The Buddy System : A Distributed Reputation System Based on Social Structure Universität Karlsruhe Stefan Fähnrich 1, Philipp Obreiter 1, Birgitta König-Ries.

Slides:



Advertisements
Similar presentations
Writing the Team Report Chairs and Evaluators Workshop.
Advertisements

Agency reviews: purpose and stages of the review process Achim Hopbach.
Procedural justice and a constructive approach to negotiating with stakeholders Jill Howieson.
Creating the Ultimate Online Customer-Service Experience Stefan Beeli, Vice President ESP Computer Services Choosing the proper level of Technology A look.
Erasmus Mundus ECW – Bridging the gap Bridging the gap Experiences at TU Dresden.
European Certificate for Quality in Internationalisation Your Name.
Chapter McGraw-Hill Ryerson © 2013 McGraw-Hill Ryerson Limited 9 Prepared by Anne Inglis Net Present Value and Other Investment Criteria.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
1/19 DIANE Project Philipp Obreiter, Birgitta König-Ries, Michael Klein Stimulating Cooperative Behavior of Autonomous.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
Symmetric Key Infrastructure Karel Masarik, Daniel Cvrcek Faculty of Information Technology Brno University of Technology
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
John Zammit-Haber National Grid
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Apr 9, 2002Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication The second assignment.
1/18 Philipp Obreiter 1, Birgitta König-Ries 2, Georgios Papadopoulos 1 Engineering Incentive Schemes for Ad Hoc.
Secure Communications … or, the usability of PKI.
Cost Sharing on Sponsored Projects Dick Seligman Tracey Fraser.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Trust and Grid Computing Systems Presented By: Woodas Lai.
1/16 DIANE Project Philipp Obreiter, Michael Klein Vertical Integration of Incentives for Cooperation Universität.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Key Distribution and Route Selection in Wireless Sensor Networks Nathan Lewis, Noria Foukia Information Science.
1 --Ioana Nistoreanu-- Betreuer: Philipp Obreiter Transaction protocols in self organizing systems Projektarbeit :
1 Michael Klein et al., Universität Karlsruhe, Germany Stepwise Refinable Service Descriptions: Adapting DAML-S to Staged Service Trading 1st International.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
1 Michael Klein, Universität Karlsruhe, Germany Integrating Preferences into Service Requests to Automate Service Usage First AKT Workshop on Semantic.
Chapter 9 Cryptographic Protocol Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li.
1/16 DIANE Project Philipp Obreiter A Case for Evidence-Aware Distributed Reputation Systems Overcoming the Limitations.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
National Frameworks of Qualifications, and the UK Experience Dr Robin Humphrey Director of Research Postgraduate Training Faculty of Humanities and Social.
Bridging the UI Gap for Authentication in Smart Environments Sebastian Unger Prof. Dirk Timmermann University of Rostock, Germany MuSAMA DFG Graduate Program.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Third Party Alternative Dispute Resolution. Alternative Dispute Resolution (ADR)?  It involves the application of theories, procedures, and skills designed.
Cryptography, Authentication and Digital Signatures
Beirut, the 17th of April 2013 Bruno Curvale Former president of ENQA Member of the French Bologna Experts’ team Senior Project leader at Centre international.
1 The CeNTIE project is supported by the Australian Government through the Advanced Networks Program of the Department of Communications, Information Technology.
ISO / IEC : 2012 Conformity assessment – Requirements for the operation of various types of bodies performing inspection.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
1 ZYZZYVA: SPECULATIVE BYZANTINE FAULT TOLERANCE R.Kotla, L. Alvisi, M. Dahlin, A. Clement and E. Wong U. T. Austin Best Paper Award at SOSP 2007.
Artificial intelligence methods in the CO 2 permission market simulation Jarosław Stańczak *, Piotr Pałka **, Zbigniew Nahorski * * Systems Research Institute,
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Negotiation and Mediation Presented by Ms. Asha Menon Additional District Judge & Member Secretary, Delhi Legal Services Authority Business Session –II.
Retail Certificate III 2010  Introductions  Name Name  What do you want to do in the future?  Course overview  Unit overview  Assessments  Review.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
1 NATIONAL SYSTEMS UNFCCC Workshop on National Systems under Article 5, paragraph 1, of the Kyoto Protocol 11–12 April 2005 Wissenschaftszentrum, Bonn,
Computer Science and Engineering 1 Mobile Computing and Security.
THE IMPACT OF OSPF ROUTING ON MILITARY MANETS BY ROCCO LUPOI UNDER THE GUIDANCE OF DR. GRANT WIGLEY THESIS - BACHELOR OF COMPUTER SCIENCE (HONOURS) - LHIS.
1/8 Project DIANE: How Social Structure Improves Distributed Reputation Systems Three Hypotheses Universität Karlsruhe.
1 Negotiation – the Delicate Art of Getting What You Want.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Phoenix Convention Center Phoenix, Arizona The Next Network: Lighting, Controls and the Internet of Things Track 3: Energy Technologies August 12, 2015.
Presented by Edith Ngai MPhil Term 3 Presentation
TAODV: A Trusted AODV Routing Protocol for MANET
About The extent to which the Multilateral Instrument (MLI) modifies an existing tax agreement depends on the MLI Positions of the Contracting Jurisdictions.
Seminar for National Delegates to the OIE: “Development of public–private partnerships to support Veterinary Services” 10 November 2015, Kaslik.
Dynam-IX: a Dynamic Interconnection eXchange
Principles for a robust MRV System Lessons learnt from Kyoto Mechanisms Workshop 15: Accounting and accountability: Towards a credible and robust carbon.
A Blockchain-based Distributed Access Control for IoT
Key Establishment Protocols ~
UNFCCC Needs-based Finance (NBF) Project
Presentation transcript:

