P2P系统中激励相容的机制设计与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近些年来P2P系统受到越来越多的关注。P2P网络的一个重要目标就是系统内所有用户共享各自的资源,如计算能力、网络带宽、存储空间、内容。目前大多数P2P系统都是建立在用户愿意提供共享资源的假设之上的,这一假设忽视了节点出于自身利益考虑不按既定协议行事的能力。相关研究发现,理性和自私性是节点不可忽视的本性,节点的自利行为导致了P2P网络内很严重的问题,如搭便车和公共物品的悲剧等。
     为了解决这些问题,越来越多的研究投入了这个领域。目前的研究成果大致可以分为两个方向:一种是基于概率估计的信誉管理模型,另一种是基于博弈论的激励机制。
     本文提出的半结构化的解决方案结合了以上两种技术,将节点分为两类:精英节点和普通节点。精英节点组成结构化网络,通过一个微支付平台有偿交换服务;普通节点组成无结构网络,通过基于推荐的信誉管理机制管理服务。
     其中,微支付平台分为两层:定价层和清算层。在定价层,假设所有参与节点都是理性的和自私的,然后根据经济学已有的激励相容的Vickrey-Clarke- Groves机制提出一个能够最大化网络总体效用的定价机制。此机制可以在O(n)的时间复杂度内满足以下特性:1)激励相容,每个节点都能够如实的汇报自己的网络连接状况;2)个体理性;3)完全分布式,多个服务提供者和多个服务请求者能够同时进行服务和信息交互。在清算层,将每个节点的服务信息存储在多个第三方节点上,这些节点组成一个远程的、分布的、冗余的银行节点集。
     仿真实验的结果表明了这套解决方案的有效性和健壮性。在避免过多网络开销的情况下能够有效的配置节点资源。另外,虽然此机制是建立在节点理性的假设基础之上,但节点理性并不是一个必要条件,此机制面对节点的恶意行为仍具有一定的健壮性。
Peer-to-Peer (P2P) systems are receiving considerable interest in recent years. An important goal in P2P networks is that all peers provide resources, including computing power, bandwidth, storage space, and content. Most of the existing P2P networks are typically designed around the assumption that all peers are most willingly to contribute their resources and assist others. This assumption ignores the peers’ability to modify the behavior of an algorithm for self-interested reasons. However, as experience with P2P networks shows, rationality and selfishness are real issues in P2P networks. Selfish behaviors of peers may lead to serious problems of P2P network, such as free-riding and tragedy of commons.
     In order to solve these problems, there are increasing considerations on reputation system design in the study of P2P networks. The current work in the field can be roughly divided into two groups. One is reputation-based trust models that rely on the well known probabilistic estimation techniques use only a limited fraction of the available feedback. The other is game theory based incentive mechanisms that rely on aggregating the entire available feedback in the social network in hope achieving as much robustness against possible misbehavior as possible.
     In our work, we combined both techniques into a semi-structured mechanism which divide all the peers into 2 parts: super peers and normal peers. Super peers compose a structured P2P network using a micro-payment platform that we design to exchange services. While, normal peers compose an unstructured P2P network using a recommonand-based trust model.
     The micro-payment platform that we mentioned above has two layers: pricing layer and accounting layer.
     In pricing layer, we provide a general pricing mechanism that can maximize P2P networks’social welfare in a way of Vickrey-Clarke-Groves family, while assuming every peer in P2P networks is rational and selfish. This pricing mechanism has some desirable properties using an O(n) algorithm: (1) incentive compatibility, every peer truly report its connection type; (2) individually rationality; and (3) fully decentralized, we design a multiple-provider multiple consumer model, concerning about the service provider and service consumer individually.
     In accounting layer, we storage each peer’s account information in several third party peers. These peers are chosed by a remote, distributed, and redundant way.
     Simulation results show the efficiency and robustness of our mechanism. This solution can deploy peers’resource efficiently with rational overhead. Additional, individual rationality is not necessary condition of our mechanism. This solution can deal with malicious behaviors well.
引文
[1] Intel White Paper, Peer-to-Peer-Enabled Distributed Computing, Intel 2001.
    [2] A. Veytsel, There is no p-to-p market... but there is a market for p-to-p, Aberdeen Group Presentation, 2001.
