• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Credit-Based Approach for Overcoming Free-Riding Behaviour in Peer-to-Peer Networks

    2019-04-29 06:26:38ManalHazaziAfnanAlmousaHebaKurdiShiroqAlMegrenandShadaAlsalamah
    Computers Materials&Continua 2019年4期

    Manal Hazazi , Afnan Almousa, Heba Kurdi, , Shiroq Al-Megren and Shada Alsalamah

    Abstract: The underlying premise of peer-to-peer (P2P) systems is the trading of digital resources among individual peers to facilitate file sharing, distributed computing, storage,collaborative applications and multimedia streaming. So-called free-riders challenge the foundations of this system by consuming resources from other peers without offering any resources in return, hindering resource exchange among peers. Therefore, immense effort has been invested in discouraging free-riding and overcoming the ill effects of such unfair use of the system. However, previous efforts have all fallen short of effectively addressing free-riding behaviour in P2P networks. This paper proposes a novel approach based on utilising a credit incentive for P2P networks, wherein a grace period is introduced during which free-riders must reimburse resources. In contrast to previous approaches, the proposed system takes into consideration the upload rate of peers and a grace period. The system has been thoroughly tested in a simulated environment, and the results show that the proposed approach effectively mitigates free-riding behaviour. Compared to previous systems, the number of downloads from free-riders decreased while downloads by contributing peers increased. The results also show that under longer grace periods, the number of downloads by fast peers (those reimbursing the system within the grace period)was greater than the number of downloads by slow peers.

    Keywords: Peer-to-peer network, free-riding, file sharing, credit.

    1 Introduction

    Peer-to-peer (P2P) architecture has emerged as a popular solution to the problems of clientserver architecture, such as scalability and single points of failure. The crux of P2P in distributed systems is placement of all participants, i.e., peers, on equal footing, where control is distributed and communication is self-organized and symmetric [Steinmetz and Wehrle (2005)]. The P2P model has proven to be well-suited for trading content on networks and for file sharing, distributed computing, storage, collaborative applications and multimedia streaming [Karakaya, Korpeolu and Ulusoy (2009)]. Among the various P2P applications, file sharing is one of the most popular.

    P2P networks rely heavily on idealism and voluntary cooperation on the part of users(peers). While security threats remain an issue for many networks (e.g., [Zhang, Wang,Cao et al. (2018)]), one of the fundamental problems suffered by such networks concerns unfairness, whereby many users have a tendency to free-ride by unfairly consuming resources while contributing very little or no resources. While this problem is not unique to P2P networks, e.g., [Sweeney (1973); Roberts (2008)], it remains relatively new in the field of information sciences. Its impact on P2P networks varies depending on the type of service and the network architecture. For instance, in a wireless ad-hoc network, a selfish node degrades network performance with latency and increased loss rate [Zarifzadeh,Yazdani and Nayyeri (2012)]. In a file-sharing P2P system, free-riding affects the system in two significant ways: It limits the number of shared files and reduces the number of popular files available [Ramaswamy (2003)].

    A variety of approaches have been developed to thwart free-riding behaviour in P2P systems.These approaches are mainly categorised as monetary-, reciprocity-, and reputation-based[Feldman and Chuang (2005)]. In the first category, monetary-based approaches, payment is expected for consumed resources; peers are paid based on resources consumed by other peers while paying for those they themselves consume, e.g., [Trajkovska, Rodriguez, Cervino et al.(2014)]. In the second category, P2P systems utilising a reciprocity-based approach allow exchange of services among peers based on their level of contributions. This approach is employed by, for instance, BitTorrent in its tit-for-tat technique [Legout, Liogkas, Kohler et al. (2007)]. Finally, the reputation-based approach maintains reputation information about peers that is constructed from feedback from other peers [Karakaya, Korpeolu and Ulusoy(2009)], e.g., [Dennis and Owenson (2016)].

    Incentives have been found to encourage cooperation amongst peers in P2P systems.Incentives can vary and include services, monetary incentives, peer ratings and time-tolive (TTL). This paper proposes a unique monetary incentive approach that disfavours and penalises free-riding behaviours via denial of download requests in P2P networks. The proposed approach is based on incentives used by credit card companies to encourage timely reimbursement so as not to incur added interest. Similar to a credit card, a peer is given a ‘grace period’ during which they must reimburse the network with a resource of equivalent quantity. If a peer fails to reimburse the system within that time, then interest is incurred in the form of doubling the number of resources to be reimbursed. Requests for download are denied until the peer cooperates fairly. The objective of the proposed approach is to encourage fairness among peers in P2P networks and to entice cooperation among participating peers with timely contributions.

    The remainder of this paper is organised as follows. First, the related work section reviews studies into overcoming and controlling free-riding behaviour. Second, the proposed credit-based free-riding solution is fully discussed. The third section describes the experimental setup for conducting simulations. Experimental results are presented and discussed in the fourth section. The final section summarises and concludes the paper and briefly suggests directions for future research.

    2 Related work

    Free-riding behaviour has been observed in high levels in various P2P systems. Gnutella,a decentralised file-sharing P2P network, was found to harbour a large number of free-riders (70%), with only 25% of peers fulfilling 99% of all requests on the network [Adar and Huberman (2000)]. The state of the network was later examined and was found to be still vulnerable to free-riders, and its vulnerability was in fact markedly increasing [Hughes,Coulson and Walkerdine (2005)]. Free-riding is known to adversely affect the robustness and expandability of P2P networks and to degrade performance.

    Incentive schemes have been devised for P2P sharing networks to encourage cooperation and reduce the impact of free-riding behaviour. This scheme is borrowed from economics and management and applied to the information sciences. It targets and rewards behaviour deemed desirable and punishes unwanted behaviour. In the case of P2P networks,cooperating peers are rewarded with monetary payments, services, and TTL among other incentives [Krishnan, Smith, Tang et al. (2002)]. Free-riders, in contrast, are penalised for not cooperating.

