the difference between the Barab
´
asi-Albert graph and
the Erd
˝
os-R
´
enyi graph in terms of robustness.
6 CONCLUSIONS
We have described a declustering algorithm for the
iTrust search and retrieval network. The objective of
iTrust is to provide trustworthy access to information
on the Web by making it difficult to censor or filter in-
formation. The declustering algorithm decreases the
expectation of cooperation between peers in the iTrust
network and, thus, improves the robustness of the net-
work. The expectation of cooperation represents the
degree to which the nodes rely on, or act on, informa-
tion provided by their peers.
The simulation results demonstrate that the
declustering algorithm succeeds in randomizing the
neighbors of a node. This randomness not only helps
mitigate malicious attacks, but also allows for eas-
ier analysis of the functionality of the network. The
simulation results also show that even networks with
high global clustering coefficients or extremely large
hubs can be transformed into Erd
˝
os-R
´
enyi-like graphs
very quickly when declustering is used. In some
cases, only one pass is required to achieve the de-
sired outcomes of lower global clustering coefficients
and fewer nodes with high degrees. These findings
support the idea that techniques applied on a node-
by-node basis can be used to ensure certain network-
wide properties in pure P2P networks, both unstruc-
tured and loosely structured.
While declustering might be useful for iTrust, and
its objective of preventing censorship or filtering of
information accessed over the Web, it might not be
useful for P2P networks that have different objec-
tives. The declustering technique might sacrifice po-
tentially useful network features; however, it accom-
plishes its goal of making the network more robust.
Subsequent versions of iTrust might use information
gathered from forwarded queries to help in the declus-
tering process. Future work in this area might inves-
tigate other techniques like declustering that work to
create robust networks by supporting and promoting
high levels of network churn.
ACKNOWLEDGEMENTS
This research was supported in part by U.S. Na-
tional Science Foundation grant number NSF CNS
10-16193 and by an REU supplement to support the
first author.
REFERENCES
Adamic, L. A., Lukose, R. M., Puniyani, A. R., and Hu-
berman, B. A. (2001). Search in power-law networks.
Physical Review E, 64(046135):046135–1–046135–8.
Albert, R., Hawoong, J., and Barab
´
asi, A. (2000). Error
and attack tolerance of complex networks. Nature,
406(6794):378–382.
Banaei-Kashani, F. and Shahabi, C. (2003). Criticality-
based analysis and design of unstructured peer-to-peer
networks as complex systems. In Proceedings of the
IEEE International Symposium on Cluster Computing
and the Grid, page 351.
Barab
´
asi, A. and Albert, R. (1999). Emergence of scaling
in random networks. Science, 286:509–512.
Bertier, M., Frey, D., Guerraoui, R., Kermarrec, A. M., and
Leroy, V. (2010). The Gossple anonymous social net-
work. In Proceedings of the ACM/IFIP/USENIX 11th
Middleware Conference, pages 191–211.
Chuang, Y. T., Michel Lombera, I., Moser, L. E., and
Melliar-Smith, P. M. (2011). Trustworthy distributed
search and retrieval over the Internet. In Proceed-
ings of the 2011 International Conference on Internet
Computing, pages 169–175.
Clarke, I., Sandberg, O., Wiley, B., and Hong, T. (2000).
Freenet: A distributed anonymous information stor-
age and retrieval system. In Proceedings of the Inter-
national Workshop on Designing Privacy Enhancing
Technologies: Design Issues in Anonymity and Unob-
servability, pages 46–66.
Erd
˝
os, P. and R
´
enyi, A. (1960). On the evolution of random
graphs. Publication of the Mathematical Institute of
the Hungarian Academy of Sciences, 5:17–61.
Gnutella (2000). http://gnutella.wego.com/.
i-Safe America (2011). Peer-to-peer networking.
http://www.isafe.org/imgs/pdf/education/P2PNetwork
ing.pdf.
Jelasity, M., Voulgaris, S., Guerraoui, R., Kermarrec, A. M.,
and van Steen, M. (2007). Gossip-based peer sam-
pling. ACM Transactions on Computer Systems,
25(8).
Makowiec, D. (2005). Evolving network–simulation study.
The European Physical Journal B–Condensed Matter
and Complex Systems, 48:547–555.
Michel Lombera, I., Chuang, Y. T., Melliar-Smith, P. M.,
and Moser, L. E. (2011). Trustworthy distribution and
retrieval of information over HTTP and the Internet.
In Proceedings of the Third International Conference
on the Evolving Internet, pages 7–13.
Milgram, S. (1967). The small world problem. Psychology
Today, 2:60–67.
Price, D. D. S. (1976). A general theory of bibliometric
and other cumulative advantage processes. Journal of
the American Society for Information Science, pages
292–306.
Rasti, A. H., Stutzbach, D., and Rejaie, R. (2006). On the
long-term evolution of the two-tier Gnutella overlay.
In Proceedings of the 25th IEEE International Con-
ference on Computer Communications, pages 1–6.
DECLUSTERINGTHEITRUSTSEARCHANDRETRIEVALNETWORKTOINCREASETRUSTWORTHINESS
321