    [3] C. Shirky, What is p2p... and what isn’t, O’Reilly Network, 2001.
    [4] Dejan S. Milojicic, Vana Kalogeraki, Rajan Lukose etc, Peer-to-Peer Computing, HP Laboratories Palo Alto,2002,57.
    [5]罗杰文,Peer to Peer (P2P)综述,http://www.intsci.ac.cn/users/luojw/ papers/p2p.htm,2005.
    [6] Napster Inc. http://www.naspter.com
    [7] Gnutella,http://www.gnutelliums.com
    [8] eDonkey,http:// www.edonkey2000.com
    [9] eMule,http://www.emule.org
    [10] BitTorrent, http://bitconjurer.org/BitTorrent/
    [11] FreeNet,http://freenetproject.org/lang/en
    [12] SETI@home, http://setiathome.ssl.berkeley.edu/
    [13] JXTA Book,http://www.brendonwilson.com/projects/jxta
    [14] Gregory Alan Bolcer,Michael Gorlick,Peer-to-Peer Architectures and the Magi Open-Source Infrastructure, Endeavors Technology,2000.
    [15] Preeti Mehra, Groove,16th November,2001,ECE-579.
    [16] Sixto Ortiz Jr., Instant Messaging: No Longer Just Chat, IEEE Computer,March 2001.
    [17] Jeremie Miller, Jabber, Peer-to-Peer:Harnessing the Power of Disruptive Technologies, O'Reilly, March 2001.
    [18] Peter Saint-Andre,Jabber Technology Overview,Jabber Software Foundation, 2001.
    [19] S. Baset, H. Schulzrinne, An Analysis of the Skype Peer-to-Peer Internel Telephony Protocol, Arxiv preprint cs.NI/0412017,2004.
    [20] Michael Reiter and Aviel Rubin. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), June 1998.
    [21] Siu Man Lui, Sai Ho Kwok, Interoperablility of Peer-To-Peer File Sharing Protocols, ACM SIGecom Exchanges,Vol.2,No.2,August 2002.
    [22] D. Tsoumakos, N. Roussopoulos, A comparison of peer-to-peer search methods, Proceedings of the Sixth International Workshop on the Web and Databases,2003.
    [23] M. Barren, J. M. Hellerstein, R. Huebsch etc, Complex Queries in DHT-based Peer-to-Peer Networks, Peer-To-Peer Systems: First International Workshop,IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002: Revised Papers, 2002.
    [24] I. Stoica, R. Morris, D. Karger etc, Chord: A Scalable Peertopeer Lookup Service for Internet Applications,ACM SIGCOMM'01,San Diego,CA, USA,2001.
    [25] S. Ratnasamy,P. Francis, M. Handley etc, A Scalable Content- Addressable Network,ACM SIGCOMM’01,San Diego,CA,USA,2001.
    [26] Ben Y. Zhao, John Kubiatowicz, Anthony D. Joseph., Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. Technical Report UCB/CSD-01-1141, UC Berkeley, Apr. 2001.
    [27] Antony Rowstron,Peter Druschel,Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms. Heidelberg, Germany, November 2001.
    [28] S. Ratnasamy, I. Stoica, S. Shenker, Routing Algorithms for DHTs: Some Open Questions, Peer-To-Peer Systems: First International Workshop,IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002: Revised Papers, 2002.
    [29] KaZaA,http://www.kazaa-download.de/
    [30] Roger Dingledine, Nick Mathewson, and Paul Syverson. Reputation in P2P Anonymity Systems. In workshop on economics of P2P systems 2003.
    [31] F. Cornelli, E. Damiani, S. Vimercati etc, Choosing Reputable Servents in a P2P Network, Proceedings of the 11th World Wide Web Conference, Hawaii, USA, May 2002.
    [32] R. Albert,H. Jeong, Error and attack tolerance of complex networks. Nature,2000,406: 378~381.
    [33] D. Tsoumakos,N. Roussopoulos. A comparison of peer-to-peer search methods. Proceedings of the sixth International Workshop on Web and Databases,2003.