    The literature proposes several incentive-based schemes. In this section, we briefly review several works on each of the incentive-based approaches: monetary, reciprocity and reputation. Finally, we note some of the known limitations of these approaches.

    2.1 Monetary-based approaches

    In a monetary-based approach, also known as a micropayment scheme, peers are expected to pay and be paid for services they consume and produce, respectively. This approach typically uses virtual currency such as XPay or tycoon, which is stored for each peer in an accounting module. To exchange services, a settlement module, typically maintained by a single authority, oversees transactions.

    Such pricing of transactions encourages contributions from peers while penalising freeriding behaviour. Schemes within monetary-based approaches differ in their pricing methods and the underlying exchange mechanisms. A game theoretic model was constructed and its performance was analysed under several payment mechanisms,including flat-rate and quantized micropayments [Golle, Leyton-Brown, Mironov et al.(2001)]. However, these mechanisms did not discourage free-riding. Another approach utilised a central authority-a broker-to open and close accounts in P2P networks and for arbitration [Yang and Garcia-Molina (2003)]. The micropayment scheme PPay was found to optimistically reduce a broker’s load and involvement.

    An auction-based payment scheme was proposed in a wireless network environment to price packet forwarding [Chen and Nahrstedt (2004)]. An auction process was used to assign price rates and bandwidth to routers. With each passing packet, bidding ensued for resources. Similar to PPay [Yang and Garcia-Molina (2003)], ConQuer [Mondal, Madria and Kitsuregawa (2009)] provided incentives by utilising a broker-based mobile P2P model to auction data and encourage cooperation. More recently, Trajkovska et al. [Trajkovska,Rodriquez, Cervino et al. (2014)] proposed and adapted a method based on monetary discounts and a utility model derived from taxation incentive schemes. Their model proved feasible as it increased participation and collaboration among peers.

    2.2 Reciprocity-based approaches

    Reciprocity-based approaches are based on the barter system, which involves the exchange of resources based on the contribution level of each peer. In this scheme, peers either base their exchange with other peers on their own past experiences (direct experience) or on the collective experience of all other peers (indirect experience).

    The tit-for-tat strategy implemented in BitTorrent is a reciprocity-based scheme, wherein peers upload pieces of content to those peers willing to supply pieces [Cohen (2003)]. It disfavoured free-riding behaviour by “choking” peers unwilling to supply content. A treatbefore-trick scheme was also proposed for a BitTorrent-like P2P network to penalize freeriding behaviour [Shin, Reeve and Rhee (2009)]. This approach was based on secret sharing of content encrypted with a symmetric secret key. The encrypted content was shared with other peers, along with generated sub-keys. This approach effectively reduced free-riding behaviour that attempts to circumvent countering techniques.

    A connection management protocol for unstructured P2P networks was presented by Karakaya et al. [Karakaya, Korpeolu and Ulusoy (2008a)] to alleviate problems resulting from free-riding. They proposed utilising two different connection types to differentiate service requests and service provision. The protocol adapts a P2P topology and pulls contributing peers together while pushing free-riders away. A similar push-and-pull protocol was adopted by Oliveira et al. [Oliveira, Prado, De Lima et al. (2015)] to insulate free-riding nodes in P2P networks that distribute video streams. It also classified uncooperative nodes. Their approach thus combined aspects of reciprocity- and reputationbased schemes.

    2.3 Reputation-based approaches

    In reputation-based approaches, past histories of behaviour and trust are utilised to track bad behaviour. Reputation is defined by Wang et al. [Wang and Vassileva (2003)] as one peer’s belief in another’s reliability and honesty based on recommendations from other peers. This approach aims to deter bad behaviour by building trust among peers in a network. Behaviours such as free-riding and malice are detected and penalised.

    One of the earliest reputation-based approaches [Gupta, Judge and Ammar (2003)] mapped a dynamic reputation score to each peer in a decentralised unstructured network based on that peer’s behaviour and capabilities. Wang et al. [Wang and Vassileva (2003)] developed a Bayesian network-based model that similarly lets peers communicate their experiences with others. This local view of the network relied on the honesty of peers in sharing this information. However, this assumption is often unrealistic. Gupta et al. [Gupta and Somani(2005)] later presented a game model of interaction between peers in a P2P system. The game’s pure and mixed strategy equilibrium was studied, where all peers were assumed to be selfish. The contribution reputation of a peer was directly proportional to what a peer could download in a given time period. While all these approaches were found to inhibit free-riding behaviour, their use of a binary score was not fully effective for the size of the resources downloaded or their popularity.

    In an unstructured P2P network context, a framework was devised to monitor a peer’s contribution to the network to counteract free-riding behaviour [Karakaya, Korpeolu and Ulusoy (2008b)]. This scheme indirectly forced free-riders to cooperate by monitoring both resources originating from a peer and those received by the peer. Other approaches filter out free-riding behaviour based on the trustworthiness of peers [Azzedin (2010)]. Using an activity-based filtering algorithm, free-riding behaviour was identified by quantity of contributions or lack thereof and the content of contributions. A more recent reputation system used blockchain technologies [Dennis and Owenson (2016)] to store reputation scores from completed transactions based on file type rather than human opinion. This approach reduced unfair ratings and maintained the integrity of the reputation system.

    2.4 Implementation limitations

    While the reviewed approaches alleviate some of the consequences of free-riding behaviour, several limitations remain in their application to P2P network [Karakaya,Korpeolu and Ulusoy (2009)]. With monetary-based approaches, centralised modules for settlement and accounting can cause scalability issues, communication overhead and single points of failure. For instance, ConQuer [Mondal, Madria and Kitsuregawa (2009)]maintains an economic model that computes data items, prices and broker and relay commissions. Reciprocity-based approaches rely on uniquely identifying peers and linking them to their values, a method that can be bypassed by free-riders (e.g., [Cohen (2003)]).Another issue with reciprocity-based approaches concerns the quality of published resources, as malicious peers might contribute fake services or files. Similar to monetarybased schemes, reputation approaches suffer from centralization and communication overhead. This type of approach also raises the issue of reputation reliability. For instance,Gupta et al. [Gupta, Judge and Ammar (2003)] and Wang et al. [Wang and Vassileva(2003)] proposed approaches wherein reputation is collected based on previous interactions and relies on the honesty of the communicating nodes.

