A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science.

Slides:



Advertisements
Similar presentations
C. Mastroianni, D. Talia, O. Verta - A Super-Peer Model for Resource Discovery Services in Grids A Super-Peer Model for Building Resource Discovery Services.
Advertisements

Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
Basic Computer Networks Configurations (cont.) School of Business Eastern Illinois University © Abdou Illia, Spring 2006 Week 2, Thursday 1/19/2006)
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Peer-to-Peer Databases David Andersen Advanced Databases.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.

Searching In Peer-To-Peer Networks Chunlin Yang. What’s P2P - Unofficial Definition All of the computers in the network are equal Each computer functions.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
AlvisP2P : Scalable Peer-to-Peer Text Retrieval in a Structured P2P Network Toan Luu, Gleb Skobeltsyn, Fabius Klemm, Maroje Puh, Ivana Podnar Zarko, Martin.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Evaluation GUESS and Non-Forwarding Peer-to-Peer search ICDCS paper Beverly Yang Patrick Vinograd Hector Garcia-Molina Computer Science Department, Stanford.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
03/19/02Scalab Seminar Series1 Finding Good Peers in Peer-to-Peer Networks Ramaswamy N.Vadivelu Scalab, ASU.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Composing Web Services and P2P Infrastructure. PRESENTATION FLOW Related Works Paper Idea Our Project Infrastructure.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Presentation transcript:

A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science Iowa State University Ames, Iowa, USA

Outline Peer-to-peer(P2P) networks overviewPeer-to-peer(P2P) networks overview Related workRelated work Proposed approachProposed approach ExperimentsExperiments

Peer-to-peer (P2P) networks overview P2P network - an overlay network of peers exchanging resourcesP2P network - an overlay network of peers exchanging resources common uses: file sharing, distributed computing, instant messagingcommon uses: file sharing, distributed computing, instant messaging types:types: Centralized (Napster)Centralized (Napster) Central indexing server contains information about all peer’s shared filesCentral indexing server contains information about all peer’s shared files Decentralized (Gnutella, Freenet)Decentralized (Gnutella, Freenet) No central indexing, all peers are equalNo central indexing, all peers are equal Very popularVery popular Hybrid (KaZaA, FastTrack)Hybrid (KaZaA, FastTrack) Supernodes maintain index of files shared by their local peersSupernodes maintain index of files shared by their local peers

P2P networks overview Differences with traditional networksDifferences with traditional networks Highly dynamicHighly dynamic autonomous peersautonomous peers peers leave & join the network at any timepeers leave & join the network at any time shared storageshared storage Peers act as servers and clientsPeers act as servers and clients

P2P security threats Denial-Of-Service attacks (DoS)Denial-Of-Service attacks (DoS) Decentralized P2P networks (Gnutella)Decentralized P2P networks (Gnutella) Virus distributionVirus distribution Dishonest uploadDishonest upload Unauthorized access to informationUnauthorized access to information Goal: communication with trusted peers only

Reputation-based approach Natural mechanism for selecting trusted partners for communicationNatural mechanism for selecting trusted partners for communication limit communication with unreliable peerslimit communication with unreliable peers Most commonly usedMost commonly used

Related work Centralized approachesCentralized approaches Debit-Credit Reputation Computation (DCRC) schemaDebit-Credit Reputation Computation (DCRC) schema Each peer tracks its own positive contribution using credit-debit mechanismEach peer tracks its own positive contribution using credit-debit mechanism Reputation Computation Agent (RCA) periodically collects reputationsReputation Computation Agent (RCA) periodically collects reputations Decentralized approachesDecentralized approaches NICENICE Reputation is in form of cookies which express peer’s satisfaction about the transactionsReputation is in form of cookies which express peer’s satisfaction about the transactions If no cookie is found information is requested fromIf no cookie is found information is requested from P2PRepP2PRep Reputation of the peer is based on other peer’s opinionReputation of the peer is based on other peer’s opinion Request peer’s opinion on one’s reputation through polling protocolRequest peer’s opinion on one’s reputation through polling protocol OthersOthers Daswani and Garcia-Molina ’ s schema for allocating resources fairlyDaswani and Garcia-Molina ’ s schema for allocating resources fairly Traffic management based on load-balancing policiesTraffic management based on load-balancing policies DoS attacks onlyDoS attacks only

Factors to be considered in reputation-based approach Extensive traffic in Gnutella-like P2P networkExtensive traffic in Gnutella-like P2P network StorageStorage centralcentral locallocal Cooperation of other peersCooperation of other peers System overheadSystem overhead