    [34] C. Tang, Z. Xu, S. Dwarkadas, Peer-to-peer information retrieval using self-organizing semantic overlay networks, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, ACM Press New York, NY, USA,2003,175~186.
    [35] P. Reynolds, A. Vahdat, Efficient peer-to-peer keyword searching, Proceedings of International Middleware Conference, Springer, 2003,21~40.
    [36] D.Watts, S. Strogatz, Collective dynamics of‘small- world’networks, Nature,1998, 6684(393): 409~410.
    [37] Hui Zhang, Ashish Goel, Ramesh Govindan. Using the Small-World Model to Improve FreeNet Performance. IEEE Infocom, 2002.
    [38] W. de Ridder, Corporate dealings with the network economy, Futures, 2006, 38(9):1103~1118.
    [39] E. Adar, B. Huberman, Free riding on Gnutella, Tech. Rep. Xerox PARC, 2000.
    [40] S. Handurukande, A. Kermarrec, F. Le Fessant etc, Peer sharing behaviour in the eDonkey network, and implications for the design of server-less file sharing systems, Proceedings of the 2006 EuroSys conference, ACM Press New York, NY, USA, 2006, 40(4):359~371.
    [41] G. Hardin, The Tragedy of the Commons, Science,1968, 3859 (162):1243~1248.
    [42] M. Feldman, C. Papadimitriou, J. Chuang etc, Free-riding and white- washing in peer-to-peer systems”, Proc. of the 3rd Annual Workshop on Economics and Information Security, 2004.
    [43] Z. Despotovic, K. Aberer, P2P reputation management:Probabilistic estimation vs Social networks,Elsevier: Computer Networks,2006, 50(4): 485~500.
    [44] J. Sabater, C. Sierra, Review on Computational Trust and Reputation Models, Artificial Intelligence Review,2005,24(1):33~60.
    [45] Y. Wang, J. Vassileva, Bayesian Network Trust Model in Peer-to-Peer Networks, Agents And Peer-to-peer Computing: Second International Workshop, AP2PC 2003, Melbourne, Australia, July 14, 2003: Revised and Invited Papers, 2004.
    [46] A. A. Selcuk, E. Uzun, M. R.Pariente, A reputation-based trust management system for P2P networks. Proceedings of the IEEE International Conference on Cluster Computing and the Grid, 2004, 251~258.
    [47] S. D. Kamvar, M. T. Schlosser, H. Garcia-Molina, The EigenTrust algorithm for reputation management in P2P networks, Proceedings of the Twelfth International World Wide Web Conference, 2003.
    [48] L. Eschenauer, V. D. Gligor, J. Baras, On Trust Establishment in Mobile Ad-Hoc Networks. Security Protocols: 10th International Workshop, Cambridge, UK, April 17-19, 2002: Revised Papers, Springer,2004.
    [49] Roger Dingledine, Nick Mathewson, Paul Syverson, Reputation in P2P Anonymity Systems. Proceedings of International Workshop on Economics of P2P Systems, 2003.
    [50] G. Q. Xu, Z. Y. Feng, H. B. Wu etc, Swift Trust in Virtual Temporary Systems A Model Based on Dempster-Shafer Theory, Journal of E-Commerce, 2007.
    [51] L. Xiong, L. Liu, PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities, IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7):843~857.
    [52] K. Aberer, Z. Despotovic, Managing Trust in a Peer-to-Peer Information System, In Proceedings of the 10th International Conference on Information and Knowledge Management (ACM CIKM), New York, USA, 2001.
    [53] M. Khambatti, P. Dasgupta, K.D Ryu, A role-based trust model for peer-to-peer communities and dynamic coalitions, Proceedings. Second IEEE Information Assurance Workshop, 2004, 141~154.
    [54] N. Stakhanova, S. Basu, J. Wong etc, Trust Framework for P2P Networks using Peer-Profile based Anomaly Technique, Proceedings of the Second International Workshop on Security in Distributed Computing Systems, 2005,203~209.
    [55] E. Damiani, S. Paraboschi, P. Samarati etc, A reputation-based approach for choosing reliable resources in peer-to-peer networks, Proceedings of the 9th ACM conference on Computer and communications security, ACM Press New York, NY, USA, 2002, 207~216.
