This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Group-Based Negotiations in P2P Systems
October 2010 (vol. 21 no. 10)
pp. 1473-1486
Anna C. Squicciarini, The Pennsylvania State University, University Park
Federica Paci, University of Trento, Trento
Elisa Bertino, Purdue University, West Lafayette
Alberto Trombetta, Insubria University, Varese
Stefano Braghin, Insubria University, Varese
In P2P systems, groups are typically formed to share resources and/or to carry on joint tasks. In distributed environments formed by a large number of peers conventional authentication techniques are inadequate for the group joining process, and more advanced ones are needed. Complex transactions among peers may require more elaborate interactions based on what peers can do or possess instead of peers' identity. In this work, we propose a novel peer group joining protocol. We introduce a highly expressive resource negotiation language, able to support the specification of a large variety of conditions applying to single peers or groups of peers. Moreover, we define protocols to test such resource availability customized to the level of assurance required by the peers. Our approach has been tested and evaluated on an extension of the JXTA P2P platform. Our results show the robustness of our approach in detecting malicious peers, detected both during the negotiation and during the peer group lifetime. Regardless of the peer group cardinality and interaction frequency, the peers always detect possible free riders within a small time frame.

[1] N. Andrade, F. Vilar Brasileiro, W. Cirne, and M. Mowbray, "Discouraging Free Riding in a Peer-to-Peer CPU-Sharing Grid," Proc. 13th Int'l Symp. High-Performance Distributed Computing, June 2004.
[2] E. Bertino, E. Ferrari, and A.C. Squicciarini, "Trust-${\cal X}$ : A Peer-to-Peer Framework for Trust Establishment," IEEE Trans. Knowledge Data Eng., vol. 16, no. 7, pp. 827-842, July 2004.
[3] C. Buragohain, D. Agrawal, and S. Suri, "A Game Theoretic Framework for Incentives in P2P Systems," Proc. Third Int'l Conf. Peer-To-Peer Computing (P2P), 2003.
[4] R.Y. Chen and B. Yeager, "Poblano—A Distributed Trust Model for Peer-to-Peer Networks," http://www.JXTA.org/docstrust.pdf, 2010.
[5] S. Chokhani and W. Ford, "RFC 2527—Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework," http://www.faqs.org/rfcsrfc2527.html, 1999.
[6] G. Coulouris, J. Dollimore, and T. Kindberg, Distributed Systems: Concepts and Design. Addison-Wesley, 2001.
[7] L.P. Cox and B.D. Noble, "Samsara: Honor among Thieves in Peer-to-Peer Storage," ACM SIGOPS Operating Systems Rev., vol. 37, pp. 120-132, 2003.
[8] M. Feldman, K. Lai, I. Stoica, and J. Chuang, "Robust Incentive Techniques for Peer-to-Peer Networks," Proc. Fifth ACM Conf. Electronic Commerce (EC '04), pp. 102-111, 2004.
[9] M. Ham and G. Agha, "ARA: A Robust Audit to Prevent Free-Riding in P2P Networks," Proc. Fifth IEEE Int'l Conf. Peer-to-Peer Computing (P2P '05), 2005.
[10] S. Han and H. Xia, "Optimal Leader Election Scheme for Peer-to-Peer Applications," Proc. Int'l Conf. Networking (ICN), p. 29, 2007.
[11] J.E. Holt, R.W. Bradshaw, K.E. Seamons, and H. Orman, "Hidden Credentials," Proc. 2003 ACM Workshop Privacy in the Electronic Soc. (WPES '03), pp. 1-8, 2003.
[12] S. Johnstone, P. Sage, and P. Milligan, "iXChange—A Self-Organising Super Peer Network Model," Proc. IEEE Symp. Computers and Comm. (ISCC), pp. 164-169, 2005.
[13] JXTA Documentation, https:/jxta-docs.dev.java.net/, 2010.
[14] L. Kawulok, K. Zielinski, and M. Jaeschke, "Trusted Group Membership Service for JXTA," Proc. First Int'l Workshop Active and Programmable Grids Architectures and Components, 2004.