    The proposed credit-based approach is similarly based on monetary incentives by considering a peer’s upload rate and time to reimbursement. Its simplicity overcomes some of the centralisation drawbacks and overhead of some monetary- and reputation-based approaches. Unlike reciprocity schemes, the contribution level of peers is session-based and its value is credibly derived.

    3 Proposed credit-based approach

    The architecture of the credit-based approach is comprised of three components: an upload manager, a download manager, and a time manager. The upload manager tracks the number of uploaded resources. The download manager is responsible for approving or denying download requests from all peers. After downloading a file, a peer is entitled to a finite period of time (i.e., grace period) from the time of download during which they must reimburse the network with a file upload; if they do not do so, subsequent service requests are denied. This time until reimbursement is tracked by the time manager, and benefits provided to peers are dependent on that time. This component responds to download requests as follows:

    I. A download request from a first-time peer is approved for download, and the timer is initiated.

    II. A download request from an existing peer is subject to a time check; if the timer is within the grace period and the peer has already uploaded one or more files, then the download request is approved, and timer is restarted.

    III. A download request from an existing peer whose grace period lapsed is subject to further checks; if the peer has already uploaded two or more files, then the download request is approved and the timer is restarted. Otherwise, the download request is denied.

    The main steps of the algorithm underlying the credit-based approach are shown in Fig. 1.The download requests from all peers are monitored in the proposed approach. Download requests from first-time peers are approved and a timer is initiated. For subsequent download requests, the upload manager notifies the system of the number of uploads by the requesting peer. If the user has uploaded one or more files, the timer (which is initiated with every new download) is compared against the allotted grace period. If the time of request is within the grace period, then the download request is approved. If the grace period has lapsed, then the quantity of uploads by that user is checked. If the peer uploaded two or more files, then the download request is approved and the timer is restarted.Otherwise, the request is denied. Of course, subsequent download requests are also denied if the peer fails to upload any files.

    Figure 1: The credit-based approach algorithm

    4 Experimental setup

    The aim of this paper is to introduce a novel credit-based approach that can be applied to P2P networks to overcome free-riding behaviour and reduce its ill-effects. This is possible with early detection of potential free-riders and denial of their download requests. The primary hypothesis is that the proposed approach will mitigate the effect of free-riding in P2P systems and improve the download experience of non-free-riding peers.

    An evaluation framework was implemented to test this hypothesis. Utilised software tools include jGRASP and Eclipse Java EE Developer tools. The tools run in a Windows operating system environment. The simulations are conducted on a system with an Intel Core i5 processor, 1.60 GHz, 2.29 GHz, and 4 GB of RAM.

    The following performance measures were considered:

    I. Number of downloads: This measure refers to the number of downloads per peer by all types of peers in the network. The measure is indicative of peers’ level of satisfaction; the higher the number of downloads per peer, the more satisfied the peer.

    II. Number of uploads: This measure refers to the number of uploads per peer by all types of peers in the network. The measure is indicative of peers’ contributions to the network.

    Two experiments were designed to evaluate the simulation based on number of downloads and uploads:

    I. In the first experiment, the proportion of free-riders was varied from 10% to 90% in increments of 10%.

    II. In the second experiment, a variable grace period was used. The grace period assigned to downloading peers (i.e., non-free-riding peers) varied across the range[time/4, time/3, time/2], where time=(# of peers-#of free-riders)×MAX # of uploads per peer.

    The proposed approach aims to curb free-riding behaviour by disfavouring free-riders.Other, non-free-riding, peers are presented as one of two models:

    I. Fast peers reimburse the network with one or more uploads within the allotted grace period.

    II. Slow peers fail to upload a resource within the grace period but are able to reimburse the network with two or more files after that time.

    A variable number of fast and slow peers is also considered based on the total number of peers and the number of free-riders:

    The rest of the parameters were considered to be constants at the following values:

    I. Number of peers=100 peers.

    II. Number of files=20 files for each peer.

    III. Maximum number of uploads for each peer=10 files.

    The rest of this section describes the application of the models and the steps carried out for each run of the simulation and cycle, where each transaction equals one cycle.

    4.1 Procedure

    The network is assumed to be static with a fixed number of peers. That is, no new peers can join the network and no peers can leave the network. There is no limit to the number of files a peer can download, whereas uploads are limited to a maximum of 10 files per peer. All peers had equal opportunities of requesting files. Files can be downloaded at any time.Simulation steps were as follows:

    I. The number of peers is initialized (100), and each peer is assigned a role: free-rider,fast peer, or slow peer. Role assignment is based on the percentages of each peer in the simulation run.

    II. Next, a grace period is calculated based on the varying percentages of peers.

    III. At each cycle, peers are chosen randomly to either download or upload files (i.e.,downloader or uploader).

    IV. During the simulation run, peers interact with each other based on their roles (see Tab. 1).

    V. When a peer uploads a resource, the upload counter for that peer increases by one,as does the counter for that peer type. The cycle number also increases by one.However, if a peer fails to upload a file (this could be a free-rider or a slow peer),then the cycle number does not increase.

    VI. When a peer downloads a resource, the download counter for that peer increases by one. So does the download counter for that peer type. The cycle number also increases by one.

    VII. As contributing peers reach the maximum upload limit (10 files), the cycle concludes, and the simulation run ends.

    The simulation run is repeated first for varying percentages of free-riders and then for various grace periods. For each completed run, the number of downloads per peer and number of downloads per type of peer are calculated.

