Reputations Based On Transitive Trust Slides by Josh Albrecht.

Slides:



Advertisements
Similar presentations
Maximum flow Main goals of the lecture:
Advertisements

Completeness and Expressiveness
6.896: Topics in Algorithmic Game Theory Lecture 21 Yang Cai.
Ranking, Trust, and Recommendation Systems: An Axiomatic Approach Moshe Tennenholtz TechnionIsrael Institute of Technology and Microsoft Israel R&D Center.
6.896: Topics in Algorithmic Game Theory Lecture 20 Yang Cai.
Based on slides by Y. Peng University of Maryland
Price Of Anarchy: Routing
Greedy Algorithms Greed is good. (Some of the time)
An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
3/17/2003Tucker, Applied Combinatorics Section 4.2a 1 Network Flows Michael Duquette & Whitney Sherman Tucker, Applied Combinatorics, Section 4.2a, Group.
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
Multicut Lower Bounds via Network Coding Anna Blasiak Cornell University.
Section 7.4: Closures of Relations Let R be a relation on a set A. We have talked about 6 properties that a relation on a set may or may not possess: reflexive,
Train DEPOT PROBLEM USING PERMUTATION GRAPHS
4/5/05Tucker, Sec Applied Combinatorics, 4rth Ed. Alan Tucker Section 4.3 Graph Models Prepared by Jo Ellis-Monaghan.
The number of edge-disjoint transitive triples in a tournament.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
Complexity 11-1 Complexity Andrei Bulatov Space Complexity.
CS138A Network Flows Peter Schröder. CS138A Flow Networks Definitions a flow network G=(V,E) is a directed graph in which each edge (u,v)
1 Undecidability Andreas Klappenecker [based on slides by Prof. Welch]
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
The Page Rank Axioms Based on Ranking Systems: The PageRank Axioms, by Alon Altman and Moshe Tennenholtz. Presented by Aron Matskin.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
A general approximation technique for constrained forest problems Michael X. Goemans & David P. Williamson Presented by: Yonatan Elhanani & Yuval Cohen.
Ranking Systems: Manipulability and Efficiency Eric Friedman*, ORIE Cornell University (Currently visiting: Dept of CS, U.C. Berkeley, ) *Work supported.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Group Strategyproofness and No Subsidy via LP-Duality By Kamal Jain and Vijay V. Vazirani.
1 Manipulation of Voting Schemes: A General Result By Allan Gibbard Presented by Rishi Kant.
Strategic Behavior in Multi-Winner Elections A follow-up on previous work by Ariel Procaccia, Aviv Zohar and Jeffrey S. Rosenschein Reshef Meir The School.
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman.
Induction and recursion
Database Systems Normal Forms. Decomposition Suppose we have a relation R[U] with a schema U={A 1,…,A n } – A decomposition of U is a set of schemas.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Section 5.3. Section Summary Recursively Defined Functions Recursively Defined Sets and Structures Structural Induction.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
More on Social choice and implementations 1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A Using slides by Uri.
Hybrid Transitive Trust Mechanisms Jie Tang, Sven Seuken, David C. Parkes UC Berkeley, Harvard University,
UNC Chapel Hill Lin/Foskey/Manocha Minimum Spanning Trees Problem: Connect a set of nodes by a network of minimal total length Some applications: –Communication.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 11, 2014.
On a Network Creation Game PoA Seminar Presenting: Oren Gilon Based on an article by Fabrikant et al 1.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Approximating Market Equilibria Kamal Jain, Microsoft Research Mohammad Mahdian, MIT Amin Saberi, Georgia Tech.
Discrete Structures Lecture 12: Trees Ji Yanyan United International College Thanks to Professor Michael Hvidsten.
Optimal Link Bombs are Uncoordinated Sibel Adali Tina Liu Malik Magdon-Ismail Rensselaer Polytechnic Institute.
NP-COMPLETE PROBLEMS. Admin  Two more assignments…  No office hours on tomorrow.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
ICS 253: Discrete Structures I Induction and Recursion King Fahd University of Petroleum & Minerals Information & Computer Science Department.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
CS 103 Discrete Structures Lecture 13 Induction and Recursion (1)
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
Mathematical Induction Section 5.1. Climbing an Infinite Ladder Suppose we have an infinite ladder: 1.We can reach the first rung of the ladder. 2.If.
CompSci 102 Discrete Math for Computer Science March 13, 2012 Prof. Rodger Slides modified from Rosen.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
12. Lecture WS 2012/13Bioinformatics III1 V12 Menger’s theorem Borrowing terminology from operations research consider certain primal-dual pairs of optimization.
Markov Random Fields in Vision
Approximation Algorithms Duality My T. UF.
Chapter 5 With Question/Answer Animations 1. Chapter Summary Mathematical Induction - Sec 5.1 Strong Induction and Well-Ordering - Sec 5.2 Lecture 18.
1 GRAPHS – Definitions A graph G = (V, E) consists of –a set of vertices, V, and –a set of edges, E, where each edge is a pair (v,w) s.t. v,w  V Vertices.
TU/e Algorithms (2IL15) – Lecture 8 1 MAXIMUM FLOW (part II)
Minimum Spanning Tree 8/7/2018 4:26 AM
Local Connection Game.
Instructor: Shengyu Zhang
Algorithms (2IL15) – Lecture 7
V12 Menger’s theorem Borrowing terminology from operations research
Minimum Spanning Trees
Presentation transcript:

