Adding incentives to file-sharing systems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Modern peer-to-peer file sharing systems rely heavily on the willingness of users to distribute files to others. A selfish user can choose to download a file and consume resources without uploading in return. This form of free-riding plagues all currently deployed peer-to-peer systems. We present a novel protocol for a BitTorrent.-like system (i.e.. one in which only one file is being shared) that strongly discourages users from downloading a file without sharing it. Our protocol requires very little computation, and can easily be implemented in today's peer-to-peer systems. It is resistant to all forms of manipulation, including the use of multiple free identities, and does not require any coordina-tion among seeds. We analyze our protocol and show that if downloading peers are rational, a new system equilibrium is reached in which all peers upload at least some percentage of the file they are given.

Original languageEnglish
Title of host publication8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009
PublisherInternational Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS)
Pages624-631
Number of pages8
ISBN (Print)9781615673346
StatePublished - 2009
Event8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009 - Budapest, Hungary
Duration: 10 May 200915 May 2009

Publication series

NameProceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS
Volume1
ISSN (Print)1548-8403
ISSN (Electronic)1558-2914

Conference

Conference8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009
Country/TerritoryHungary
CityBudapest
Period10/05/0915/05/09

Keywords

  • Bittorrent
  • File sharing
  • Incentives
  • Peer-to-peer

Fingerprint

Dive into the research topics of 'Adding incentives to file-sharing systems'. Together they form a unique fingerprint.

Cite this