[15] A. Lee, M. Winslett, and K.J. Perano, "TrustBuilder2: A Reconfigurable Framework for Trust Negotiation," Proc. Third IFIP WG 11.11 Int'l Conf. Trust Management (IFIPTM '09), June 2009.
[16] J. Li and N. Li, "OAcerts: Oblivious Attribute Certificates," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 340-352, Oct.-Dec. 2006.
[17] R.T.B. Ma Sam, C.M. Lee John, C.S. Lui David, and K.Y. Yau, "An Incentive Mechanism for P2P Networks," Proc. 24th IEEE Int'l Conf. Distributed Computing Systems, 2004.
[18] W. Nejdl and D. Olmedilla, and M. Winslett, "PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web," technical report, Oct. 2003.
[19] S. Oaks, L. Gong, and B. Traversat, JXTA in a Nutshell. O'Reilly, 2002.
[20] OASIS, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, http://docs.oasis-open.org/security/saml v2.0/, 2010.
[21] A. Oram, Peer-To-Peer: Harnessing the Power of Disruptive Technologies. O'Reilly & Assoc., Inc., 2001.
[22] V. Ramakrishna, K. Eustice, and P. Reiher, "Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios," Proc. IEEE Int'l Conf. Service-Oriented Computing and Applications (SOCA '07), 2007.
[23] J. Sacha, J. Downling, R. Cunningham, and R. Meier, "Using Aggregation for Adaptive Super-Peer Discovery on the Gradient Topology," Proc. Int'l Conf. Self-Managed Networks, Systems, and Services (Selfman), pp. 73-86, 2006.
[24] K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu, "Requirements for Policy Languages for Trust Negotiation," Proc. Third Int'l Workshop Policies for Distributed Systems and Networks (Policy '02), pp. 92-103, June 2002.
[25] A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
[26] A. Squicciarini, E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham, "PP-Trust-${\cal X}$ : A System for Privacy Preserving Trust Negotiations," ACM Trans. Information and System Security, vol. 10, no. 3, 2007.
[27] Sun Microsystems, JXTA Programmer Guide 2.5, https:/jxta. dev.java.net/, 2007.
[28] X.509 Certificates RFC, http://www.ietf.org/rfcrfc2527.txt, 2010.
[29] T. Wang, K. Tsai, and Y. Lee, "Crown: An Efficient and Stable Distributed Resource Lookup Protocol," Proc. Int'l Conf. Embedded and Ubiquitous Computing (EUC), pp. 1075-1084, 2004.
[30] W.H. Winsborough and N. Li, "Towards Practical Automated Trust Negotiation," Proc. Third Int'l Workshop Policies for Distributed Systems and Networks (Policy '02), pp. 92-103, June 2002.
[31] W.H. Winsborough and N. Li, "Safety in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, 2004.
[32] L. Xiong and L. Liu, "Peertrust: Supporting Reputation-Based Trust in Peer-to-Peer Communities," IEEE Trans. Knowledge and Data Eng., Special Issue on Peer-to-Peer Based Data Management, vol. 16, no. 7, pp. 843-857, July 2004.
[33] W. Yeager and J. Williams, "Secure Peer-to-Peer Networking: The JXTA Example," IT Professional, vol. 4, no. 2, pp. 53-57, 2002.
[34] T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, 2003.
[35] Sun Microsystems, JXTA Metering and Monitoring Project, https:/jxse-metering.dev.java.net/, 2003.
[36] S. Zhang, F. Makedon, J. Ford, and L. Ai, "A Model for Multi-Party Negotiations with Majority Rule," Proc. Int'l Conf. E-Commerce and Web Technologies, vol. 3182, 2004.
[37] C.C. Zhang and M. Winslett, "Distributed Authorization by Multiparty Trust Negotiation," Proc. European Symp. Research in Computer Security (ESORICS), pp. 282-299, 2008.

Index Terms:
Trust negotiation, peer-to-peer, JXTA.
Citation:
Anna C. Squicciarini, Federica Paci, Elisa Bertino, Alberto Trombetta, Stefano Braghin, "Group-Based Negotiations in P2P Systems," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 10, pp. 1473-1486, Oct. 2010, doi:10.1109/TPDS.2010.25
Usage of this product signifies your acceptance of the Terms of Use.