Reputations Based On Transitive Trust Slides by Josh Albrecht

Overview Transitive Trust Examples Problem Background and Definition Example Algorithms Sybil Attacks More Definitions Two Theorems on Impossibility of Defense Against Sybil Attacks [Friedman et al, 2007] Solution—Two More Theorems Practical Implications Related Theorems [Altman & Tennenholtz, 2007]

Transitive Trust-Based Reputations Problem: Want to decide how much to trust some entity in the presence of subjective feedback Solution: Use transitive trust—an entity’s reputation determines how much we trust a piece of feedback from that entity. –ie, if A trusts B, and B trusts C, then A trusts C more than unknown node D –Basically, we start with a set of trusted nodes, and expand the notion of trust recursively from there

Real Life Examples

Transitive Trust-Based Reputations

Example Trust Mechanisms Pathrank Max Flow PageRank

Definitions Trust Graph: Set of players (vertices): Set of edges: Trust values: Reputation function: Reputation of is symmetric iff commutes with permutation of the node names

Example Trust Mechanisms Pathrank Max Flow PageRank

PathRank Example

Max Flow Example

PageRank Initial algorithm behind Google’s ranking of webpages Each page has a PageRank score Outgoing links give 1/PageRank score to their targets Simplified Algorithm: [Wikipedia, 2008] –Simulate surfer that starts at a random page and randomly clicks links, with a 15% chance of going to a completely random page. –Resulting rankings are approximately equal to the chance that such a surfer will be on that page at any given time

PageRank Example

Problems With Transitive Trust We will be assuming the network and all data is known Players have no incentive to provide trust values There may be strong incentive to provide incorrect trust values Ideally we want a reputation system that is rank- strategyproof: v cannot improve his rank ordering by strategic choices of t values. …unfortunately, any nontrivial, monotonic, symmetric reputation system cannot be rank-strategyproof. –This is easy to see. Any time another node that you have interacted with is higher ranked than you, just drop your outgoing edge to them to bring them down

Sybil Attacks A single agent creates many other fake players (sybils) with the goal of improving the agent’s reputation The malicious agent can make any structure of links and trust between sybils and himself Incoming trust links can be redirected from the original malicious agent to any of the sybils in a way that preserves the overall amount of incoming trust

Sybil Attack Example

More Definitions: Sybil Strategy Given graph and user v we say that and subset is a sybil strategy for v in G if and collapsing into a single node v in yields G. Thus a sybil strategy is denoted, and we refer to as the sybils of v.

G V

V

V

More Definitions: Value-Sybilproof A reputation function F is value- sybilproof if for all graphs, there is no sybil strategy of node v that can cause v to have a higher reputation value than in the original graph.

More Definitions: Rank-Sybilproof A reputation function F is rank- sybilproof if for all graphs, there is no sybil strategy that can cause node v to outrank a node w if v did not outrank w in the original graph.

Theorem 27.5 Theorem: There is no nontrivial symmetric rank-sybilproof reputation function. Informal Proof: Given a graph with rank(v) > rank(w), let the sybils of v be a duplicate of the entire graph Then by symmetry, there is some node u in the sybil set such that rank rank(u) = rank(w) Thus, F is not rank-sybilproof. QED

Theorem 27.5 v w u v w Original Graph (G) New Graph (G 1 )

Theorem 27.5 Theorem: There is no nontrivial symmetric rank-sybilproof reputation function. Proof: Given and reputation fn F Let Consider where By symmetry Thus, F is not rank-sybilproof. QED

Last Definition: K-Rank-Sybilproof Reputation function F is K-rank-sybilproof iff it is rank-sybilproof for all sybil strategies with

Theorem 27.7 Theorem: There is no symmetric nontrivial K-rank- sybilproof for K > 0 Informal Proof: Consider the setup from the previous proof There is some node w that outranks v in the original graph and is equal to u in the final graph Consider the process of slowly constructing the duplicate graph At some point, adding a single node will cause the rank(u) >= rank(w) Then adding that single node is a successful sybil strategy for u in that particular graph Thus F is not rank-1 sybilproof on all graphs