The Buddy System : A Distributed Reputation System Based on Social Structure Universität Karlsruhe Stefan Fähnrich 1, Philipp Obreiter 1, Birgitta König-Ries 2 1 Universität Karlsruhe Institute for Program Structures and Data Organization 2 Technische Universität München Faculty of Computer Science Workshop “Get Connected to the Mobile World - Data Management in Mobile Environments” September 21, 2004 – Ulm, Germany

Motivation: Students preparing their exercises Amy solved: 1a Need: 2b Offer: 1a Bob solved: 2b 2b 1a John: Nothing solved Peter solved: 2a,b Need: 2a Offer: 1a 2a Need: 2a Offer: 1a Need: 2a Offer: 1a x

Distributed Reputation System Need: 2a Offer: 1a 2a x Warning What if Amy doesn‘t know Peter??? Amy Peter John Bob

Limitations of the existing Reputation System 1) Assement - many informations needed - trust calculation depends on trust towards recommender 2) Self-recommendation - not possible 3) Dissemination of information - no control over dissemination - could lead to bias

Distributed Reputation System with Social Structure Need: 2a Offer: 1a 2a Bob John Amy Peter Warning Bails:X,Y,Z Verification

Overview Design Space and Design Decisions for the Buddy System Evaluation Summary & Outlook

Design Space and Decision (I): Relationships Design Space Relationships (I) – N-ary bilateral multilateral – Direction directed mutual – Type trust, distrust, bail,… Design Decision (I) – bilateral – mutual – bail (buddy)

Design Space and Decision (II): Dynamics Design Space (II) – Establishment Criterion: various group rules Procedure: majority, 100% agreement – Cancellation group – agreement with notification – timeout bilateral – immediate, lazy, third party mediation Design Decision (II) – Establishment Criterion: same world views Procedure: simple agreement – Cancellation lazy cancellation third party mediation John Bob Peter verify Yes, notify Bail: John notify OK

Why Social Structure? 1) Assessment of recommendation - Bails higher trusted - Number bails as a clue for trust 2) Self-Recommendation - possible by stating number of bails 3) Dissemination improved - more effective (through self-recommendation) - controllable

Evaluation Evaluation Goals – improvement through social structure – can social structure itself be exploited? Simulation Setting: – DIANEmu – IBR2 Benchmark

I) Evaluation Thesis: Colluders are discovered effectively Conclusion: Colluders have least gain - Robustness granted

II) Evaluation Thesis: Performance increased independent from setting Conclusion:Thesis verified - still too many vicious entities destroy usabilitiy 25% regular

Newcomers and Messages Thesis: Improved performance for newcomers – Defection rate decreased from 70% to 40% Conclusion: Thesis verified Thesis: Increase of messages through maintenance is lower than total messages saved. – Total number of messages decreased by 20% – 50% less recommendation messages – maintenance overhead low Conclusion: Thesis verified

Summary & Outlook Summary – A distributed reputation system is necessary to uphold usability of the whole system – conventional distributed reputation system have inherent limitations – with a social structure those limitations can be overcome – Buddy System introduced as a distributed reputation system with mutual, pair-based social structure. – Evaluation of the Buddy System Future Work – Evidences (certificates for buddies) – Noise

... Any Questions ???

Messages

Newcomers

6-way Protocol Contract Action Receipt RequesterRequestee

Friends & Foes Each Entity has a personal list of friends and foes (and suspected foes) Friends and foes lists are exchanged, but only used as simple recommendations Directed relationships – No Self Recommendations possible – No explicit social structure formed

Security & Transaction Protocol Certificates are possible with public key exchange gradual exchange not always possible – still „last step“ problem The problem of defection alone can not be solved by a transaction protocol

IBR2 Benchmark

Security & Transaction Protocol Certificates are possible with public key exchange gradual exchange not always possible – still „last step“ problem The problem of defection alone can not be solved by a transaction protocol

Security & Transaction Protocol Certificates are possible with public key exchange gradual exchange not always possible – still „last step“ problem The problem of defection alone can not be solved by a transaction protocol

Security & Transaction Protocol Certificates are possible with public key exchange gradual exchange not always possible – still „last step“ problem The problem of defection alone can not be solved by a transaction protocol

Security & Transaction Protocol Certificates are possible with public key exchange gradual exchange not always possible – still „last step“ problem The problem of defection alone can not be solved by a transaction protocol