+ All Categories
Home > Documents > Auction-based Model of BitTorrent

Auction-based Model of BitTorrent

Date post: 20-Jan-2016
Category:
Upload: elita
View: 53 times
Download: 0 times
Share this document with a friend
Description:
Auction-based Model of BitTorrent. Seminar in Distributed Computing 2010 ETH Zurich Yu Li. What is BitTorrent. How to download using BitTorrent. STEP 1: Select Torrent File. STEP 2: Download Torrent. How to download using BitTorrent. STEP 3: Configuration. STEP 4: Download File. - PowerPoint PPT Presentation
29
Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li
Transcript
Page 1: Auction-based Model of BitTorrent

Auction-based Model of BitTorrent

Seminar in Distributed Computing 2010

ETH Zurich

Yu Li

Page 2: Auction-based Model of BitTorrent

What is BitTorrent

Page 3: Auction-based Model of BitTorrent

How to download using BitTorrent

STEP 1: Select Torrent File

STEP 2: Download Torrent

Page 4: Auction-based Model of BitTorrent

How to download using BitTorrent

STEP 3: Configuration

STEP 4: Download File

Page 5: Auction-based Model of BitTorrent

Downloading procedure

• Individuals View– Seed

– Leecher

Page 6: Auction-based Model of BitTorrent

Downloading procedure

• System View– I upload and download at the same time

… …

Me

Page 7: Auction-based Model of BitTorrent

Auction-based Model[D. Levin, K. LaCurts, 2008] "BitTorrent is an Auction:

Analyzing and Improving BitTorrent’s Incentives"

(Q1) Do I upload to everyone?

… …

Me

… …

Me

Page 8: Auction-based Model of BitTorrent

Auction-based Model

(Q2) Do I treat every peer equally?

… …

Me (6Mbps)

… …

Me (6Mbps)

2 1 4 2 6 3 2 2 4 2 6 2

Page 9: Auction-based Model of BitTorrent

Auction-based Model

(Q3) Do I ignore others?

… …

Me (6Mbps)

… …

Me (6Mbps)

2 2 4 2 6 2 2 1.5 4 1.5 6 1.50.1 0.2 0.1 0.2 1.5

Page 10: Auction-based Model of BitTorrent

Auction-based Model

• Bids are uploads of round n-1

• Auction clearing

Me (Bandwidth W)

18 12 3 2 1

Round n-1 Round n

18

Me (Bandwidth W)

12 3 2 1

W/S

Highest S-1 1 random peer

W/S W/S

Select S peers (S=4)

W/S

Page 11: Auction-based Model of BitTorrent

Sybil Attack

• Normal Bidder

31218 12

18Mbps 18Mbps 18Mbps 18Mbps

Auctioneer (Me) provides 72Mbps bandwidth in total

“Red” bidder gets 18Mbps

n-1 round

n round

Page 12: Auction-based Model of BitTorrent

Sybil Attack

• Selfish Bidder

3418 1244

12 “Red” bidder sybil gets 2×18Mbps

n-1 round

n round 18Mbps 18Mbps 18Mbps 18Mbps

Auctioneer (Me) provides 72Mbps bandwidth in total

Page 13: Auction-based Model of BitTorrent

Review of Question 2

• (Q2) Do I treat every peer equally?

… …

Me (6Mbps)

… …

Me (6Mbps)

2 1 4 2 6 3 2 2 4 2 6 2

Page 14: Auction-based Model of BitTorrent

Countermeasure:Proportional share auction

• Proportional share

31218 12

36Mbps 24Mbps 6 4 2

n-1 round

n round

“Red” bidder gets 24Mbps

Page 15: Auction-based Model of BitTorrent

Countermeasure:Proportional share auction

• Sybil attack resilient

36Mbps 8Mbps 6 4 2

n-1 round

n round

3418 1244

12

8Mbps 8Mbps

“Red” bidder sybil gets 3×8=24Mbps

Page 16: Auction-based Model of BitTorrent

Comparison of Auction-based &Propshare

Normal client

Selfish client (using sybil)

Standard Bittorrent

18 Mbps 2×18 Mbps

Propshare 24 Mbps 24 Mbps

• Propshare is Sybil proof

Page 17: Auction-based Model of BitTorrent

• Which one is better for me?

Under-reporting

Me

A

X Y

BX Y X Y

Me

A

X Y

BX Y X Y

Me

A

X Y

BX Y X Y

Me

A

X Y

BX Y X Y

Me

A

X Y

BX Y X Y

X X

Under

-

repo

rting

Page 18: Auction-based Model of BitTorrent

Under-reporting

• Under-reporting algorithm– Run algr. when peer is about to lose interest.– Determine the most common piece among av

ailable

X Y Z X Y Z X Y Z X Y ZTom Peer 1 Peer 2 Peer 3

X Y ZAlice

X Y Z X Y Z X Y ZPeer 1 Peer 2 Peer 3

X Y ZTom

X Y ZAlice

Page 19: Auction-based Model of BitTorrent

Under-reporting

Page 20: Auction-based Model of BitTorrent

Countermeasure: Gossiping

MeX Y Z Z

X Y Z

Costs overheadB

A

Page 21: Auction-based Model of BitTorrent

Countermeasure: TrInc[D.Levin, J.R. Douceur 2009] "TrInc: Small Trusted Hardware

for Large Distributed Systems"

• TrInc (Trusted Incrementer)– Prevents lying– Decreases overhead

• TPM (Trusted Platform Module) by Intel

Page 22: Auction-based Model of BitTorrent

Countermeasure: TrInc

• System equipped with TrInc

Page 23: Auction-based Model of BitTorrent

Countermeasure: TrInc

• Individual equipped with TrInc

Page 24: Auction-based Model of BitTorrent

Countermeasure: TrInc

• How does TrInc work?

Old Counter Value

New Counter Value

New Counter Value

Encryption

BitField

BitField + New Counter Value + Old Counter Value

Page 25: Auction-based Model of BitTorrent

Countermeasure: TrInc

• Input– New Counter Value– BitField

• Output– Attestation

• Sample OutputB

A B C…

D Y Z

BA B C

…D Y Z

B

A B C D E F G

34

Page 26: Auction-based Model of BitTorrent

Countermeasure

MeX Y Z Z

X Y Z

B

A

Page 27: Auction-based Model of BitTorrent

Countermeasure: TrInc

X

2 3 Y Z T

X

1 2 Y Z T

X

0 1 Y Z T

X

Y

Z

X

0 1 Y Z T

X

1 2 Y Z T

X

2 3 Y Z T

Bitfield Request

Piece Providing

Piece Providing

Piece Providing

Nonce

X

2 3 Y Z T

3 3 Nonce3 3 Nonce

Me

A

B

C

D

Page 28: Auction-based Model of BitTorrent

Countermeasure: TrInc

• Individual equipped with TrInc

Page 29: Auction-based Model of BitTorrent

• Auction-based Model

• TrInc

• Q & A


Recommended