    [56] R. Gupta, A.K. Somani, Reputation management framework and its use as currency in large-scale peer-to-peer networks, Proceedings of the Fourth International Conference on Peer-to-Peer Computing, 2004, 124~132.
    [57] M. Gupta, P. Judge, M. Ammar, A reputation system for peer-to-peer networks, Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video, ACM Press New York, NY, USA, 2003,144~152.
    [58] N. Nisan, A. Ronen, Algorithmic Mechanism Design, Proceedings of the thirty-first annual ACM symposium on Theory of computing, 1999, 129~140.
    [59] J. Feigenbaum, S. Shenker, Distributed algorithmic mechanism design: Recent results and future directions, Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, 2002, 1~13.
    [60] J. Feigenbaum, C. Papadimitriou, R. Sami etc, A BGP-based mechanism for lowest-cost routing, Springer: Distributed Computing, 2005, 18(1):61~72.
    [61] M. Feldman, C. Papadimitriou, J. Chuang etc, Free-riding and whitewashing in peer-to-peer systems, Proceedings of the 3rd Annual Workshop on Economics and Information Security, 2004.
    [62] M. Feldman, K. Lai, I. Stoica etc, Robust incentive techniques for peer-to-peer networks, Proceedings of the 5th ACM conference on Electronic commerce, ACM Press New York, NY, USA, 2004,102~111.
    [63] S. Sanghavi, B. Hajek, A new mechanism for the free-rider problem, ACM Press New York: Applications, Technologies, Architectures, and Protocols for Computer Communication, NY, USA, August 2005, 122~127.
    [64] R. Jurca, B. Faltings, Reputation-based pricing of P2P services, ACM Press New York: Applications, Technologies, Architectures, and Protocols for Computer Communication, NY, USA, August 2005, 144~149.
    [65] B. Yu, M. P. Singh, Incentive Mechanisms for Peer-to-Peer Systems, Agents and Peer-to-peer Computing: Second International Workshop, AP2PC 2003, Melbourne, Australia, July 14, 2003: Revised and Invited Papers, 2004.
    [66] R. Ma, S. Lee, J. Lui etc, Incentive and service differentiation in p2p networks: a game theoretic approach, IEEE/ACM Transactions on Networking (TON), 2006, 14(5):978–991.
    [67] R. K. Dash, S. D. Ramchurn, N. R. Jennings, Trust-Based Mechanism Design, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, IEEE Computer Society Washington, DC, USA, 2004,748~755.
    [68] R. Jurca, B. Faltings, Minimum payments that reward honest reputation feedback, Proceedings of the 7th ACM conference on Electronic commerce, ACM Press New York, NY, USA, 2006, 190~199.
    [69] S. Braynov, T. Sandholm, Incentive Compatible Mechanism for Trust Revelation, Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, ACM Press New York, NY, USA, 2002, 310~311.
    [70] MMAPPS,http://www.csg.ethz.ch/research/projects/mmapps
    [71] D. Hausheer, N. C. Liebau, A. Mauthe etc, Token-Based accounting and distributed pricing to introduce market mechanisms in a peer-to-peer file sharing scenario, Proceedings of the 3rd International Conference on Peer-to-Peer Computing, 2003, 200~201.
    [72] D. Hausheer, N. Liebau, A. Mauthe etc, Towards A Market Managed Peer-to-Peer File Sharing System Using Token-based Accounting and Distributed Pricing, TIK Report Nr, vol.179,2003.
    [73] D. Haussheer, B. Stiller, Decentralized auction-based pricing with PeerMart, Proceedings of the 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005, 381~394.
    [74] N. Liebau, V. Darlagiannis, Token-Based Accounting for P2P-Systems, Kommunikation in Verteilten Systemen (Kivs), 2005.
    [75] N. Liebau, V. Darlagiannis, A. Mauthe, A token-based accounting scheme for p2p-systems, Technical Report TR-2004-05, Technical University at Darmstadt, January 2004.
    [76]I. Osipkov, P. Wang, N. Hopper, Y. Kim, Robust accounting in decentralized p2p storage systems, Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, 2006.
    [77]罗伯特吉本斯,博弈论基础(高峰,魏玉根),北京:中国社会科学出版社,1999.
