scholarly journals Torrente, a micropayment based Bittorrent extension to mitigate free riding

Author(s):  
Felipe K. Shiraishi ◽  
Vitor H. Perles ◽  
Hector K. Yassuda ◽  
Leonardo T. Kimura ◽  
Ewerton R. Andrade ◽  
...  

We propose Torrente, a distributed file-sharing solution with economic incentives. Its implementation is built as an extension of BitTorrent protocol, in such a manner that user access to file-sharing swarms is controlled by peers that verify micropayments receipts in a blockchain-based ledger. In addition, by using payment commitments, Torrente facilitates off-chain transactions for faster content sharing. The solution is created as a tool to enhance Amazon Biobank application security, but can be used isolated in cases such as file sharing with monetary incentives.

2017 ◽  
Vol 55 (3) ◽  
pp. 366-379 ◽  
Author(s):  
Timothy JA Passmore ◽  
Megan Shannon ◽  
Andrew F Hart

Is the acquisition of personnel for UN peacekeeping missions susceptible to free-riding by UN member states? If so, what drives this behavior and what impact does this have on obtaining required personnel for the mission? Using data from 21 missions in 13 African countries between 1990 and 2010, this article addresses whether UN peacekeeping missions experience a shortfall in personnel due to incentives to free-ride by contributing states. It argues that as the number of states contributing to a mission increases, contributors have a greater incentive to free-ride and make suboptimal personnel contributions, leading to greater overall shortfall in the mission’s personnel. However, this free-riding behavior can be mitigated by the economic incentives of contributor states. The findings support two central tenets of collective action theory: that free-riding by member states contributing to the mission is more prevalent when the number of contributors is larger, and when selective incentives such as economic gains are lower. These findings have implications for the strategic composition and efficacy of peacekeeping forces. More broadly, the results underscore the struggle of international organizations to obtain compliance from member states in achieving their international objectives.


2011 ◽  
pp. 28-65 ◽  
Author(s):  
Choon Hoong Ding ◽  
Sarana Nutanong ◽  
Rajkumar Buyya

Peer-to-peer (P2P) systems are popularly used as “file swapping” networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Napster, Gnutella, and Fasttrack are three popular P2P systems. This chapter presents a broad overview of P2P computing and focuses on content sharing networks and technologies. It also emphasizes on the analysis of network topologies used in popular P2P systems. In addition, this chapter also identifies and describes architecture models and compares various characteristics of four P2P systems—Napster, Gnutella, Fasttrack, and OpenFT.


2010 ◽  
pp. 90-108
Author(s):  
Esther Keymolen ◽  
Dennis Broeders

Una versione contemporanea dello spirito libero di internet č rappresentata dai cosiddetti network anonimi peer-to-peer (p2p), che oggi si sono evoluti in enormi reti di file-sharing che attirano milioni di utenti. Queste comunitŕ sono spesso - implicitamente - fondate sull'idea di uguaglianza perché si tratta di comunitŕ di pari. Tuttavia su internet, cosě come nella vita reale, alcuni pari sono piů uguali degli altri. Considerati l'estensione e il volume di questi network p2p, l'idea di reciprocitŕ viene meno facilmente poiché molti utenti scoprono che conviene loro essere egoisti e non altruisti. L'articolo si focalizza, in particolare, sul caso di LimeWire - un'applicazione avanzata e molto popolare di file sharing peer-to-peer che funziona sulla rete Gnutella. Il paradosso riguardante questa, come tutte le altre reti p2p, prevede che il suo successo dipenda da gruppi piuttosto ristretti di persone che caricano i propri file a fronte di gruppi molto estesi che fruiscono questi materiali senza condividere i propri. Una delle questioni teoriche in discussione, quindi, č quella relativa alla fiducia che ha una sua declinazione sistemica, in questo caso. L'articolo, pertanto, analizza il problema del free riding attraverso l'analisi del forum di discussione della community di Lime Wire. L'analisi riguarda l'autosservazione compiuta dagli utenti stessi della community, a proposito della necessitŕ o meno di introdurre alcuni meccanismi regolativi coadiuvanti il funzionamento della rete. In particolare la community propone tre punti di vista diversi: quello degli utenti che sono stati definiti "do ut des", ovvero favorevoli ad una maggiore regolamentazione, quello del gruppo cosiddetto "l'informazione deve essere libera e gratuita", il quale non caldeggia una regolamentazione pressante ma piuttosto confida nella presa in carico da parte di LimeWire della questione degli opportunisti, e per ultima la visione della LimeWire company stes- sa, espressa dal moderatore del forum. Quest'ultimo rappresenta una figura chiave per la company (ma piů in generale per la lettura dell'intero fenomeno) perché esprime l'opportunitŕ di confidare nella fiducia sistemica che corrisponde alla necessitŕ di mantenere collegati alla rete p2p il maggior numero di utenti, esponenti sia dell'uno che dell'altro punto di vista, allo scopo di salvaguardare la profittabilitŕ della rete.