    Table 1: Peer roles and interactions during a simulation run

    5 Results and discussion

    This section compares the performance of the simulations utilizing our proposed creditbased approach against the performance of a benchmarked system prior to applying the proposed approach. The experiments are conducted by running the simulation tool a number of times at varying percentages of free-riders and grace periods.

    5.1 Variable percentages of free-riders

    Fig. 2 shows the number of downloads completed by free-riders and non-free-riders under escalating percentages of free-riders. Fig. 2(a) shows the number of downloads before applying the credit-based approach to overcome free-riding behaviour, while Fig. 2(b)displays the results after applying the proposed approach.

    Figure 2: The effect of varying the percentage of free-riders (a) before and (b) after applying the credit-based approach to overcome free-riding behaviour

    As expected, Fig. 2(a) shows that before applying our approach, when the percentage of free-riders increased, the number of downloads increased as well. It was also anticipated that as the number of free-riders escalated, the number of downloads from non-free-riders would decrease. The figure indeed shows that after the percentage of free-riders increased to 40%, the number of downloads by free-riders decreased along with the number of downloads by non-free-riders. This is because the number of contributing peers (i.e., nonfree-riders) decreases because the simulation assumes a fixed number of users. It is evident that as the number of free-riders increases within a network, the network’s performance will be harmed.

    Fig. 2(b) displays the number of downloads completed by peers after applying the proposed credit-based solution. It is clear that under all percentages of free-riders, as anticipated, the number of downloads by free-riders was lower in comparison to downloads by free-riders in the benchmark simulation. This is because free-riders’ download requests were denied as they failed to contribute within the allotted grace period. Because the effect of freeriding was greatly reduced after applying the proposed approach, the number of downloads by non-free-riders was markedly increased. Thus, download priority was given to contributing peers.

    The effect of varying the percentages of free-riders is shown by peer type in Fig. 3 before and after applying the proposed credit-based approach. As was clarified earlier, the number of downloads by free-riders (see Fig. 3(a)) markedly decreased after applying the proposed method.

    As expected, there was a gradual increase in the number of downloads as the number of free-riders increased in the network. This is because first-time download requests of all peers were approved, while subsequent requests were only approved if the download resources have been reimbursed. This clearly indicates that the proposed method effectively detected potential free-riders and mitigated their effect on the network.

    Figure 3: The effect of varying the percentage of free-riders before and after applying the credit-based approach to (a) free-riders and (b) non-free-riders

    The effects of applying the credit-based approach on non-free-riders is illustrated in Fig.3(b). It is clear that under varying percentages of free-riders, the number of downloads when the credit-based method is applied is higher than the number of downloads before it is applied. This is because the free-riding effect is reduced with early detection of freeriding behaviours. This indicates that non-free-riding peers were given priority in contrast to what is seen without the proposed method. Because this simulation limits the number of uploads by each peer, the total number of downloads by non-free-riders decreased as the percentage of free-riders increased.

    Figure 4: The effect of varying the percentage of free-riders on the number of downloads for all three types of peers: free-riders, fast peers, and slow peers

    Fig. 4 shows the number of downloads by free-riders, fast peers and slow peers in the simulated network after applying the proposed approach. Similar to previous runs, various percentages of free-riders were applied with a grace period of time/4. The figure clearly shows that the number of downloads from free-riders was lower than the number of downloads by non-free-riders (excluding network saturation of free-riders at 90%). The effect on non-free-riding peers was also evident; the number of downloads by fast peers is greater than the number of downloads by slow peers. This is because the proposed approach rewards (i.e., approves download requests) reimbursement within the grace period, since no interest is expected. Thus, slow peers’ delay in reimbursement further delays their reward.

    The main findings of varying the percentage of free-riders indicate a considerable effect on the number of downloads upon applying the proposed credit-based approach. It is clear that applying the credit-based approach greatly reduced the number of downloads from free-riders, for instance a network that consisted of 70% free-riders reduced their number of downloads from 166 to 70 downloads. At an even lower percentages, the decrease was more evident (e.g., at 30% the number of downloads decreased from 249 to 30 downloads).The proposed approach also impacted the number of downloads by non-free-riding peers.In a network composed of 70% free-riders, the proposed approach increased the number of downloads by non-free-riders from 34 to 230 downloads. The results also demonstrated the effect of the credit-based approach on the timely compensation of fast peers over slow peers who must reimburse with interest. While the reduction of free-riding behaviour benefited both types of peers, fast peers were favoured over slow peers as they did not incur interest (see Fig. 4). This indirectly offers an incentive for timely contributions.

    5.2 Variable grace periods

    Fig. 5 shows the number of downloads of fast and slow peers at varying percentages of free-riders and varying grace periods. The simulated grace periods include periods equal to 1/4, 1/3, and 1/2 of the total time. It is evident in Fig. 5(a) that as the duration of the grace period increased, the number of downloads from fast peers increased as well. This is largely due to the fact that the longer grace period denied other peers requests for downloads for that length of time. This particularly affects slow peers as they attempt to reimburse the network after that period. Because this simulation limits the number of uploads from each peer, the chance for fast peers to download increases.

    Fig. 5(b) clarifies these results. Downloads by slow peers decreased as the grace period increased. After the grace period passed without being reimbursed by a slow peer, the peer was expected to reimburse the system with two uploads instead of one. And because the system after the credit-based approach was not compensated, slow peers were prevented from downloading files. And as the simulation limited uploads to 10 files, the chance to download was won by fast peers.

