Proposal Pollution prevention in the P2P file sharing system Presenter: Elaine.

Slides:



Advertisements
Similar presentations
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Advertisements

The Index Poisoning Attack in P2P File Sharing Systems Keith W. Ross Polytechnic University.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Cope with selfish and malicious nodes
A P RESENTATION O N R ESOURCE D ISCOVERY I N T HE P EER- T O- P EER N ETWORK by Aravind Renganathan.
P2PIR'06: "Distributed Cache Table (DCT)" Gleb Skobeltsyn, Karl Aberer D istributed T able: Efficient Query-Driven Processing of Multi-Term Queries in.
Rarest First and Choke Algorithms Are Enough
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Incentives Build Robustness in BitTorrent Author: Bram Cohen Presenter: Brian Liao.
The Role of Prices in Peer-Assisted Content Distribution Christina Aperijis Michael J. Freedman Ramesh Johari Presented by: Kyle Chauvin and Henry Xie.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
Lapsy Garg. P2P Networks Gnutella Protocol Topological Scan Worms Passive Scan Worms Solutions.
Expediting Searching Processes via Long Paths in P2P Systems 05/30 IDEA Lab.
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
LCT2506 Internet 2 Further SQL Stored Procedures.
Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang.
Wide-area cooperative storage with CFS
On Fairness, Optimizing Replica Selection in Data Grids Husni Hamad E. AL-Mistarihi and Chan Huah Yong IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
Understanding Pollution Dynamics in P2P File Sharing Uichin Lee, Min Choi *, Junghoo Cho M. Y. Sanadidi, Mario Gerla UCLA, KAIST * IPTPS’06.
Stacey Greenaway Managing Reputation and Trust in Peer-to-Peer Networks. CP4022 Research Topics in Networks and Distributed Systems. Assessment 2 Stacey.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
University of Bologna, Italy How to cheat BitTorrent and why nobody does Simon Patarin and David Hales University of Bologna ECCS 2006,
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
1 P2P File-Sharing Solution CS654 – Software Architecture course project Guide: T V Prabhakar Members: S Pavan Kumar – Y1306 D V Janardhan Rao – Y
The EigenTrust Algorithm for Reputation Management in P2P Networks
1 Understanding Pollution Dynamics in P2P File Sharing Uichin Lee, Min Choi *, Junghoo Cho M. Y. Sanadidi, Mario Gerla UCLA, KAIST * IPTPS’06 Elaine.
SPAM DETECTION IN P2P SYSTEMS Team Matrix Abhishek GhagDarshan Kapadia Pratik Singh.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
1 Maze A Hybrid P2P file sharing system Design by Networking and distributed System lab at Peking University Presenter:Elaine.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003.
The EigenTrust Algorithm for Reputation Management in P2P Networks
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
Trevor Jim Nikhil Swamy Michael Hicks Defeating Script Injection Attacks with Browser-Enforced Embedded Policies Jason FroehlichSeptember 24, 2008.
Data Indexing in Peer- to-Peer DHT Networks Garces-Erice, P.A.Felber, E.W.Biersack, G.Urvoy-Keller, K.W.Ross ICDCS 2004.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems 7 th.IEEE International Conference on Peer-to-Peer Computing Cristiano Costa,
INFORMATION STROAGE AND RETRIEVAL SYSTEM By Ms. Preeti Patel Lecturer School of Library And Information Science DAVV, Indore
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Peer-to-Peer Information Systems Week 13: Trust Old Dominion University Department of Computer Science CS 495/595 Fall 2003 Michael L. Nelson 11/17/03.
Trustworthiness Management in the Social Internet of Things
OneSwarm: Privacy Preserving P2P
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
CS 162: P2P Networks Computer Science Division
The Case for DDoS Resistant Membership Management in P2P Systems
Presentation transcript:

Proposal Pollution prevention in the P2P file sharing system Presenter: Elaine

Motivation  P2P traffic has dominated 60% traffic in the internet, P2P file-sharing is an important application.  Recently, many existing works have shown that network is rife with deliberate polluted files Definition of polluted file  File content does not match its file description

Motivation Application environment description  A P2P file-sharing application with search capability  File-sharing apps use meta-data for searching  Content Hash  Response result list For a given file A Version # of copies H1 40(P2,P7….P80,P91,P102) H2 23(P3,P5….P33,P54..) : : Hn 2(P10,P17)

Related work Different types of pollution attack  Decoy injection: Meta data is the same, H is different File content is damaged or not match  Hash corruption: H is the same, but content is polluted Two different files could be maliciously hashed to the same hashed ID, dangerous especially when parallel downloading

Related work Peer-reputation systems exist.  Based on the peer’s history of uploads  Eigen-trust Even downloading from trusted peer, still can’t guarantee for a non-polluted file  User awareness  User slackness

Related work Object reputation system  Credence  The first object-reputation system Voting after each object downloading  Issuing a vote-gather query  Evaluating the object reputation.  Two database Vote database Correlation table

Credence  Hash corruption Mechanism still can not be avoid because it didn’t verify for the source.  Disadvantages Votes database could be costly The correlation is not accurate if two peers didn’t download enough common objects. Related work

Problem Definition The best way to prevent the spreading of pollution is to  Select a non-polluted file first  Then select the trust peers to download Version # of copies H1 40(P2,P7….P80,P91,P 102) H2 23(P3,P5….P33,P54..) : : Hn 2(P10,P17)

Idea Designing a robust pollution-prevention system Mechanism operations  Vote after downloading each object  Calculate each peer’s reputation periodically  Searching for object and collecting votes  Calculate object’s reputation before downloading and select peers to download from.

Each time peer i download a file from peer j, it may rate the transaction as positive or negative value s ij = sat(i, j) − unsat(i, j) Transitive trust calculated periodically Calculate each peer’s reputation PiPi PjPj PkPk Local Trust Transitive Trust

Searching for object and collecting votes Query for vote Query for object

Select object and trusted peers to download Weigh collecting votes by the trust value to the voter Select a non-pollution version Select a group of trusted peers to download from

Experimental plan Compare with existing strategy of  Peer reputation system  Object reputation system (Credence)  random, redundant best, redundant random downloading Metrics  From user perspective The necessary time for downloading a clean file  From network perspective The amount of traffic generated by the transmission of polluted files The pollution level varies with time, and the pollution level at the steady state  Pollution level: The ratio of good copies and bad copies in the network Human factor  User awareness  User slackness  Willingness to vote