Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.

Slides:



Advertisements
Similar presentations
Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Advertisements

Markov Models.
An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
Simultaneous- Move Games with Mixed Strategies Zero-sum Games.
Chapter 14 Infinite Horizon 1.Markov Games 2.Markov Solutions 3.Infinite Horizon Repeated Games 4.Trigger Strategy Solutions 5.Investing in Strategic Capital.
Game Theory and Computer Networks: a useful combination? Christos Samaras, COMNET Group, DUTH.
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
Preference Elicitation Partial-revelation VCG mechanism for Combinatorial Auctions and Eliciting Non-price Preferences in Combinatorial Auctions.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
The Evolution of Conventions H. Peyton Young Presented by Na Li and Cory Pender.
Chain Rules for Entropy
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
N-gene Coalescent Problems Probability of the 1 st success after waiting t, given a time-constant, a ~ p, of success 5/20/2015Comp 790– Continuous-Time.
Planning under Uncertainty
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
Introduction to PageRank Algorithm and Programming Assignment 1 CSC4170 Web Intelligence and Social Computing Tutorial 4 Tutor: Tom Chao Zhou
Estimating the Global PageRank of Web Communities Paper by Jason V. Davis & Inderjit S. Dhillon Dept. of Computer Sciences University of Texas at Austin.
A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks John C.S. Lui The Chinese University of Hong Kong Joint work.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Agent Technology for e-Commerce Chapter 10: Mechanism Design Maria Fasli
Service Differentiated Peer Selection An Incentive Mechanism for Peer-to-Peer Media Streaming Ahsan Habib, Member, IEEE, and John Chuang, Member, IEEE.
Modeling and analysis of BitTorrent-like P2P network Fan Bin Oct,1 st,2004.
1 SLIC: A Selfish Link-based Incentive Mechanism for Unstructured P2P Networks Qixiang Sun Hector Garcia-Molina Stanford University.
1 Maximizing Remote Work in Flooding-based P2P Systems Qixiang Sun Neil Daswani Hector Garcia-Molina Stanford University.
Link Analysis, PageRank and Search Engines on the Web
Robust Mechanisms for Information Elicitation Aviv Zohar & Jeffrey S. Rosenschein The Hebrew University.
ROC Curves.
Free-rider problem in peer-to- peer networks Sumitra Ganesh.
Mechanism Design Traditional Algorithmic Setting Mechanism Design Setting.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
Ryan Kinworthy 2/26/20031 Chapter 7- Local Search part 2 Ryan Kinworthy CSCE Advanced Constraint Processing.
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
1 Statistical Mechanics and Multi- Scale Simulation Methods ChBE Prof. C. Heath Turner Lecture 11 Some materials adapted from Prof. Keith E. Gubbins:
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Mechanisms for Making Crowds Truthful Andrew Mao, Sergiy Nesterko.
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
Network Aware Resource Allocation in Distributed Clouds.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
Reputations Based On Transitive Trust Slides by Josh Albrecht.
CS315 – Link Analysis Three generations of Search Engines Anchor text Link analysis for ranking Pagerank HITS.
The EigenTrust Algorithm for Reputation Management in P2P Networks
A Non-Monetary Protocol for P2P Content Distribution in Wireless Broadcast Networks with Network Coding I-Hong Hou, Yao Liu, and Alex Sprintson Dept. of.
Standard and Extended Form Games A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor, SIUC.
Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu, and Alex Sprintson.
The PageRank Citation Ranking: Bringing Order to the Web Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd Presented by Anca Leuca, Antonis Makropoulos.
Many random walks are faster than one Noga AlonTel Aviv University Chen AvinBen Gurion University Michal KouckyCzech Academy of Sciences Gady KozmaWeizmann.
CompSci 100E 3.1 Random Walks “A drunk man wil l find his way home, but a drunk bird may get lost forever”  – Shizuo Kakutani Suppose you proceed randomly.
Trust Management for the Semantic Web Matthew Richardson1†, Rakesh Agrawal2, Pedro Domingos By Tyrone Cadenhead.
Incentives for Sharing in Peer-to-Peer Networks By Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge.
Approximate Inference: Decomposition Methods with Applications to Computer Vision Kyomin Jung ( KAIST ) Joint work with Pushmeet Kohli (Microsoft Research)
Auctions serve the dual purpose of eliciting preferences and allocating resources between competing uses. A less fundamental but more practical reason.
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
Aug 22, 2002Sigcomm 2002 Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen AT&T Labs-research Scott Shenker ICIR.
Mechanism Design with Strategic Mediators Moran Feldman EPFL Joint work with: Moshe Babaioff, Microsoft Research Moshe Tennenholtz, Technion.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
CompSci 100E 4.1 Google’s PageRank web site xxx web site yyyy web site a b c d e f g web site pdq pdq.. web site yyyy web site a b c d e f g web site xxx.
The Standard Genetic Algorithm Start with a “population” of “individuals” Rank these individuals according to their “fitness” Select pairs of individuals.
 Public Goods In Networks Ryan Dewar. What is a public good  Public goods have two distinct aspects:  Non-excludable: The cost of keeping nonpayers.
Approximation algorithms for combinatorial allocation problems
The PageRank Citation Ranking: Bringing Order to the Web
Instructor: Shengyu Zhang
PageRank algorithm based on Eigenvectors
Normal Form (Matrix) Games
Presentation transcript:

Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin

Roadmap Incentive problems in P2P systems Trust systems and manipulation Requirements for a truthful trust system A negative result A positive result – two truthful trust systems based on EigenTrust

P2P Systems Incentive Problems P2P systems face two kinds of problems Malicious peers – RIAA on Kazaa – A malicious collective answering queries with fake files Free-riders – Most other users on Kazaa – Individual users selfishly maximizing their own utility by downloading without sharing

P2P Trust Systems Attempt to solve malicious peer and free- rider problems Peers make recommendations based on successful downloads received Recommendations are used to calculate a trust score Trusted peers are chosen to serve files Trusted peers are rewarded with better quality of service

Keeping Them Honest Trust systems resolve the malicious peers problem and the free-rider problem Are we done?

Keeping Them Honest Trust systems resolve the malicious peers problem and the free-rider problem Are we done? Unfortunately, honest peers that previously had no reason to cheat now will lie to improve their trust Recommendations won’t reflect downloads Our contribution: we seek a truthful trust system

EigenTrust (Kamvar, Schlosser, Garcia-Molina 03) Recommendations form a directed graph Calculates PageRank on recommendation graph Recommendations from trusted nodes are worth more Malicious peers who recommend each other still won’t receive high trust scores

Malicious and Selfish Agents Malicious agents attempt to spread bad files – EigenTrust alienates these peers in simulations – Our new trust system should retain this property Selfish agents seek to maximize own utility – EigenTrust makes selfish agents wish to maximize their trust by sharing many files – Selfish agents now also lie about downloads – Trust system should make selfish agents truthful

EigenTrust Model Time is divided into rounds During the round – each agent makes queries q 2 Q i – servers are chosen based on their trust scores At end of round – agents report downloads d i to center – center calculates trust score T i (d i, d -i ) for next round

EigenTrust Algorithm Trust is defined as the stable distribution over a “random surfer” Markov chain – Each recommendation by a peer is a probability distribution over nodes it has downloaded from – Follow links or teleport a la PageRank

EigenTrust Algorithm Consider the Markov chain defined as random walk over the download graph

EigenTrust Algorithm First, choose a peer at random.

EigenTrust Algorithm With 1-  probability, follow a recommendation from that peer to another peer.

EigenTrust Algorithm Or with  probability, teleport to a random peer.

EigenTrust Algorithm Repeat

EigenTrust Algorithm Repeat

EigenTrust Algorithm Repeat

EigenTrust Algorithm Trust scores are the stable distribution over this Markov chain Can be calculated as the principal right eigenvector of the transition matrix

Manipulation Example nn  n

Manipulation Example nn nn

Manipulation example nn  n nn nn The middle node can increase its trust from (2-  )  /n to 1/n by manipulating its recommendations This is nearly a factor of three, and independent of the number of peers This example is likely to be common in practice

One-round Strategic Model Players: N Actions: report of downloads d i Payoff for i 2 N: T i (d i, d -i ) Dominant Strategy Equilibrium – For all d -i, d i *, and d i, T i (d i *, d -i ) ¸ T i (d i, d -i ) – Thus T i (d i, d -i ) must be equal over all d i – No report of downloads can give greater utility than any other.