    [78]田国强,经济机制理论:信息效率与激励机制设计,经济学, 2003, 2(2): 271~308.
    [79] W. Vickrey, Counterspeculation, auctions, and competitive sealed tenders, The Journal of Finance, 1961, 16(1): 8~37.
    [80] E. Clarke, Multipart pricing of public goods, Public Choice,1971, 11(1):17~33.
    [81] T. Groves, Incentives in teams, Econometrica, 1973, 41(4): 617~631.
    [82] J. Green, J. Laffont, Characterization of satisfactory mechanisms for the revelation of preferences for public goods, Econometrica, 1977, 45(2): 427~438.
    [83] D. Friedman, The double auction market institution: a survey, The Double Auction Market: Institutions, Theories, and Evidence, Addison-Wesley, 1993, 3~25.
    [84] D. C. Parkes, J. Shneidman, Distributed Implementations of Vickrey-Clarke-Groves Mechanisms, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, New York, 2004, 261~268.
    [85] R. K. Dash, N. R. Jennings, D. C. Parkes, Computational-mechanism design: a call to arms, IEEE Intelligent Systems and Their Applications, 2003, 18(6): 40~47.
    [86] N. Nisan, Algorithms for Selfish Agents Mechanism Design for Distributed Computation, Stacs 99: Proceedings on the 16th Annual Symposium on Theoretical Aspects of Computer Science, Trier, Germany, March 4-6,1999.
    [87] D. K. Hausheer, Peer Mart: Secure Decentralized Pricing and Accounting for Peer-to-Peer Systems,博士学位论文, Swiss Federal Institute of Technology,2006.
    [88] I. Macho-Stadler, J. D. Perez-Castrillo,信息经济学引论:激励与合约(管毅平),上海:上海财经大学出版社,2004.
    [89] J. Shneidman, D. C. Parkes, Rationality and self-interest in peer to peer networks, Proceedings of the International Peer to Peer Symposium, Berkeley, Feb 2003.
    [90] P. Druschel, A. Rowstron, PAST: A large-scale, persistent peer-to-peer storage utility, Proceedings of HotOS VIII, Schoss Elmau, Germany, May 2001.
    [91] M. Castro, P. Druschel, A.M. Kermarrec etc, Scribe: a large-scale and decentralized application-level multicast infrastructure, IEEE Journal on Selected Areas in Communications, 2002, 20(8):1489~1499.
    [92] FreePastry, http://www.cs.rice.edu/CS/Systems/Pastry/FreePastry
    [93] P. Dabek, B. Zhao, P. Druschel etc, Towards a Common API for Structured Peer-to-Peer Overlays, Proceedings of the Second International Workshop on Peer-To-Peer Systems, Berkeley, CA, USA, February 21-22, 2003.
    [94] D. Boneh, M. Franklin, Efficient Generation of Shared RSA Keys, Journal of the ACM, 2001, 48(4):702~722.
    [95] M.T. Schlosser, T.E. Condie, S.D. Kamvar, Simulating a File-Sharing P2P Network, Proceedings of the Workshop on Semantics in Peer-to-Peer and Grid Computing,2003.
    [96] Query Cycle Simulator, http://p2p.stanford.edu/
    [97] R.R. Korfhage, Information storage and retrieval, Wiley,1997.
    [98] S. Saroiu, P.K. Gummadi, S.D. Gribble, A measurement study of peer-to-peer file sharing systems, Proceedings of Multimedia Computing and Networking, 2002.
    [99] T. Groves, J. Ledyard, Optimal Allocation of Public Goods: A Solution to the" Free Rider" Problem, JSTOR: Econometrica, 1977, 45(4):783~809.
    [100] E. Maskin, Nash Equilibrium and Welfare Optimality, Blackwell Synergy, 1998.
    [101] L. Hurwicz, E. Maskin, A. Postlewaite, Feasible Implementation of Social Choice Correspondences by Nash Equilibria, University of Minnesota, mimeo, 1984.
    [102] Dana Moore,John Hebeler,对等网(苏忠,战晓雷等),北京:清华大学出版社, 2003.
    [103]杨天路,刘宇宏,张文等,P2P网络技术原理与系统开发案例,北京:人民邮电出版社,2007.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700