Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Cope with selfish and malicious nodes
Pete Bohman Adam Kunk.  Introduction  Related Work  System Overview  Indexing Scheme  Ranking  Evaluation  Conclusion.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
On the Economics of P2P Systems Speaker Coby Fernandess.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Lapsy Garg. P2P Networks Gnutella Protocol Topological Scan Worms Passive Scan Worms Solutions.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Computing Trust in Social Networks
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Comparing Hybrid Peer-to-Peer Systems Beverly Yang and Hector Garcia-Molina Presented by Marco Barreno November 3, 2003 CS 294-4: Peer-to-peer systems.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda, Bharat K. Bhargava Presented by Sam Distributed Computing Systems, FTDCS Proceedings.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Search in Peer-to-Peer File-Sharing Systems: Like Metasearch Engines, But Not Really Wai Gen Yee, Dongmei Jia, Linh Thai Nguyen {yee, jiadong,
Network Computing Laboratory Scalable File Sharing System Using Distributed Hash Table Idea Proposal April 14, 2005 Presentation by Jaesun Han.
A Novel approach to Bind-over Sybil nodes in a swarm Zhang Bhanu Kaushik Deep Kamal Singh Xiang Cui.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Practical Byzantine Fault Tolerance
Security Mechanisms for Distributed Computing Systems A9ID1007, Xu Ling Kobayashi Laboratory GSIS, TOHOKU UNIVERSITY 2011/12/15 1.
1 Maze A Hybrid P2P file sharing system Design by Networking and distributed System lab at Peking University Presenter:Elaine.
Can Change this on the Master Slide Monday, August 20, 2007Can change this on the Master Slide0 A Distributed Ranking Algorithm for the iTrust Information.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
Kaleidoscope – Adding Colors to Kademlia Gil Einziger, Roy Friedman, Eyal Kibbar Computer Science, Technion 1.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Date: 2012/08/21 Source: Zhong Zeng, Zhifeng Bao, Tok Wang Ling, Mong Li Lee (KEYS’12) Speaker: Er-Gang Liu Advisor: Dr. Jia-ling Koh 1.
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
Peer to Peer Network Design Discovery and Routing algorithms
Data Indexing in Peer- to-Peer DHT Networks Garces-Erice, P.A.Felber, E.W.Biersack, G.Urvoy-Keller, K.W.Ross ICDCS 2004.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
1 NETWORKING 2012 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 22, 2012 Reducing the History in Decentralized.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Distributed systems. distributed systems and protocols distributed systems: use components located at networked computers use message-passing to coordinate.
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems 7 th.IEEE International Conference on Peer-to-Peer Computing Cristiano Costa,
Proposal Pollution prevention in the P2P file sharing system Presenter: Elaine.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Skype.
Efficient Multi-User Indexing for Secure Keyword Search
Trustworthiness Management in the Social Internet of Things
Peer to Peer Information Retrieval
Presentation transcript:

Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin Walsh Emin Gun Sirer Cornell University Presenter: Elaine

2 Problem A P2P filesharing application with search capability (e.g. Gnutella) Filesharing apps use meta-data for searching Meta-data like file name, file size, file descriptors, content-hash, etc Problem –Users blindly believe the meta-data –Object authenticity (or Reputaiton) downloaded file == what it claims to be Current peer-to-peer filesharing networks, which are rife with corrupt and mislabeled content Much of this pollution can be attributed to deliberate attacks [14]

3 Recent approaches Past experience –Small portion of peers # of shared files as an endorsement –Large number of malicious peers can share the same files –Angry users may share Voting –Trust on voters? –No incentive to vote Call for a trustworthiness metrics –Credence

4 Credence How to decide the reputation of an object –Use voting and deal with the trust problem How? –Compare voting history of two peers –Trust peers with identical votes more Correlation Computation –If they don ’ t share enough history, build a trust relationship graph and trust multi-hop peers (transitive trust)

5 Computing correlation Calculate each two peers’ trust relationship –A standard formula for the coefficient of correlation between binary data sets  Phi coefficient Theta takes a range of [-1,1] Positive values indicate agreement Negative values indicate disagreement A-A+ B-336 B

