Top Banner
Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li
29

Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Auction-based Model of BitTorrent

Seminar in Distributed Computing 2010

ETH Zurich

Yu Li

Page 2: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

What is BitTorrent

Page 3: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

How to download using BitTorrent

STEP 1: Select Torrent File

STEP 2: Download Torrent

Page 4: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

How to download using BitTorrent

STEP 3: Configuration

STEP 4: Download File

Page 5: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Downloading procedure

• Individuals View– Seed

– Leecher

Page 6: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Downloading procedure

• System View– I upload and download at the same time

… …

Me

Page 7: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Auction-based Model[D. Levin, K. LaCurts, 2008] "BitTorrent is an Auction:

Analyzing and Improving BitTorrent’s Incentives"

(Q1) Do I upload to everyone?

… …

Me

… …

Me

Page 8: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Auction-based Model

(Q2) Do I treat every peer equally?

… …

Me (6Mbps)

… …

Me (6Mbps)

2 1 4 2 6 3 2 2 4 2 6 2

Page 9: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Auction-based Model

(Q3) Do I ignore others?

… …

Me (6Mbps)

… …

Me (6Mbps)

2 2 4 2 6 2 2 1.5 4 1.5 6 1.50.1 0.2 0.1 0.2 1.5

Page 10: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Auction-based Model

• Bids are uploads of round n-1

• Auction clearing

Me (Bandwidth W)

18 12 3 2 1

Round n-1 Round n

18

Me (Bandwidth W)

12 3 2 1

W/S

Highest S-1 1 random peer

W/S W/S

Select S peers (S=4)

W/S

Page 11: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Sybil Attack

• Normal Bidder

31218 12

18Mbps 18Mbps 18Mbps 18Mbps

Auctioneer (Me) provides 72Mbps bandwidth in total

“Red” bidder gets 18Mbps

n-1 round

n round

Page 12: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Sybil Attack

• Selfish Bidder

3418 1244

12 “Red” bidder sybil gets 2×18Mbps

n-1 round

n round 18Mbps 18Mbps 18Mbps 18Mbps

Auctioneer (Me) provides 72Mbps bandwidth in total

Page 13: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Review of Question 2

• (Q2) Do I treat every peer equally?

… …

Me (6Mbps)

… …

Me (6Mbps)

2 1 4 2 6 3 2 2 4 2 6 2

Page 14: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure:Proportional share auction

• Proportional share

31218 12

36Mbps 24Mbps 6 4 2

n-1 round

n round

“Red” bidder gets 24Mbps

Page 15: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure:Proportional share auction

• Sybil attack resilient

36Mbps 8Mbps 6 4 2

n-1 round

n round

3418 1244

12

8Mbps 8Mbps

“Red” bidder sybil gets 3×8=24Mbps

Page 16: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Comparison of Auction-based &Propshare

Normal client

Selfish client (using sybil)

Standard Bittorrent

18 Mbps 2×18 Mbps

Propshare 24 Mbps 24 Mbps

• Propshare is Sybil proof

Page 17: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

• Which one is better for me?

Under-reporting

Me

A

X Y

BX Y X Y

Me

A

X Y

BX Y X Y

Me

A

X Y

BX Y X Y

Me

A

X Y

BX Y X Y

Me

A

X Y

BX Y X Y

X X

Under

-

repo

rting

Page 18: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Under-reporting

• Under-reporting algorithm– Run algr. when peer is about to lose interest.– Determine the most common piece among av

ailable

X Y Z X Y Z X Y Z X Y ZTom Peer 1 Peer 2 Peer 3

X Y ZAlice

X Y Z X Y Z X Y ZPeer 1 Peer 2 Peer 3

X Y ZTom

X Y ZAlice

Page 19: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Under-reporting

Page 20: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure: Gossiping

MeX Y Z Z

X Y Z

Costs overheadB

A

Page 21: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure: TrInc[D.Levin, J.R. Douceur 2009] "TrInc: Small Trusted Hardware

for Large Distributed Systems"

• TrInc (Trusted Incrementer)– Prevents lying– Decreases overhead

• TPM (Trusted Platform Module) by Intel

Page 22: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure: TrInc

• System equipped with TrInc

Page 23: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure: TrInc

• Individual equipped with TrInc

Page 24: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure: TrInc

• How does TrInc work?

Old Counter Value

New Counter Value

New Counter Value

Encryption

BitField

BitField + New Counter Value + Old Counter Value

Page 25: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure: TrInc

• Input– New Counter Value– BitField

• Output– Attestation

• Sample OutputB

A B C…

D Y Z

BA B C

…D Y Z

B

A B C D E F G

34

Page 26: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure

MeX Y Z Z

X Y Z

B

A

Page 27: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure: TrInc

X

2 3 Y Z T

X

1 2 Y Z T

X

0 1 Y Z T

X

Y

Z

X

0 1 Y Z T

X

1 2 Y Z T

X

2 3 Y Z T

Bitfield Request

Piece Providing

Piece Providing

Piece Providing

Nonce

X

2 3 Y Z T

3 3 Nonce3 3 Nonce

Me

A

B

C

D

Page 28: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

Countermeasure: TrInc

• Individual equipped with TrInc

Page 29: Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.

• Auction-based Model

• TrInc

• Q & A