Theorem 27.7 w w Original Graph (G) New Graph (G 1 )

Theorem 27.7 w w Original Graph (G) New Graph (G 1 )

Theorem 27.7 w vw Original Graph (G) New Graph (G 1 )

Implications All symmetric reputation functions are vulnerable to this attack –Ex: PageRank, SEO, and spam websites Solution? –Use asymmetric approaches (seed set, real-world solution) Next theorems prove sybilproofness for max flow and shortest path reputation functions

Theorem 27.8 Theorem: The max-flow based ranking mechanism is value-sybilproof Proof: Max Flow = Min Cut All sybils of v must be on the same side of the cut as v, thus not on the same side as the source s Thus, no sybil can have a higher value than the min cut, which is equal to, QED

Max Flow Example

Theorem 27.9 Theorem: The Pathrank reputation mechanism is value and rank-sybilproof Proof: Sybils cannot decrease the length of the shortest path, thus it is value-sybilproof For rank-sybilproofness, note that a node v can only affect another node w’s ranking if v is on the shortest path to w. But if that is true, then. QED

Practical Implications SybilGuard [Yu et. al., 2006] –Some researchers at Intel have done an empirical study of defense against Sybil attacks –They use path distance (asymmetric measure) to get around these symmetry problems SEO –The internet works at all because there is a set of sites that we know have good reputations, so PageRank worked (at least in the past) –Also, creating sybils in this domain (web page reputation) is expensive and difficult P2P –Some researchers have looked at how these principles apply in the P2P setting, where users want to know which other nodes will give them valid copies of the file, and have good performance

Other Properties of Reputation Ranking Mechanisms Weak Positive Response: adding an edge from u to v will not decrease the rank of v Strong Positive Response: if w and v have equal ranks, adding an edge from u to v will increase the rank of v

Other Properties of Reputation Ranking Mechanisms Minimal Fairness: when there are no edges, all players have the same rank Weak Monotonicity: if the set of vertices with edges going to v is a superset of the set of edges with vertices going to u, then v does not have a lower rank than u Strong Monotonicity: if the set of vertices with edges going to v is a strict superset of the set of edges with vertices going to u, then v has a higher rank than u

Other Properties of Reputation Ranking Mechanisms Weak Union Condition: If v is ranked <= u in G, then v is ranked <= u in a new graph consisting of G and some other arbitrary graph H. Strong Union Condition: If v is ranked <= u in G, then v is ranked <= u in a new graph consisting of G and some other arbitrary graph H even if edges are allowed between G and H in the new graph. Old graph New graph

Approval Voting Ranking Definition: v is ranked <= u iff the number of incoming edges of v is <= the number incoming edges of u. Fact: The Approval Voting ranking mechanims satisfies minimal fairness, strong monotonicity, strong positive response, the strong union condition, and infinite non-triviality.

Incentive Compatibility Incentive Compatible: F is incentive compatible if the expected utility from its ranking is not affected by manipulating its outgoing edges. Strongly Incentive Compatible: F is incentive compatible for all nondecreasing utility functions. Weakly Incentive Compatible: F is incentive compatible for all utility functions of the form a*k+b, where a and b are real numbers and k is the rank.

Incentive Compatibility Without Minimum Fairness Proposition: There exists a ranking system F1 that satisfies strong incentive compatibility, strong positive response, infinite non- triviality, and the strong union condition.

Incentive Compatibility With Minimum Fairness Theorem: There exist weakly incentive compatible, infinitely nontrivial, minimally fair ranking systems F2, F3, F4, that satisfy weak monotonicity; weak positive response; and the weak union condition respectively. However there is no weakly incentive compatible, nontrivial, minimally fair ranking mechanism that satisfies any two of those three properties. Theorem: There is no weakly incentive compatible, nontrivial, minimally fair ranking system that satisfies either one of the four properties: strong monotonicity, strong positive response, the strong union condition, or strong incentive compatibility.

Conclusions We’ve seen a bunch of results about the possibility for various types of transitive trust reputation mechanisms It’s very hard/impossible to make such mechanisms fair (symmetric) and incentive compatible (immune to malicious behavior like sybil attacks) Asymmetry (treating certain nodes as more reliable than others) can solve these problems. There are real world problems directly connected to these theoretical results (PageRank, P2P systems)

Thanks!

Theorem 27.7 Theorem: There is no symmetric nontrivial K-rank- sybilproof for K > 0 Formal Proof: Consider the previous proof. Let be the original vertex set Let be the duplicate. Let Let

Theorem 27.7 Proof (continued) Then while Thus but Let m be the node in that has the greatest reputation in The either or It follows that the addition of node u t+1 is a successful sybil strategy for m in G t. Thus F is not 1-rank-sybilproof on all graphs. QED.