6 Transitive trust (ref. from K Walsh, EG Sirer) Voting history (1 == correct, 0 == incorrect) Obj 31 Obj 41 Obj 50 Obj 60 ABC Obj 50 Obj 60 Obj 71 Obj 81 Obj 11 Obj 20 Obj 31 Obj 41 Local Trust Transitive Trust θac = θab * θbc

7 Voting on Object A Vote is a signed tuple: K –H - File content hash –S – Statement about the file Thumb up ( unconditionally thumb up) Thumb down ( unconditionally thumb up) –T – Timestamp –K – Certificate

8 Three basic operations in Credence Voting –A peer casts a vote on a object after each downloading and store it locally to the vote database Algorithm Voting  Issuing a vote-gather query  Evaluating the object reputation

Sender (Issuing a vote-gather query) –Issuing a vote-gather query, specifying the hash of content (a given object), to the underlying Gnutella network, store the gathering votes to the vote database. Receiver (After receiving a vote-gather query) –Send back their own matching votes and any matching votes they have seen recently with the most reliable weight –Advantages: Bound the overall cost of votes collection Voters are not required to remain online Voting  Issuing a vote-gather query  Evaluating the object reputation

Votes that apply positively are given an initial value of +1, and those that apply negatively −1 Look up the trust relationship from correlation table Calculate the weighted average of votes using correlation values to derive the object reputation scores Voting  Issuing a vote-gather query  Evaluating the object reputation

11 Evaluation Overview 10,000 downloads since March crawlers collected 200 daily snapshots of the network structure Dataset –Data compiled from about 1,200 Credence clients – 39,000 votes and 84,000 files

Presents the correlation values between any pair of peers with overlapping vote histories On average, each node is directly correlated with 27 other peers. Four groups of peers Correlation between Credence peers

35% of altruistic users, 50% of non-participants, and 15% of attackers Attackers may not have malicious intention The votes from attackers actually provide a tangible benefit to the system The file authenticity is a fairly universal concept among filesharing users Credence users Classification

Local and Transitive Relationships % of peers with valid correlation values Not many high-quality correlations!!!

Different correlation strength and size of usable votes set Consistency –The number of pairs of votes in agreement divided by the number of pairs in agreement or conflict. size of usable set Consistancy of usable vote set

Vote classification Most peer discover their first peer correlation after casting fewer than 18 votes Coordinated attackers cast a lot of votes!! # of votes cast

17 Files in Credence Data set –681 Credence clients. These users advertise a total of 84,838 files, of which 67,794 are unique

File distribution(Decoys) By number of times shared By number of hosts Two types of attacks

File Voting Popularity Voting data set comprises 39,761 votes cast on 35,690 unique files. Positive votes are spread evenly Negative votes a more skewed distribution

Sharing and voting behavior largely independent Voting Can Contradict Sharing Voting and Sharing

21 End-to-End Performance Load generator to repeatedly query the Gnutella network for typical keywords over a 24 hour period, and logged the search results returned (Sortign the file by # of peers sharing it ).

Resistance to Collusion Pick peers from main cluster Large scale attack are more likely to be detected. Detect 75% decoys

Ranking Performance

24 Credence Overhead Inbound traffic: A highly active client receives 100 bytes per second of additional background traffic in Credence. Outbound traffic: depends on popularity of client’s votes, client’s reputation and Gnutella connectivity Processing overhead < 1% of 1.7 GHz

25 Conclusion The fisrt distributed p2p object reputation system to identify pollutions Provide incentives for users to participate honestly in voting Not specific to Gnutella network

26 My comment Pros –Incentive seems robust Cons –Performance verification is weak –No comparison with other mechanism –Still need a centralized certificate authority –Storing votes waste space (need to maintain vote data base, trust graph, correlation table) –People are lazy (Emule way, but can not avoid large attacks)

27 The design of Credence is guided by several goals that are necessary requirements for a successful peer-to-peer reputation mechanism –Relevance –Distribution and Decentralization –Robustness –Isolation –Motivation To participate honestly in the reputation system