2021 ◽  
Author(s):  
Khalid Abdel Hafeez

File sharing is one of the most popular applications in peer-to-peer networks where there is no control over what the peer can download or upload. This explains why file sharing got a high percentage of the overall internet traffic. Although file sharing is a legal technology, many users use it to share copyrighted materials and that's why many applications have been sued and shut down. In this thesis we will build a secure and legal file sharing system using Java bindings of JXTA protocols. The application security is derived from using digital certificates signed by a server peer who acts like a certificate authority (CA), all communications are encrypted using these digital certificates. The legal side is derived from the fact that each peer has a tokens account that will be updated and signed by the server peer only. The downloading peer has to pay some tokens for downloading a file to the uploading peer who then contacts the server peer to credit its commission from that payment. The server peer is the only one who can cash those payments to make the system forgery protected. The interaction between peers and the server peer could be on monthly basis so peers can download and upload files easliy and without the presence of the server. At the end we analyzed the security aspects and show how the implementation deals with most known peer-to-peer threats.


2021 ◽  
Author(s):  
Ajay Arunachalam ◽  
vinayakumar R

Peer-to-Peer (P2P) Networking have a lot of practical applicability’s over the years. File storage and resource sharing are few key areas among the others where such peered network architecture is widely successful. The common building block for P2P networking is to store or locate an identifiable resource, for which there are basically 3 approaches namely (1) local storage/broadcast search (2) global storage/local search (3) distributed storage/distributed search. With the development of mobile hardware and wireless technology, it further became feasible to use mobile devices in these P2P networks. This computing architecture is widely used in Mobile Ad-hoc Network (MANET) for building content sharing applications. Search algorithm and file transfer schemes are the basic components of such content sharing systems. In this article, we provide a brief overview of the resource discovery approaches for peer-to-peer file sharing applications over MANET. We analyze and classify the search techniques into 4 broad schemes, mainly the flooding-based schemes, Distributed Hash Table (DHT) based schemes, advertisement-based schemes, and social network-based schemes. The pros and cons of each technique is summarized. Further, a one-to-one comparison is done across the classes for quick interpretation. We also outline the various issues, and complications that should be taken into consideration while designing any resource discovery algorithm. Further, we briefly discuss the security threats, and present state-of-the-art countermeasures for it. Also, we highlight some important guidelines that need to be focused while designing efficient file sharing applications and services in Mobile Edge Computing (MEC) enabled networks. Comprehensive and in-depth assessments of the related approaches are presented providing clear insights for the future research directions.


2018 ◽  
Vol 15 (1) ◽  
pp. 40
Author(s):  
Dwi Rendra Adi Putrawijaya ◽  
Ni Wayan Sulastri ◽  
Basuki Basuki

The ultimate objective of this study is to describe a big picture of managerial honesty research that had been done in last decade. Moreover, the result of this research is aiming to provide an opportunity to continue the research on this particular topic. This archival study was held based on 21 research subjecting in managerial honesty, particularly in budgeting.Research that can be developed in this sphere is related to economic and psychological factors that affect conflict within the organization. Specifically, this research plan seeks to outline the economic and psychological factors affecting the competition. Furthermore, the research plan seeks to distinguish models from the competition and analyze their impact on management tendencies in conducting honesty in addition to economic incentives to lie. The model is here: first, the model that involves economic pressures and the second is a model that raises competition among participants without changing the number of monetary incentives. Keywords: Managerial Honesty, Budgetary Slack, Honesty on Budgeting


1991 ◽  
Vol 5 (2) ◽  
pp. 171-177 ◽  
Author(s):  
John R Carter ◽  
Michael D Irons

Do economists behave differently from noneconomists? Some evidence suggests they do. In a well-known 1981 study in the Journal of Public Economics, Gerald Marwell and Ruth E. Ames found that free riding was significantly greater among a group of economics graduate students than among other student groups in their experiments. Marwell and Ames offered two conjectures for why economics students might in fact behave differently. First, students who are particularly concerned with economic incentives might self-select into economics. In addition, or alternatively, economics students might adapt their behavior over time to the basic axioms of the theories they study. These conjectures may be called respectively the selection and learning hypotheses. In this paper we explore whether Marwell and Ames' result is robust—whether economists are indeed different. In particular, we use a simple ultimatum bargaining experiment to test whether economics students behave more in accordance with predictions of the rational/self-interest model of economics. Finding that a behavioral difference does exist, we then conduct tests to discriminate between the selection and learning hypotheses.


Sign in / Sign up

Export Citation Format

Share Document