Gossip-Based Aggregation of Trust in Decentralized Reputation Systems Ariel D. Procaccia, Yoram Bachrach, and Jeffrey S. Rosenschein.

Slides:



Advertisements
Similar presentations
On the Robustness of Preference Aggregation in Noisy Environments Ariel D. Procaccia, Jeffrey S. Rosenschein and Gal A. Kaminka.
Advertisements

Gossip-Based Computation of Aggregation Information
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
Theory of Computing Lecture 3 MAS 714 Hartmut Klauck.
Maximizing the Spread of Influence through a Social Network
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
A Computational Characterization of Multiagent Games with Fallacious Rewards Ariel D. Procaccia and Jeffrey S. Rosenschein.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Distributed Algorithms for Secure Multipath Routing
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
Distributed Multiagent Resource Allocation In Diminishing Marginal Return Domains Yoram Bachrach(Hebew University) Jeffrey S. Rosenschein (Hebrew University)
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Radial Basis Functions
Convergent and Correct Message Passing Algorithms Nicholas Ruozzi and Sekhar Tatikonda Yale University TexPoint fonts used in EMF. Read the TexPoint manual.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Incentive Compatible Regression Learning Ofer Dekel, Felix A. Fischer and Ariel D. Procaccia.
Ensemble Learning: An Introduction
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
Aggregation in Sensor Networks NEST Weekly Meeting Sam Madden Rob Szewczyk 10/4/01.
Geographic Gossip: Efficient Aggregations for Sensor Networks Author: Alex Dimakis, Anand Sarwate, Martin Wainwright University: UC Berkeley Venue: IPSN.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Computing the Banzhaf Power Index in Network Flow Games
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
Junta Distributions and the Average Case Complexity of Manipulating Elections A. D. Procaccia & J. S. Rosenschein.
Impact of Problem Centralization on Distributed Constraint Optimization Algorithms John P. Davin and Pragnesh Jay Modi Carnegie Mellon University School.
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Communication (II) Chapter 4
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Consensus-based Distributed Estimation in Camera Networks - A. T. Kamal, J. A. Farrell, A. K. Roy-Chowdhury University of California, Riverside
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
Trust-Aware Optimal Crowdsourcing With Budget Constraint Xiangyang Liu 1, He He 2, and John S. Baras 1 1 Institute for Systems Research and Department.
The EigenTrust Algorithm for Reputation Management in P2P Networks
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition LECTURE 16: NEURAL NETWORKS Objectives: Feedforward.
COMPUTING AGGREGATES FOR MONITORING WIRELESS SENSOR NETWORKS Jerry Zhao, Ramesh Govindan, Deborah Estrin Presented by Hiren Shah.
DATA MINING LECTURE 13 Pagerank, Absorbing Random Walks Coverage Problems.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Many random walks are faster than one Noga AlonTel Aviv University Chen AvinBen Gurion University Michal KouckyCzech Academy of Sciences Gady KozmaWeizmann.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
ADVANCED PERCEPTRON LEARNING David Kauchak CS 451 – Fall 2013.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Bahman Bahmani Stanford University
Non-Photorealistic Rendering and Content- Based Image Retrieval Yuan-Hao Lai Pacific Graphics (2003)
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Final Presentation Avilés-Angélica, Blanco-Alberto, Fuentes-Alba, Pell-Xavier, Schenini-Juan, Talukder-Nurul.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Learning and Acting with Bayes Nets Chapter 20.. Page 2 === A Network and a Training Data.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Antidio Viguria Ann Krueger A Nonblocking Quorum Consensus Protocol for Replicated Data Divyakant Agrawal and Arthur J. Bernstein Paper Presentation: Dependable.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Clustering Data Streams A presentation by George Toderici.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Output Perturbation with Query Relaxation By: XIAO Xiaokui and TAO Yufei Presenter: CUI Yingjie.
Optimization and Stability in Games with Restricted Interactions Reshef Meir, Yair Zick and Jeffrey S. Rosenschein CoopMAS 2012.
Clustering.
Presentation transcript:

Gossip-Based Aggregation of Trust in Decentralized Reputation Systems Ariel D. Procaccia, Yoram Bachrach, and Jeffrey S. Rosenschein

Lecture Outline Introduction Gossip-based algorithms Our approach Features Motivates truthfulness Impervious to attacks Conclusions Introduction Gossip-based algorithms Our approach Features Motivates truthfulness Impervious to attacks Conclusions IntroductionGossip-BasedOur ApproachFeaturesConclusions

Background Multiagent environments are often teeming with self-interested agents which are continually interacting. Agents may be tempted to employ deceit, but dishonest agents can expect their victims to retaliate. This motivates cooperation and trustworthiness. Multiagent environments are often teeming with self-interested agents which are continually interacting. Agents may be tempted to employ deceit, but dishonest agents can expect their victims to retaliate. This motivates cooperation and trustworthiness. IntroductionGossip-BasedOur ApproachFeaturesConclusions

Reputation Systems As number of agents grows, agents have smaller chance to interact with agents they know. Building trust becomes harder. Reputation systems collect and spread reports among agents. Agents learn from others’ experience. As number of agents grows, agents have smaller chance to interact with agents they know. Building trust becomes harder. Reputation systems collect and spread reports among agents. Agents learn from others’ experience. IntroductionGossip-BasedOur ApproachFeaturesConclusions

