Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing P2P Algorithms.
Advertisements

1 Distributed Deadlock Fall DS Deadlock Topics Prevention –Too expensive in time and network traffic in a distributed system Avoidance.
A P RESENTATION O N R ESOURCE D ISCOVERY I N T HE P EER- T O- P EER N ETWORK by Aravind Renganathan.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
Lapsy Garg. P2P Networks Gnutella Protocol Topological Scan Worms Passive Scan Worms Solutions.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
CSc 461/561 CSc 461/561 Peer-to-Peer Streaming. CSc 461/561 Summary (1) Service Models (2) P2P challenges (3) Service Discovery (4) P2P Streaming (5)
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Peer-to-Peer Computing
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
What Can Databases Do for Peer-to-Peer Steven Gribble, Alon Halevy, Zachary Ives, Maya Rodrig, Dan Suciu Presented by: Ryan Huebsch CS294-4 P2P Systems.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
P-Grid Presentation by Thierry Lopez P-Grid: A Self-organizing Structured P2P System Karl Aberer, Philippe Cudré-Mauroux, Anwitaman Datta, Zoran Despotovic,
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Stacey Greenaway Managing Reputation and Trust in Peer-to-Peer Networks. CP4022 Research Topics in Networks and Distributed Systems. Assessment 2 Stacey.
Trust Course CS Grid and Peer-to-Peer Computing Gerardo Padilla.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
© 2002, Magdalena Punceva, EPFL-IC, Laboratoire de systèmes d'informations répartis Self-Organized Construction of Distributed Access Structures: A Comparative.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
On the Security of Polling Protocols in Peer-to-Peer Systems Bartlomiej Sieka (U. Illinois-Chicago) Ajay D. Kshemkalyani (U. Illinois-Chicago) Mukesh Singhal.
Peer-to-peer systems (part I) Slides by Indranil Gupta (modified by N. Vaidya)
Measurements and Mitigation of Peer-to-peer Botnets: A Case Study on Storm Worm Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Proposal Pollution prevention in the P2P file sharing system Presenter: Elaine.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Topics in Distributed Databases Database System Implementation CSE 507 Some slides adapted from Navathe et. Al and Silberchatz et. Al.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Trustworthiness Management in the Social Internet of Things
Peer-to-peer networking
CHAPTER 3 Architectures for Distributed Systems
Providing Secure Storage on the Internet
Peer-to-Peer Reputations
draft-bryan-sipping-p2p
Presentation transcript:

Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003

Papers: Managing Trust in a P2P information system Karl Aberer, et, Switzerland, 2001 Choosing Reputable Servents in a P2P network A Reputation-Based Approach for Choosing Reliable Resources in P2P networks Fabrizio Cornelli, et. Italy, 2002 Cooperative Peer Groups in NICE Seungjoon Lee, et. UMD, 2003 And more …

Problems Definition Peer-to-Peer is a fully distributed system: With no central coordination No central database No global view of the system Peers are autonomous, and may be anonymous Peers are unreliable Transactions are performed between Peers How to make a transaction more likely to succeed (not cheated)? Choose the node which is more reliable

Trust Management And Reputation Trust Management: any mechanism that allows to establish mutual trust. Reputation: a measure that is derived from direct or indirect knowledge on earlier transactions. Reputation-based trust management: one specific form of Trust Management.

More for anonymity Reputations must be associated with self- appointed Identifiers rather than with externally obtained identities. Peers are not required to keep a stable identifier (along with its reputation), but: Good peers should benefit from a persistent ID Malicious peers should not get much advantage by changing their ID to avoid bad reputation

Basic Elements in a Trust Management System Global Trust Model: How to describe whether an agent is trustworthy? Binary or Real or Discrete? Local Algorithm to determine trust: Computational procedure to determine the trust (Or determine the unreliability of a agent) Data and Comm. Management: How to store and exchange the data which is necessary for the local algorithm? (Earlier transaction data)

Paper 1: Manage Trust in a P2P information system

Trust Model: Binary trust When a transaction fails, The honest peer will file a complaint about the cheater. The dishonest one can also file a complaint. The reputation of an agent p could be: T(p) = |{c(p,q)}| * |{c(q,p)}| (q is any peer) But it requires global knowledge.