    Figure 5: The effect of varying the percentage of free-riders and the grace period on the number of downloads by (a) fast peers and (b) slow peers using the proposed approach

    Figure 6: The effect of varying the grace period on the number of uploaded files from nonfree-riders while using the credit-based approach

    Fig. 6 demonstrates the effect of varying the grace period duration on the number of uploads performed by non-free-riders, i.e., fast and slow peers. This assumes no limits to the number of uploads per peer and a total time of 10,000 units. The figure shows that as grace period duration increased, the number of uploaded files decreased. This indicates that the shorter grace period provided an incentive for peers to upload as soon as they can contribute. Also, with a shorter grace period, the number of files in the network increased,which is a desirable state in a P2P network.

    Peer-to-peer (P2P) systems facilitate the direct exchange of digital contents to encourage sharing and collaboration among individual peers. However, free-riding raises a number of challenging issues that hinder this sharing due to their unfair consumption of resources from other peers without offering any in return. A clear gap in the literature has been

    6 Conclusion and future work

    identified as existing approaches falls short of effectively addressing free-riding behaviour in P2P networks. In this paper, an approach based on credit cards and grace periods for discouraging free-riding behaviour in P2P networks was proposed. The approach encourages timely reimbursement of system resources (files) to avoid incurring interest. In the case of P2P networks, free-riders are denied download requests if they fail to reimburse the network during the grace period. Simulation results show that the credit-based method effectively manages free-riding behaviour and achieves its objectives of enticing cooperation and achieving fairness among participating peers. The system clearly provides appropriate incentive for peers to contribute and fairly consume resources.

    The main contributions of this paper can be summarised as follows:

    I. Design and implementation of a novel approach for discouraging free-riding based on a monetary-type credit incentive. This approach has not been previously considered.

    II. Thorough evaluation of the proposed system with varying percentages of free-riders and variable grace periods.

    III. Facilitation of digital content exchange among peers in P2P networks with fair consumption without any compromising.

    For future work, we intend to improve and extend the proposed methods in the following ways:

    I. Enhance the system by varying grace periods based on the popularity of downloads.

    II. Mitigate the effect of free-riders that attempt to cheat this approach by repeatedly consuming one file, leaving the network, and then re-joining the network and consuming again.

    III. Further enhance the system by tracking and checking the quality of uploaded files to ensure that the same file is not repeatedly uploaded or that the uploaded file is in fact fake.

    IV. Comparatively assess the performance of the proposed credit-based approach against similar algorithms to determine its success rate and runtime performance.

    Acknowledgment:The research was supported by a grant from the research Center of the Center for Female Scientific and Medical Colleges Deanship of Scientific Research, King Saud University.

