Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles

نویسندگان

  • Michael K. Reiter
  • Vyas Sekar
  • Chad Spensky
  • Zhenghao Zhang
چکیده

Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowledge, an open problem; e.g., a group of colluding attackers can earn rewards by claiming to have served content to one another, when they have not. We propose a puzzle mechanism to make contribution-aware peer-assisted content distribution robust to such collusion. Our construction ties solving the puzzle to possession of specific content and, by issuing puzzle challenges simultaneously to all parties claiming to have that content, our mechanism prevents one content-holder from solving many others’ puzzles. We prove (in the random oracle model) the security of our scheme, describe our integration of bandwidth puzzles into a media streaming system, and demonstrate the resulting attack resilience via simulations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Making Contribution-Aware Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles

Many peer-assisted content-distribution systems reward a peer based on the amount of datathat this peer serves to others. However, validating that a peer did so is, to our knowledge, anopen problem; e.g., a group of colluding attackers can earn rewards by claiming to have servedcontent to one another, when they have not. We propose a bandwidth puzzle mechanism tomake contributio...

متن کامل

Making Contribution-Aware P2P Systems Robust to Collusion Attacks Using Bandwidth Puzzles

Many peer-to-peer (P2P) content-distribution systems reward a peer based on its contribution to the system, specifically the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowledge, an open problem; e.g., in a simple form of “ballot stuffing” attack, a group of colluding attackers can earn rewards by claiming to have served content to one anot...

متن کامل

Peer-Assisted VoD: Making Internet Video Distribution Cheap

We consider the design and potential benefits of peerassisted video-on-demand, in which participating peers assist the server in delivering VoD content. The assistance is done in such a way that it provides the same user quality experience as pure clientserver distribution. We focus on the single-video approach, whereby a peer only redistributes a video that it is currently watching. We first d...

متن کامل

PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting

The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. The mass popularity is primarily driven by cost-effective distribution of content, also giving rise to piracy. An end user (buyer/peer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant ...

متن کامل

Credo: Thwarting collusion attacks in peer-to-peer content distribution systems

Current peer-to-peer content distribution networks do not effectively encourage users to act as seeders; this results in suboptimal behavior as many users disconnect immediately upon retrieving files. Reputation systems can incentivize users to remain active and seed files. Unfortunately, existing reputation systems are unsatisfactory – they do not accurately capture a node’s net contribution i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009