Dissuasive Methods Against Cheaters in Distributed Systems Kévin Huguenin Ph.D. defense, December 10 th 2010 TexPoint fonts used in EMF. Read the TexPoint.

Slides:



Advertisements
Similar presentations
Impossibility of Distributed Consensus with One Faulty Process
Advertisements

C&O 355 Lecture 8 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
SPEED: Precise & Efficient Static Estimation of Symbolic Computational Complexity Sumit Gulwani MSR Redmond TexPoint fonts used in EMF. Read the TexPoint.
Definition of the Anonymity of Mix Network Runs Andrei Serjantov University of Cambridge Computer Laboratory.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 The Case for Byzantine Fault Detection. 2 Challenge: Byzantine faults Distributed systems are subject to a variety of failures and attacks Hacker break-in.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
User-level Internet Path Diagnosis Ratul Mahajan, Neil Spring, David Wetherall and Thomas Anderson Designed by Yao Zhao.
U NIVERSITY OF M ASSACHUSETTS A MHERST Department of Computer Science 2007 Exterminator: Automatically Correcting Memory Errors with High Probability Gene.
Distributed Computing 8. Impossibility of consensus Shmuel Zaks ©
Byzantine Generals Problem: Solution using signed messages.
Peter Bulychev Alexandre David Kim G. Larsen Marius Mikucionis TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A.
Bug Isolation via Remote Program Sampling Ben Liblit, Alex Aiken, Alice X.Zheng, Michael I.Jordan Presented by: Xia Cheng.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Principles of Reliable Distributed Systems Lecture 3: Synchronous Uniform Consensus Spring 2006 Dr. Idit Keidar.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
An Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications Hu Xiong, Konstantin Beznosov, Zhiguang Qin, Matei Ripeanu.
Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast Jens Groth BRICS, University of Aarhus Cryptomathic A/S.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
SynchronizationCS-4513, D-Term Synchronization in Distributed Systems CS-4513 D-Term 2007 (Slides include materials from Operating System Concepts,
© 2006 Andreas Haeberlen, MPI-SWS 1 The Case for Byzantine Fault Detection Andreas Haeberlen MPI-SWS / Rice University Petr Kouznetsov MPI-SWS Peter Druschel.
Synchronization in Distributed Systems CS-4513 D-term Synchronization in Distributed Systems CS-4513 Distributed Computing Systems (Slides include.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 6: Synchronous Byzantine.
Distributed Systems Management What is management? Strategic factors (planning, control) Tactical factors (how to do support the strategy practically).
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Failure Resilience in the Peer-to-Peer-System OceanStore Speaker: Corinna Richter.
VeriFlow: Verifying Network-Wide Invariants in Real Time
Manifold Protocols TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A AA Companion slides for Distributed Computing.
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Distributed Algorithms – 2g1513 Lecture 9 – by Ali Ghodsi Fault-Tolerance in Distributed Systems.
The Secrecy of Compressed Sensing Measurements Yaron Rachlin & Dror Baron TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Distributed Virtual Environments Introduction. Outline What are they? DVEs vs. Analytic Simulations DIS –Design principles Example.
DISTRIBUTED SYSTEMS II FAULT-TOLERANT AGREEMENT Prof Philippas Tsigas Distributed Computing and Systems Research Group.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Practical Byzantine Fault Tolerance
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
Fault Tolerance Computer Programs that Can Fix Themselves! Prof’s Paul Sivilotti and Tim Long Dept. of Computer & Info. Science The Ohio State University.
Robustness in the Salus scalable block store Yang Wang, Manos Kapritsos, Zuocheng Ren, Prince Mahajan, Jeevitha Kirubanandam, Lorenzo Alvisi, and Mike.
Intrusion Tolerant Software Architectures Bruno Dutertre and Hassen Saïdi System Design Laboratory, SRI International OASIS PI Meeting.
BFTW 3 workshop (Sep 22, 2009)© 2009 Andreas Haeberlen 1 The Fault Detection Problem Andreas Haeberlen MPI-SWS Petr Kuznetsov TU Berlin / Deutsche Telekom.
A. Haeberlen Fault Tolerance and the Five-Second Rule 1 HotOS XV (May 18, 2015) Ang Chen Hanjun Xiao Andreas Haeberlen Linh Thi Xuan Phan Department of.
High-integrity Sensor Networks Mani Srivastava UCLA.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Chapter 8 Fault.
Hwajung Lee. Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
SOSP 2007 © 2007 Andreas Haeberlen, MPI-SWS 1 Practical accountability for distributed systems Andreas Haeberlen MPI-SWS / Rice University Petr Kuznetsov.
Revisiting failure detectors Some of you asked questions about implementing consensus using S - how does it differ from reaching consensus using P. Here.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
1 Fault-Tolerant Consensus. 2 Communication Model Complete graph Synchronous, network.
CSE 486/586, Spring 2013 CSE 486/586 Distributed Systems Byzantine Fault Tolerance Steve Ko Computer Sciences and Engineering University at Buffalo.
CS 5150 Software Engineering Lecture 22 Reliability 3.
Chapter 8 Fault Tolerance. Outline Introductions –Concepts –Failure models –Redundancy Process resilience –Groups and failure masking –Distributed agreement.
Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University
Providing Secure Storage on the Internet
Athith Amarnath, graduate Student Database and Security Research Group
CS 154, Lecture 6: Communication Complexity
Distributed Consensus
Fault-Tolerant State Machine Replication
Combinatorial Topology and Distributed Computing
Presentation transcript:

Dissuasive Methods Against Cheaters in Distributed Systems Kévin Huguenin Ph.D. defense, December 10 th 2010 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AAA A A

Distributed systems and Models cable fiber losses wireless losses computer Van Neuman 2 upon receive(x) y= x + y send y upon receive(x) y= x + y send y crashes, bugs

Fault models and Approaches bad very bad Crashes, losses Byzantine faults Dishonest users hardware peoplerational conspros 3

4 Approaches: example Masking more roads Preventing speed governing Dissuading speed traps & fines

Detection Punishment Dissuasive Approach: How To 5

Human nature ◦Collaborative dissemination Social nature ◦Computation in Social Networks Outline 6

Collaborative dissemination 7

Epidemics Collaborative Dissemination Principle 8

Collaborative Dissemination Attacks and Dissuasion 9 Propose 12, 22, 31 (free SMS) 4x Request 12, 22 (free SMS) 4x Send 12, 22 (MMS) period Receive 12, 22, 31 4 guests 3x Propose lessLess guestsSend lessBias selection

Verifications Decision Collaborative Dissemination Challenges and Solution A B C I contacted C Yes he didDid he? Did B send what I asked? 0 punished score log CABDEFGH ZYZ Ok  No ZYZ Propose lessLess guestsSend lessBias selection 10

Social networks 11

E.g., polling ◦“Should partners be invited?” Computation in Social Networks 12 Yes! But it sounds cheesy… No! What if my partner had to learn? No way! I have to prevent this from happening But what if people find out?

Computation in Social Networks A new model of entities ◦Reputation ◦Privacy Computation ◦Set of entities ◦Input values ◦Compute ? 13

The S 3 problem Definition Scalable and Secure distributed computations in Social networks 14

The S 3 problem Definition: Candidate S 3 candidate quadruple where is an arbitrary set, is a metric space and is a symmetric function 15

The S 3 problem Definition: Scalability -Scalability message, spatial and computational complexities are 16

The S 3 problem Definition: Accuracy -Accuracy where 17

The S 3 problem Definition: Privacy Probabilistic anonymity For any trace generated from a non-trivial configuration For any coalition of faulty nodes For any non-faulty node Exists another trace (generated from ) s.t. 18

The S 3 problem Definition: Privacy Privacy: probabilistic anonymity ◦Discard trivial input configurations ◦(strong): trivial = inputs can be inferred from output alone ◦(weak): trivial = all inputs are equal 19

The S 3 problem Definition: faults Model of faulty-nodes: ◦Deviate from the protocol BUT ◦Never behave in such a way that their misbehavior is detected with certainty 20

Solving (√,√,weak)-S 3 Architecture groups of size (ring) 21

Solving (√,√,weak)-S 3 Demo: Polling

Solving (√,√,weak)-S 3 Theorem: ◦The protocol S 3 computes aggregation functions for 23

Solving (√,√,weak)-S 3 Proof: Scalability Messages Memory 24

+1 25 Solving (√,√,weak)-S 3 Proof: Accuracy Attack: Voting

 Solving (√,√,weak)-S 3 Proof: Accuracy Attack: Counting

27 Attack: Token corruption Solving (√,√,weak)-S 3 Proof: Accuracy

Impact of one faulty-node: ◦Voting: ◦Counting: ◦Aggregation along the ring: none Relative error is 28 Solving (√,√,weak)-S 3 Proof: Accuracy

Exists (w.h.p.) two equivalent traces where inputs are swapped Group with no faulty node p p q q 29 Solving (√,√,weak)-S 3 Proof: Privacy Output unchanged

Generalization Can compute the multi-set of inputs Can compute any regular function with a fixed input set 30

Conclusion & perspectives User-centric models practical solutions Boundaries Massively multi-player online games 31