    观看美女的网站| 97人妻精品一区二区三区麻豆| 亚洲久久久久久中文字幕| 麻豆精品久久久久久蜜桃| 国产精品美女特级片免费视频播放器| 亚洲婷婷狠狠爱综合网| 高清毛片免费观看视频网站| 最后的刺客免费高清国语| 亚洲av熟女| 91久久精品国产一区二区成人| 一个人免费在线观看电影| 国产精品久久久久久av不卡| av卡一久久| 国产高清视频在线观看网站| 亚洲av美国av| 国产一区亚洲一区在线观看| 91久久精品国产一区二区三区| 变态另类丝袜制服| 精品人妻视频免费看| 日本 av在线| 我的女老师完整版在线观看| 女生性感内裤真人,穿戴方法视频| 狂野欧美激情性xxxx在线观看| 69人妻影院| 久久久久国内视频| 夜夜爽天天搞| 亚洲五月天丁香| 欧美激情在线99| 久久天躁狠狠躁夜夜2o2o| 亚洲va在线va天堂va国产| 免费观看的影片在线观看| 国产黄色视频一区二区在线观看 | 麻豆乱淫一区二区| 可以在线观看的亚洲视频| 啦啦啦啦在线视频资源| 禁无遮挡网站| 韩国av在线不卡| 99热全是精品| 欧美成人精品欧美一级黄| 亚洲图色成人| 又黄又爽又刺激的免费视频.| 久久久久久久亚洲中文字幕| 成人精品一区二区免费| 欧美潮喷喷水| 在线国产一区二区在线| 欧美+日韩+精品| 中文字幕av在线有码专区| 中国美白少妇内射xxxbb| 亚洲最大成人中文| 亚洲欧美成人精品一区二区| 免费看光身美女| 黄色配什么色好看| 在线a可以看的网站| 国产视频一区二区在线看| 精品一区二区三区人妻视频| 人人妻人人澡欧美一区二区| 日韩欧美精品v在线| 最新中文字幕久久久久| 精华霜和精华液先用哪个| 国产精品,欧美在线| 国产精品一区二区三区四区久久| or卡值多少钱| 日日干狠狠操夜夜爽| 性插视频无遮挡在线免费观看| 给我免费播放毛片高清在线观看| 亚洲国产精品成人久久小说 | 观看美女的网站| 嫩草影院新地址| 99riav亚洲国产免费| 国产69精品久久久久777片| 91精品国产九色| 99热这里只有是精品50| 99久久精品一区二区三区| 中文资源天堂在线| 大香蕉久久网| 一级黄色大片毛片| 精品人妻偷拍中文字幕| 国产av在哪里看| 日本色播在线视频| eeuss影院久久| 日日啪夜夜撸| 亚洲精品在线观看二区| 成年女人看的毛片在线观看| 午夜影院日韩av| 国产不卡一卡二| 亚洲国产欧美人成| 狠狠狠狠99中文字幕| 成人无遮挡网站| 毛片女人毛片| 成人鲁丝片一二三区免费| 丝袜喷水一区| 欧美日本视频| 国产黄片美女视频| 22中文网久久字幕| 成人国产麻豆网| 久久久久久国产a免费观看| 欧美成人一区二区免费高清观看| 亚洲国产精品成人久久小说 | 波多野结衣高清作品| 国产av不卡久久| av在线天堂中文字幕| 99riav亚洲国产免费| 免费在线观看成人毛片| 亚洲av电影不卡..在线观看| 啦啦啦观看免费观看视频高清| 亚洲欧美成人精品一区二区| 国产精品亚洲美女久久久| 欧美区成人在线视频| 日韩av不卡免费在线播放| www日本黄色视频网| 国产精品一区二区三区四区久久| 深爱激情五月婷婷| 国产精品久久久久久av不卡| 麻豆成人午夜福利视频| 又爽又黄无遮挡网站| 日韩欧美 国产精品| 成人永久免费在线观看视频| 中文亚洲av片在线观看爽| 村上凉子中文字幕在线| 亚洲自偷自拍三级| 成人特级av手机在线观看| 亚洲高清免费不卡视频| 国产亚洲精品久久久com| 国产日本99.免费观看| 欧美国产日韩亚洲一区| 精品久久久久久久人妻蜜臀av| 成人高潮视频无遮挡免费网站| 老熟妇仑乱视频hdxx| 日日撸夜夜添| 最近视频中文字幕2019在线8| 一本久久中文字幕| 97超级碰碰碰精品色视频在线观看| 十八禁国产超污无遮挡网站| 国产亚洲精品综合一区在线观看| 午夜久久久久精精品| 亚洲欧美清纯卡通| 日本欧美国产在线视频| 国产单亲对白刺激| 国产av麻豆久久久久久久| 伦理电影大哥的女人| 欧美又色又爽又黄视频| 国产精品免费一区二区三区在线| 国产精品精品国产色婷婷| 午夜福利视频1000在线观看| 美女 人体艺术 gogo| 精品人妻一区二区三区麻豆 | 12—13女人毛片做爰片一| 九九久久精品国产亚洲av麻豆| 变态另类丝袜制服| 一个人观看的视频www高清免费观看| 国产淫片久久久久久久久| 一卡2卡三卡四卡精品乱码亚洲| 国产色婷婷99| 99久久九九国产精品国产免费| 欧美+亚洲+日韩+国产| 国产精品国产三级国产av玫瑰| 欧美zozozo另类| aaaaa片日本免费| 久久精品国产鲁丝片午夜精品| 久久久久免费精品人妻一区二区| 亚洲电影在线观看av| 人人妻人人澡欧美一区二区| 国产av不卡久久| 99国产精品一区二区蜜桃av| 熟女人妻精品中文字幕| 又爽又黄a免费视频| 亚洲国产精品合色在线| 国产高潮美女av| 国产精品久久久久久精品电影| 久久综合国产亚洲精品| 亚洲av免费高清在线观看| 直男gayav资源| 亚洲最大成人中文| 亚洲精品亚洲一区二区| 国产成人91sexporn| 午夜亚洲福利在线播放| 少妇人妻精品综合一区二区 | 国产成人影院久久av| 久久人人爽人人片av| 国产在线精品亚洲第一网站| 伊人久久精品亚洲午夜| 亚洲av中文av极速乱| 国产精品一区二区三区四区久久| 欧美激情在线99| 久久精品国产亚洲网站| 久久精品国产鲁丝片午夜精品| 久久久久久久久久成人| 91久久精品电影网| 久久久成人免费电影| 超碰av人人做人人爽久久| 毛片一级片免费看久久久久| 久久人人爽人人片av| 别揉我奶头 嗯啊视频| 欧美+日韩+精品| 欧美+亚洲+日韩+国产| 久久精品国产清高在天天线| 听说在线观看完整版免费高清| 男人的好看免费观看在线视频| 国产91av在线免费观看| 久久亚洲国产成人精品v| 国产爱豆传媒在线观看| 丰满的人妻完整版| 日日干狠狠操夜夜爽| 国产69精品久久久久777片| 