Proposed approach Reputation calculation is based the monitored activity of the connected peersReputation calculation is based the monitored activity of the connected peers assessing the reputation of the peers before accepting traffic from other peersassessing the reputation of the peers before accepting traffic from other peers if traffic is accepted update reputation of peers involvedif traffic is accepted update reputation of peers involved Decentralized - reputations are stored and managed locallyDecentralized - reputations are stored and managed locally

Contribution of our approach Fully decentralized modelFully decentralized model Requires no cooperation for reputation computationRequires no cooperation for reputation computation On demand calculationsOn demand calculations Lightweight – little system overheadLightweight – little system overhead

Reputation calculation Peer’s reputation indicates its contribution to the functioning of the P2P networkPeer’s reputation indicates its contribution to the functioning of the P2P network Four factors determining reputation:Four factors determining reputation: Resource searchResource search Resource uploadResource upload Resource downloadResource download Traffic extensivenessTraffic extensiveness Factors = actionsFactors = actions Bad actionsBad actions Good actionsGood actions

Resource search willingness of a peer to forward trafficwillingness of a peer to forward traffic employ “ trailer ” as an addition to Query message each peer that forwards the query adds its ID to the “ trailer ”each peer that forwards the query adds its ID to the “ trailer ” when peer forms QueryHit, it transfers a “ trailer ” from Query to QueryHitwhen peer forms QueryHit, it transfers a “ trailer ” from Query to QueryHit peer originated a query receives QueryHit with “ trailer ” and updates reputationspeer originated a query receives QueryHit with “ trailer ” and updates reputations

Resource upload Indicates another peer ’ s interest in the shared resourceIndicates another peer ’ s interest in the shared resource Completely uploaded file is a successful upload or good actionCompletely uploaded file is a successful upload or good action

Resource download reflects the quality of the downloaded informationreflects the quality of the downloaded information User decides if download was successfulUser decides if download was successful

Traffic extensiveness help to evaluate the traffic load coming from all connected peershelp to evaluate the traffic load coming from all connected peers based on the average loadbased on the average load load is extensive if it exceeds the average amount by a user pre-defined thresholdload is extensive if it exceeds the average amount by a user pre-defined threshold n L cK > ∑ l j /n * t j=1 L cK - current load from peer k t - threshold n - number of connected peers l j - number of bytes sent by peer j

Reputation calculation Reputation value (trust score) is a percent of bad actions happened during a period of timeReputation value (trust score) is a percent of bad actions happened during a period of time R i = BA i / TA i R i - trust score of peer i TA i - total number of considered actions for this peer i BA i - number of bad actions for this peer i

Trust thresholds indicate peer ’ s trust policyindicate peer ’ s trust policy percent of bad actions acceptable by the peerpercent of bad actions acceptable by the peer Trust Threshold MeaningDescription Greater than x 1 Distrust Peer is completely untrustworthy. Between x 1 and x 2 Average Peer is trustworthy. Less than x 2 Full trust Peer has a complete trust.

The correspondence between trust thresholds and trust score Example: trust score falls in range of “ average ”trust score falls in range of “ average ” -> x 1 – (R i – x 2 ) Computations: 30-(13-4) = 21 21% of peer ’ s traffic is accepted within period k. Given : R i =13 x 1 =30 x 2 =4 R i => x 1 x 1 > R i > x 2 R i =< x 2 No traffic is accepted x 1 –(R i –x 2 ) percent of the traffic from peer i is accepted for a period of time k. All traffic is accepted

Experiments: system design P2P client … Security Manager Reputation Manager Reputation repository Internet Connection Engine implementation were based on Phex version , a java-based Gnutella client

Experimental setup Network : 3 P2P clients set up as UltrapeersNetwork : 3 P2P clients set up as Ultrapeers peer capacity - 20 queries per time period kpeer capacity - 20 queries per time period k k=5 seck=5 sec Extensive traffic threshold t=1.7Extensive traffic threshold t=1.7 Trust thresholdsTrust thresholds x 1 =20x 1 =20 x 2 =5x 2 =5 Initial reputation values for peers were set up manuallyInitial reputation values for peers were set up manually

Scenario 1 Decrease of full reputation when peer P1 starts “ acting ” maliciouslyDecrease of full reputation when peer P1 starts “ acting ” maliciously

Scenario 2 Reputation gain when peer starts “ acting ” properlyReputation gain when peer starts “ acting ” properly

Conclusion We have proposed reputation-based trust management model for P2P networksWe have proposed reputation-based trust management model for P2P networks approach is decentralizedapproach is decentralized requires no peers ’ cooperationrequires no peers ’ cooperation employs only on-demand calculationsemploys only on-demand calculations

Future work Enhancement of the model throughEnhancement of the model through user profiling techniquesuser profiling techniques anomaly detectionanomaly detection