Indifference Peers’ private values are not preferences! – Preferences are commonly known – Everyone wants high trust – This means we cannot use standard mechanism design tricks We will have to make peers indifferent between their recommendations

Strategic Goals Myopic non-manipulability – A peer cannot affect its score in round r+1 by manipulating its recommendations in round r Strong non-manipulability – A peer cannot affect its score in any future round by manipulating its recommendations in round r

Goals We seek to achieve a trust system T’ with the following three properties: 1. T’ is non-manipulable (myopic or strong) 2. T’ approximates EigenTrust We use variational distance  i 2 N |t i – t i ’| This error is the maximum amount of trust malicious peers can gain over EigenTrust 3. T’ generates trust that sums to 1 We use T’ to parcel out the quality of service in network.

A Negative Result Let D be a set of allowed downloads Let d i, d i ’ 2 D i be download reports s.t. T i (d i ’, d -i ) ¸ T i (d i, d -i ) +  Then no T’ can have error less than  /2 T i (d i ’, d -i )T i (d i, d -i )  Best T i (d -i ) = ½ T i (d i, d -i ) + ½ T i (d i ’, d -i )

A Negative Result Let D be a set of legal downloads Let d i, d i ’ 2 D i be download reports s.t. T i (d i ’, d -i ) ¸ T i (d i, d -i ) +  Then no T’ can have error less than  /2 Thus, we must restrict the topology of the network so that no manipulation is too profitable

Achieving Myopic Non-manipulability Cyclic partitioning – Partition the nodes into m colors of equal size – Arrange the colors randomly into a cycle – Peers are only allowed to download from peers of their successor color Modified eigenvector calculation – When calculating the trust of peers of color c, set all peers of color c to have uniform links to succ(c).

Cyclic Partitioning Actual Download Graph Original Links u v succ(c)c Uniform Links succ(c)c Trust Calculation Graph

Cyclic Partitioning Properties T’ sums to 1 – Each color sums to 1/m T’ is myopically non-manipulable – Each peer’s recommendations are not used in calculating its trust T’ approximates EigenTrust –  i 2 N |t i – t i ’| · 2(1-  ) m – need only O(log(1/  )) colors to bound error by  – proven by coupled Markov chain argument

Trade-offs As the number of colors increases – the approximation improves – but the trust scores become less useful – if m = n, then each node has no choice in downloading, and the trust scores are useless Thus, there is a trade-off between fidelity to EigenTrust and the usefulness of the trust scores – With a logarithmic number of colors, we have the best of both worlds

Achieving Strong Non-manipulability We wish to prevent peers from manipulating their scores in every future round Thus, we require that the trust score of a peer i is independent of the recommendations of each peer j whose trust score i can affect Influence is a directed acyclic graph

Cut Partitioning Choose a start color s Set nodes of the start color to have uniform trust – Equivalent to setting pred(s) to have uniform outgoing links Propagate trust forward around the cycle to pred(s)

Cut Partitioning Original Download Graph Original Links u v succ(c)c Cut Download Graph Uniform Links s pred(s)

Cut Partitioning Properties T’ generates a trust score that sums to 1 – Trust is calculated as a probability distribution T’ is strongly non-manipulable – Influence is a directed acyclic graph T’ approximates EigenTrust –  i 2 N |t i – t i ’| · 2/  m – only linear decrease in error as m increases – strong non-manipulability is harder to achieve with EigenTrust

Conclusions We have exhibited two truthful trust systems under different strategic models Our model and methods are applicable to a variety of trust systems, not just EigenTrust Future work: – Quantify trade-off between approximation and usefulness of trust – Specify the remaining policies of a truthful P2P system based on EigenTrust – Extend to other trust systems