麻豆一二三区av精品| 国产爱豆传媒在线观看| 一区福利在线观看| 淫秽高清视频在线观看| 男插女下体视频免费在线播放| 欧美中文日本在线观看视频| 免费av观看视频| 高清午夜精品一区二区三区 | 婷婷六月久久综合丁香| 一个人免费在线观看电影| 亚洲成人久久爱视频| 99热这里只有是精品50| 在线观看免费视频日本深夜| 美女大奶头视频| 女生性感内裤真人,穿戴方法视频| 最后的刺客免费高清国语| 成人亚洲精品av一区二区| 国产精品99久久久久久久久| 久久久午夜欧美精品| 成年女人永久免费观看视频| 麻豆成人午夜福利视频| 亚洲第一电影网av| 婷婷亚洲欧美| av在线观看视频网站免费| 欧美性猛交黑人性爽| 国产真实乱freesex| 精品久久久噜噜| av在线蜜桃| 十八禁网站免费在线| 高清毛片免费观看视频网站| 久久久久精品国产欧美久久久| 中文亚洲av片在线观看爽| 成人国产麻豆网| 亚洲国产精品成人综合色| 色av中文字幕| 国产高清不卡午夜福利| 一a级毛片在线观看| 综合色丁香网| 最新在线观看一区二区三区| 国内久久婷婷六月综合欲色啪| 十八禁国产超污无遮挡网站| 在线观看免费视频日本深夜| 国产高清激情床上av| 少妇的逼好多水| 综合色丁香网| 禁无遮挡网站| 美女 人体艺术 gogo| 女生性感内裤真人,穿戴方法视频| 十八禁网站免费在线| 亚洲四区av| 日本撒尿小便嘘嘘汇集6| 天堂av国产一区二区熟女人妻| 精品一区二区三区人妻视频| 国产私拍福利视频在线观看| 中国美女看黄片| 国产精品久久电影中文字幕| 国产精品一区二区三区四区免费观看 | 观看免费一级毛片| 国产精品乱码一区二三区的特点| 美女大奶头视频| 超碰av人人做人人爽久久| 国产69精品久久久久777片| 欧美+日韩+精品| 人人妻,人人澡人人爽秒播| 亚洲精品国产成人久久av| 麻豆成人午夜福利视频| 国产精品野战在线观看| 精品一区二区三区人妻视频| 亚洲精品粉嫩美女一区| 在线免费十八禁| 午夜精品一区二区三区免费看| 亚洲国产高清在线一区二区三| 男女做爰动态图高潮gif福利片| 岛国在线免费视频观看| 成人鲁丝片一二三区免费| 亚洲性久久影院| 婷婷精品国产亚洲av在线| 俄罗斯特黄特色一大片| 国产视频内射| 欧美人与善性xxx| 少妇丰满av| 嫩草影院入口| 精品久久久久久久久久免费视频| 免费在线观看影片大全网站| a级毛片a级免费在线| 麻豆精品久久久久久蜜桃| 亚洲,欧美,日韩| 热99在线观看视频| 嫩草影院入口| 国产 一区 欧美 日韩| 午夜福利高清视频| 亚洲最大成人av| 99热这里只有是精品在线观看| 在线国产一区二区在线| 亚洲真实伦在线观看| 日本爱情动作片www.在线观看 | 欧美日本亚洲视频在线播放| 免费大片18禁| 久久99热6这里只有精品| 看黄色毛片网站| 午夜影院日韩av| 欧美在线一区亚洲| 直男gayav资源| 不卡一级毛片| 色综合站精品国产| 久久99热6这里只有精品| 国产成人freesex在线 | 国产精品久久久久久久久免| 国产白丝娇喘喷水9色精品| 国产精品一及| 久久午夜亚洲精品久久| 成人一区二区视频在线观看| 亚洲激情五月婷婷啪啪| 乱人视频在线观看| 高清毛片免费看| 亚洲电影在线观看av| 国产亚洲91精品色在线| 美女 人体艺术 gogo| 欧美绝顶高潮抽搐喷水| 亚洲欧美成人综合另类久久久 | 小蜜桃在线观看免费完整版高清| av在线观看视频网站免费| 亚洲av熟女| 最近最新中文字幕大全电影3| 老熟妇仑乱视频hdxx| 观看美女的网站| 级片在线观看| 夜夜看夜夜爽夜夜摸| 2021天堂中文幕一二区在线观| 狠狠狠狠99中文字幕| 国产又黄又爽又无遮挡在线| 1000部很黄的大片| 日日干狠狠操夜夜爽| 美女被艹到高潮喷水动态| 搡老岳熟女国产| 国模一区二区三区四区视频| 麻豆一二三区av精品| 18禁黄网站禁片免费观看直播| 久久久久国内视频| 一级毛片aaaaaa免费看小| 午夜影院日韩av| 六月丁香七月| 麻豆一二三区av精品| 国产一区二区三区av在线 | 69av精品久久久久久| 国产大屁股一区二区在线视频| 成人av一区二区三区在线看| 偷拍熟女少妇极品色| 日本在线视频免费播放| 欧美三级亚洲精品| 中文字幕熟女人妻在线| 老司机福利观看| 欧美区成人在线视频| 成人特级av手机在线观看| 中出人妻视频一区二区| av天堂中文字幕网| 欧美一区二区国产精品久久精品| 亚洲av电影不卡..在线观看| 夜夜看夜夜爽夜夜摸| 狂野欧美激情性xxxx在线观看| 成人二区视频| 国产在线精品亚洲第一网站| 亚洲国产精品久久男人天堂| av卡一久久| 国内少妇人妻偷人精品xxx网站| 午夜激情欧美在线| 亚洲精品亚洲一区二区| 天天躁夜夜躁狠狠久久av| av天堂在线播放| 女人十人毛片免费观看3o分钟| 精品久久久久久久久久久久久| 成人毛片a级毛片在线播放| 美女xxoo啪啪120秒动态图| 亚洲av不卡在线观看| 欧美日韩综合久久久久久| 国产精品野战在线观看| 嫩草影视91久久| 亚洲av熟女| 亚洲三级黄色毛片| 亚洲美女黄片视频| 国产成人a∨麻豆精品| 亚洲在线自拍视频| 国产男靠女视频免费网站| 丝袜美腿在线中文| 可以在线观看毛片的网站| 国产av在哪里看| 国产成人a∨麻豆精品| 欧美一级a爱片免费观看看| 亚洲精品亚洲一区二区| 日本a在线网址| 国内精品久久久久精免费| 在线观看av片永久免费下载| 最近中文字幕高清免费大全6| 国产大屁股一区二区在线视频| 国产av在哪里看| 一级毛片我不卡| 亚洲丝袜综合中文字幕| eeuss影院久久| 日本一二三区视频观看| 亚洲成av人片在线播放无| 99久久精品热视频| 国产精品一区www在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 99热网站在线观看| 国产日本99.