Motivation Reputation systems decompose into: Trust model. Data management scheme. Data management solutions: Central database: inappropriate. Previous suggestions plagued by: large data structures, evaluation of trust is based on local information. Reputation systems decompose into: Trust model. Data management scheme. Data management solutions: Central database: inappropriate. Previous suggestions plagued by: large data structures, evaluation of trust is based on local information. IntroductionGossip-BasedOur ApproachFeaturesConclusions

The Telephone Call Problem IntroductionGossip-BasedOur ApproachFeaturesConclusions

Computing Aggregate Info Push-Sum [Kempe et al. 2003] computes avg of values at nodes. At each turn, each node maintains sum and weight. Sends half of sum and weight to node chosen randomly. Current evaluation: sum/weight. The diffusion speed of uniform gossip U(n, ,  ) is an upper bound on the number of turns required so that the error at each node is at most  with probability 1- . Push-Sum [Kempe et al. 2003] computes avg of values at nodes. At each turn, each node maintains sum and weight. Sends half of sum and weight to node chosen randomly. Current evaluation: sum/weight. The diffusion speed of uniform gossip U(n, ,  ) is an upper bound on the number of turns required so that the error at each node is at most  with probability 1- . IntroductionGossip-BasedOur ApproachFeaturesConclusions

Computing Aggregate Info Theorem: U(n, ,  )=O( logn + log(1/  )+log(1/  )). Aggregation persists in face of failures. Still works when point-2-point communication cannot be assumed, e.g. in peer-2-peer networks. Theorem: U(n, ,  )=O( logn + log(1/  )+log(1/  )). Aggregation persists in face of failures. Still works when point-2-point communication cannot be assumed, e.g. in peer-2-peer networks. IntroductionGossip-BasedOur ApproachFeaturesConclusions

r 2 1  NA r 2 2  1 r 2 3  NA r 2 4  NA A demonstration r 1 1  NA r 1 2  1 r 1 3  NA r 1 4  NA r 1 1  1 r 1 2  NA r 1 3  NA r 1 4  NA r 2 1  NA r 2 2  1 r 2 3  0.9 r 2 4  NA r 3 1  NA r 3 2  NA r 3 3  1 r 3 4  NA r 3 1  NA r 3 2  0.6 r 3 3  1 r 3 4  NA r 1 1  1 r 1 2  0.3 r 1 3  NA r 1 4  NA r 2 1  0.1 r 2 2  1 r 2 3  0.9 r 2 4  NA IntroductionGossip-BasedOur ApproachFeaturesConclusions Should I deal with 2?

Details of approach Each agent i maintains evaluation r i j of agents j it interacted with. Let r j =  k r k j. When interacting with j, i obtains r j using Push-Sum. Inputs are r k j. Salient features: Decentralization. Scalability. Robustness to failure. Globality. Simple data structures. Each agent i maintains evaluation r i j of agents j it interacted with. Let r j =  k r k j. When interacting with j, i obtains r j using Push-Sum. Inputs are r k j. Salient features: Decentralization. Scalability. Robustness to failure. Globality. Simple data structures. IntroductionGossip-BasedOur ApproachFeaturesConclusions

Motivates Truthfulness A priori, makes sense to be dishonest on occasion. Each agent has thresholds r i thr,  i. Must repeatedly decrease  until sure of result. Theorem: Let  ij =|r j -r i thr |. Then the time to decide is O( logn + log(1/  i ) + log(1/  ij )). Higher reputation  close deals faster. A priori, makes sense to be dishonest on occasion. Each agent has thresholds r i thr,  i. Must repeatedly decrease  until sure of result. Theorem: Let  ij =|r j -r i thr |. Then the time to decide is O( logn + log(1/  i ) + log(1/  ij )). Higher reputation  close deals faster. IntroductionGossip-BasedOur ApproachFeaturesConclusions

Impervious to attacks During Push-Sum, agents repeatedly update evaluation. Consider: i maintains sum/weight=1. Theorem: at each node, evaluation of average converges to 1 in probability. Theorem: after T stages, the expected difference in the average  T/2n. Insubstantial when T=O(logn). During Push-Sum, agents repeatedly update evaluation. Consider: i maintains sum/weight=1. Theorem: at each node, evaluation of average converges to 1 in probability. Theorem: after T stages, the expected difference in the average  T/2n. Insubstantial when T=O(logn). IntroductionGossip-BasedOur ApproachFeaturesConclusions

Proof Sketch w S w S S w w S w S w S w w S S + IntroductionGossip-BasedOur ApproachFeaturesConclusions

Proof Sketch The difference in total sum, in stage t, is at most the total weight sent to the manipulator. The expected weight sent to the manipulator at stage t is ½. Linearity of expectation  multiply by T. Divide by n to obtain difference in average. The difference in total sum, in stage t, is at most the total weight sent to the manipulator. The expected weight sent to the manipulator at stage t is ½. Linearity of expectation  multiply by T. Divide by n to obtain difference in average. IntroductionGossip-BasedOur ApproachFeaturesConclusions

Features: Decentralization. Scalability. Robustness to failure. Globality. Simple data structures. Motivates Truthfulness. Impervious to certain attacks. Some existing trust models are compatible [Aberer and Despotovic 2001, Xiong and Liu 2003]. Features: Decentralization. Scalability. Robustness to failure. Globality. Simple data structures. Motivates Truthfulness. Impervious to certain attacks. Some existing trust models are compatible [Aberer and Despotovic 2001, Xiong and Liu 2003]. IntroductionGossip-BasedOur ApproachFeaturesConclusions