A SCHEME OF RESOURCE ALLOCATION AND STABILITY FOR PEER-TO-PEER FILE-SHARING NETWORKS

被引:5
|
作者
Li, Shiyong [1 ]
Sun, Wei [1 ]
Cheng-Guo, E. [1 ,2 ]
Shi, Lina [1 ,2 ]
机构
[1] Yanshan Univ, Sch Econ & Management, Qinhuangdao 066004, Peoples R China
[2] Yanshan Univ, Liren Coll, Qinhuangdao 066004, Peoples R China
基金
中国国家自然科学基金;
关键词
peer-to-peer networks; fairness; pricing; stability; utility maximization; SERVICE OVERLAY NETWORKS; INCENTIVE MECHANISM; OPTIMIZATION; REPUTATION; SYSTEMS;
D O I
10.1515/amcs-2016-0049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) networks offer a cost-effective and easily deployable framework for sharing content. However, P2P file-sharing applications face a fundamental problem of unfairness. Pricing is regarded as an effective way to provide incentives to peers to cooperate. In this paper we propose a pricing scheme to achieve reasonable resource allocation in P2P file-sharing networks, and give an interpretation for the utility maximization problem and its sub-problems from an economic point of view. We also deduce the exact expression of optimal resource allocation for each peer, and confirm it with both simulation and optimization software. In order to realize the optimum in a decentralized architecture, we present a novel price-based algorithm and discuss its stability based on Lyapunov stability theory. Simulation results confirm that the proposed algorithm can attain an optimum within reasonable convergence times.
引用
收藏
页码:707 / 719
页数:13
相关论文
共 50 条
  • [21] Peer-to-Peer File-Sharing: Psychological Reactance and the Theory of Planned Behaviour
    Allen, Peter J.
    Shepherd, Katherine L.
    Roberts, Lynne D.
    INTERNATIONAL JOURNAL OF TECHNOETHICS, 2010, 1 (04) : 49 - 64
  • [22] Securing pseudo identities in an anonymous peer-to-peer file-sharing network
    Chothia, Tom
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 279 - 282
  • [23] Finding peer-to-peer file-sharing using coarse network behaviors
    Collins, Michael P.
    Reiter, Michael K.
    Computer Security - ESORICS 2006, Proceedings, 2006, 4189 : 1 - 17
  • [24] Secure Routing in Structured Peer to Peer File-Sharing Networks
    Navabpour, Samaneh
    Asl, Negin F. Nejad
    Abbaspour, Maghsoud
    Behzadi, Akbar
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [25] A performance study of incentive schemes in peer-to-peer file-sharing systems
    Dingding Guo
    Yu-Kwong Kwok
    Xin Jin
    Jian Deng
    The Journal of Supercomputing, 2016, 72 : 1152 - 1178
  • [26] A performance study of incentive schemes in peer-to-peer file-sharing systems
    Guo, Dingding
    Kwok, Yu-Kwong
    Jin, Xin
    Deng, Jian
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (03): : 1152 - 1178
  • [27] Free-riders impact on throughputs of peer-to-peer file-sharing systems
    Wang K.
    Li J.-H.
    Pan L.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (03) : 273 - 278
  • [28] Global stability of Peer-to-Peer file sharing systems
    Qiu, Dongyu
    Sang, Weiqian
    COMPUTER COMMUNICATIONS, 2008, 31 (02) : 212 - 219
  • [29] Forensic investigation of peer-to-peer file sharing networks
    Liberatore, Marc
    Erdely, Robert
    Kerle, Thomas
    Levine, Brian Neil
    Shields, Clay
    DIGITAL INVESTIGATION, 2010, 7 : S95 - S103
  • [30] Filtering mandate: a cure for peer-to-peer file-sharing copyright infringement in China?
    Wei, Weixiao
    QUEEN MARY JOURNAL OF INTELLECTUAL PROPERTY, 2012, 2 (02) : 182 - 194