免费观看| 国语自产精品视频在线第100页| 久久久久久久久久黄片| 国产日本99.免费观看| 人妻制服诱惑在线中文字幕| 丰满人妻一区二区三区视频av| 免费在线观看成人毛片| 欧美日韩综合久久久久久| 少妇的逼好多水| 欧美极品一区二区三区四区| 国内少妇人妻偷人精品xxx网站| 一个人观看的视频www高清免费观看| 内地一区二区视频在线| 国产高清视频在线播放一区| 狠狠狠狠99中文字幕| 真人做人爱边吃奶动态| 菩萨蛮人人尽说江南好唐韦庄 | 99久久精品一区二区三区| 3wmmmm亚洲av在线观看| 春色校园在线视频观看| 18+在线观看网站| 亚洲av.av天堂| 97超级碰碰碰精品色视频在线观看| 黄色配什么色好看| 亚洲熟妇中文字幕五十中出| 亚洲人成网站在线播| 国产精品一区二区性色av| 亚洲七黄色美女视频| 美女被艹到高潮喷水动态| 18禁黄网站禁片免费观看直播| 最近在线观看免费完整版| 91狼人影院| 国产高清视频在线观看网站| 午夜福利成人在线免费观看| 久久热精品热| 春色校园在线视频观看| 免费看光身美女| 激情 狠狠 欧美| 成熟少妇高潮喷水视频| 欧美一区二区精品小视频在线| 有码 亚洲区| 免费看av在线观看网站| 久久精品91蜜桃| 两个人视频免费观看高清| 美女被艹到高潮喷水动态| 欧美bdsm另类| 狂野欧美白嫩少妇大欣赏| 国产免费一级a男人的天堂| 岛国在线免费视频观看| 欧美日本视频| 亚洲av成人av| av卡一久久| 18+在线观看网站| 欧美精品国产亚洲| 午夜精品国产一区二区电影 | videossex国产| 人妻制服诱惑在线中文字幕| 欧美一区二区国产精品久久精品| 直男gayav资源| 亚洲成人精品中文字幕电影| av女优亚洲男人天堂| 免费av不卡在线播放| 精品一区二区免费观看| 午夜激情欧美在线| 三级国产精品欧美在线观看| 亚洲婷婷狠狠爱综合网| 两性午夜刺激爽爽歪歪视频在线观看| 一级毛片电影观看 | 欧美一区二区精品小视频在线| 欧美成人一区二区免费高清观看| 久久亚洲国产成人精品v| 国产一区二区亚洲精品在线观看| 亚洲美女搞黄在线观看 | 国产日本99.免费观看| 日韩欧美 国产精品| videossex国产| 亚洲,欧美,日韩| 国产黄a三级三级三级人| 十八禁国产超污无遮挡网站| avwww免费| 最新在线观看一区二区三区| 97碰自拍视频| 老司机影院成人| 老熟妇乱子伦视频在线观看| 中文字幕熟女人妻在线| 午夜视频国产福利| 国产亚洲91精品色在线| 日本三级黄在线观看| 国产精品无大码| 中文字幕精品亚洲无线码一区| 日本黄色视频三级网站网址| 久久午夜福利片| 熟妇人妻久久中文字幕3abv| 一a级毛片在线观看| 日韩 亚洲 欧美在线| 免费av不卡在线播放| 亚洲aⅴ乱码一区二区在线播放| 欧美一级a爱片免费观看看| 国产精品久久久久久亚洲av鲁大| 欧美xxxx黑人xx丫x性爽| 亚洲,欧美,日韩| www.色视频.com| 麻豆乱淫一区二区| 成人av一区二区三区在线看| 亚洲欧美清纯卡通| 成人亚洲欧美一区二区av| 亚洲av第一区精品v没综合| 国产精品人妻久久久久久| 深夜精品福利| 精品久久久久久久久久久久久| 一区福利在线观看| 亚洲av不卡在线观看| 最好的美女福利视频网| 国产片特级美女逼逼视频| 你懂的网址亚洲精品在线观看 | 人人妻人人澡人人爽人人夜夜 | a级毛片a级免费在线| 青春草视频在线免费观看| 欧美bdsm另类| 女的被弄到高潮叫床怎么办| 无遮挡黄片免费观看| 久久精品夜色国产| 中文字幕av成人在线电影| 亚洲人与动物交配视频| 日本免费一区二区三区高清不卡| 亚洲欧美日韩高清专用| 夜夜看夜夜爽夜夜摸| 国产精品久久久久久av不卡| 国产精品乱码一区二三区的特点| 精品免费久久久久久久清纯| 日韩成人伦理影院| 亚洲最大成人av| 亚洲性久久影院| 我要看日韩黄色一级片| 97超碰精品成人国产| 九九热线精品视视频播放| 亚洲三级黄色毛片| 国产亚洲91精品色在线| 国产精品一区二区免费欧美| 香蕉av资源在线| 国产 一区 欧美 日韩| 色吧在线观看| 老师上课跳d突然被开到最大视频| 精品一区二区免费观看| 久久久久久久久久久丰满| 国产精品av视频在线免费观看| 亚洲精品乱码久久久v下载方式| 村上凉子中文字幕在线| 成年免费大片在线观看| 亚洲精品在线观看二区| 欧美色欧美亚洲另类二区| 最好的美女福利视频网| aaaaa片日本免费| 亚洲美女黄片视频| 男人狂女人下面高潮的视频| 亚洲国产精品sss在线观看| 极品教师在线视频| 亚洲精品成人久久久久久| 99热这里只有精品一区| 色综合亚洲欧美另类图片| 最近最新中文字幕大全电影3| 亚洲综合色惰| 成人综合一区亚洲| 亚洲国产欧美人成| 小蜜桃在线观看免费完整版高清| 色综合站精品国产| 日韩欧美在线乱码| 国产精品精品国产色婷婷| 日韩成人伦理影院| 亚洲av一区综合| 久久久久国产网址| 亚洲婷婷狠狠爱综合网| 在线a可以看的网站| 亚洲精品久久国产高清桃花| 亚洲第一区二区三区不卡| 春色校园在线视频观看| 12—13女人毛片做爰片一| 简卡轻食公司| 日韩一本色道免费dvd| 亚洲成a人片在线一区二区| 午夜影院日韩av| 极品教师在线视频| avwww免费| 老女人水多毛片| 亚洲自偷自拍三级| 欧美最黄视频在线播放免费| 久久精品综合一区二区三区| 在线国产一区二区在线| 国产精品女同一区二区软件| 黄色一级大片看看| 久久午夜福利片| av.在线天堂| 国产真实乱freesex| 99国产极品粉嫩在线观看| 免费在线观看成人毛片| 亚洲精品日韩av片在线观看| 国产91av在线免费观看| 菩萨蛮人人尽说江南好唐韦庄 | 一进一出抽搐gif免费好疼| 51国产日韩欧美| 日韩欧美精品v在线| 久久久国产成人精品二区| 国内揄拍国产精品人妻在线| 丝袜喷水一区| 久久久久久大精品| 欧美激情国产日韩精品一区| 女人十人毛片免费观看3o分钟|