ourconstruction both ties solving the puzzle to possession of content and, by issuing puzzlechallenges simultaneously to all parties claiming to have the same content, prevents onecontent-holder from solving many others’ puzzles. We bound (in the random oracle model)the adversaries’ ability to defeat our puzzle scheme. We also describe our integration ofbandwidth puzzles into a fully operational media streaming system, and demonstrate theattack resilience offered by bandwidth puzzles through simulations of both streaming andfile-sharing systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles

Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowledge, an open problem; e.g., a group of colluding attackers can earn rewards by claiming to have served content to one another, when they have not. We propose a puzzle mechanism to make contribution-aware peer-assisted ...

متن کامل

Making Contribution-Aware P2P Systems Robust to Collusion Attacks Using Bandwidth Puzzles

Many peer-to-peer (P2P) content-distribution systems reward a peer based on its contribution to the system, specifically the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowledge, an open problem; e.g., in a simple form of “ballot stuffing” attack, a group of colluding attackers can earn rewards by claiming to have served content to one anot...

متن کامل

Credo: Thwarting collusion attacks in peer-to-peer content distribution systems

Current peer-to-peer content distribution networks do not effectively encourage users to act as seeders; this results in suboptimal behavior as many users disconnect immediately upon retrieving files. Reputation systems can incentivize users to remain active and seed files. Unfortunately, existing reputation systems are unsatisfactory – they do not accurately capture a node’s net contribution i...

متن کامل

Peer-Assisted VoD: Making Internet Video Distribution Cheap

We consider the design and potential benefits of peerassisted video-on-demand, in which participating peers assist the server in delivering VoD content. The assistance is done in such a way that it provides the same user quality experience as pure clientserver distribution. We focus on the single-video approach, whereby a peer only redistributes a video that it is currently watching. We first d...

متن کامل

PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting

The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by cost-effective distribution of content, also giving rise to piracy. An end user (buyer/peer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009