Data Management P-Grid Peers organized as a virtual binary search tree (Scan and Chord can also perform this task) Basic idea: Given a node ID, one node can be located which is responsible to store some information about that node ID. (P-Grid mechanism) A complaint can be inserted at any node, but it will be routed to one responsible node. And complaints can be retrieved with the same way. So, this mechanism is fully distributed and it uses the underlying P-Grid to mange complaints

Local computation of Trust Complaints can be retrieved using the data management mechanism. But, the node (say, A) which provides the complaints can be malicious Because of the same problem, you can verify whether A is malicious Solution: Making r replicas If enough replicas say that p is trustworthy, it ’ s done. Otherwise, continue to retrieve more data. No clear decision is made, then give up.

Algorithm: W = {(cri(q), cfi(q), ai, fi)|i=1, … w} ai, … aw are witness of q Cri(q) is the number of complaints sent from q to ai cfi(q) is the number of complaints send from ai to q

Paper 2: Choosing Reputable Servents in a P2P network

Basic Idea: Designed for Gnutella Using a polling protocol to decide the reputation After get all queryhits, select some interesting results (nodes which have the query data), ask other peers to vote on those results. Binary vote (but still can be other type) Contact the node with highest reputation to retrieve the data

basic Polling Protocol:

Basic Polling Protocol: (Ctd..) Polling message: Poll(T, PKpoll): polling message PollReplay({(IP, port, Votes)}pkpool) Verify vote: TrueVote(Votesj) TrueVoteReplay(response) Challenge: Challenge(r) Response([r]sks, PKs)

Enhanced pooling protocol:

Enhanced Polling Protocol: Polling message: Poll(T, PKpoll): polling message PollReplay({[(IP, port, Votes, serv_id)]ski, pki)}pkpool) Basically the vote peer includes PK and its own IP/Port info So, the initiator can verify the voter Verify vote: AreYou(serv_id) AreYouReply(response) Challenge: the same

Data Structures Experience_repository: (serv_id, num_plus, num_minus) Vote: Different criteria Binary (1 or 0) vote 1 only when num_minus = 0 Credibility_repository (serv_id, num_agree, num_disagree) Used to check whether a node is malicious

Removing suspects from poll IP-address clustering is not good A lot of peers may use proxies from some ISP companies like AOL. Compute an aggregation (arithmetic mean) of votes from a cluster of votes, where weights are inversely related to cluster size Then, A random sample of voters are checked If some voters are not found, increase the sample size If no voters are found, abort the procedure

Security improvement Distribution of Tampered with Information David declares some files it doesn ’ t have and response with bad data Prevent by the bad reputation he will get Man in the Middle Attack: Public/private keys are used to prevent such attack Same for any communication

Paper 3: A reputation-based Approach for Choosing Reliable Resources in P2P networks

Basic Idea: Servents can have a reputation. Resources can also have a reputation. Quite similar to the previous paper Experience repositories: Resource repository (resource_id, value) (value is binary) Resource Id is the digest of the content Servent repository (serv_id, num_plus, num_minus)

XREP protocol: Binary vote Phase 1: Resource searching QueryHit includes both node and resource info Phase 2: Resource selection & vote polling Same with the previous paper Vote Evaluation Including check valid vote Challenging and download data

Combinaing servent/resource based reputation: Reputations ’ life cycle: New res from good nodes usually are good Impact on peers anonymity: Sev-based reputation prefers the ID to be persistent, while res- based doesn ’ t require that Cold-start: With res-based reputation, new nodes can participate in distribution of well known resources (for a good rep) Performance bottlenecks More serious in ser-based reputation Res-based reputation can help to resolve that Blacklisting: Connect the bad resources with the initiator

Security Issues: Attacks to P2P systems: Self-replication Answering requests with bad contents Man in the Middle Attacks to reputation-based systems Pseudospoofing: using different ID to send bad data Digesting can stop the propagation of bad content ID Stealth: ? Not very clear about that Shilling: One using several IDs (work as several malicious nodes) to cheat other nodes. This will be found with valid vote checking

Questions …

Paper 4: Cooperative Peer Groups in NICE

Basic Idea: After each transaction between A and B: A sends B a cookie stating the quality of the transaction B does the same thing to A For later transaction between A and C: A shows C the cookies that A has C does the same things

More … How/who to store those cookies? How to get cookies? Basic algorithm and refinement How to assign values to cookies?