The EigenTrust Algorithm for Reputation Management in P2P Networks

Slides:



Advertisements
Similar presentations
A P RESENTATION O N R ESOURCE D ISCOVERY I N T HE P EER- T O- P EER N ETWORK by Aravind Renganathan.
Advertisements

A Robust and Efficient Reputation System for Active Peer-to-Peer Systems Dominik Grolimund, Luzius Meisser, Stefan Schmid, Roger Wattenhofer Computer Engineering.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
On the Economics of P2P Systems Speaker Coby Fernandess.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
UCDavis, ecs251 Fall /29/2007Trust and Reputation System1 S. Felix Wu University of California, Davis
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Computing Trust in Social Networks
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 The Sybil Attack John R. Douceur Microsoft Research Presented for Cs294-4 by Benjamin Poon.
Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang.
Gossip-Based Aggregation of Trust in Decentralized Reputation Systems Ariel D. Procaccia, Yoram Bachrach, and Jeffrey S. Rosenschein.
A Local Facility Location Algorithm Supervisor: Assaf Schuster Denis Krivitski Technion – Israel Institute of Technology.
P-Grid Presentation by Thierry Lopez P-Grid: A Self-organizing Structured P2P System Karl Aberer, Philippe Cudré-Mauroux, Anwitaman Datta, Zoran Despotovic,
Stacey Greenaway Managing Reputation and Trust in Peer-to-Peer Networks. CP4022 Research Topics in Networks and Distributed Systems. Assessment 2 Stacey.
Trust Course CS Grid and Peer-to-Peer Computing Gerardo Padilla.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
1 GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks Runfang Zhou, Kai Hwang, and Min Cai University of Southern California IEEE Transaction.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Trustworthiness Management in the Social Internet of Things
The EigenTrust Algorithm for Reputation Management in P2P Networks
Ivan Osipkov Fighting Freeloaders in Decentralized P2P File Sharing Systems.
Researchers: Preet Bola Mike Earnest Kevin Varela-O’Hara Han Zou Advisor: Walter Rusin Data Storage Networks.
CS 478 – Tools for Machine Learning and Data Mining Backpropagation.
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
Practical Byzantine Fault Tolerance
Security Mechanisms for Distributed Computing Systems A9ID1007, Xu Ling Kobayashi Laboratory GSIS, TOHOKU UNIVERSITY 2011/12/15 1.
1 Maze A Hybrid P2P file sharing system Design by Networking and distributed System lab at Peking University Presenter:Elaine.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
Peer to Peer Network Design Discovery and Routing algorithms
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
Trusted P2P Transactions with Fuzzy Reputation Aggregation Authors: S. song, K. Hwang, and R. Zhou University of Southern California Yu-Kwong Kwok University.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
Paper Study – Propagation of Trust in E-commerce Communities, and others YuanDa Cao (曹元大), etc. Beijing Institute of Technology Presented by Vincent Dec/2004.
Example Apply hierarchical clustering with d min to below data where c=3. Nearest neighbor clustering d min d max will form elongated clusters!
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems 7 th.IEEE International Conference on Peer-to-Peer Computing Cristiano Costa,
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation Presented by Dr. Ying Lu.
Presented by Edith Ngai MPhil Term 3 Presentation
Talal H. Noor, Quan Z. Sheng, Lina Yao,
School of Computing Clemson University Fall, 2012
Fall 2004 Backpropagation CS478 - Machine Learning.
Trustworthiness Management in the Social Internet of Things
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Deterministic and Semantically Organized Network Topology
Securing The Reputation Management
Data Mining CSCI 307, Spring 2019 Lecture 24
Presentation transcript:

The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina Presenter: Jianming Zhou

Problem Problem in P2P: Objective: Basic Idea Inauthentic files distributed by malicious nodes Objective: Identify the source of inauthentic files and bias against downloading from them Basic Idea Reputation System: Assign a trust value to each peer on its previous behaviors

Challenges Need an distributed reputation system Desired features Success like C/S reputation system (eg. eBay) Provide comprehensive evaluation of peer Lower overhead Desired features Self-policy, i.e., no central server Maintain anonymity Robust to malicious node and sybil attack Minimal overhead

EigenTrust -- Intro Basic idea Terminology Each peer has a Global Reputation given by the local trust values assigned by other peers Terminology Local trust value: cij The opinion peer i has of peer j, based on past exp. Each time peer i downloads an authentic/inauthentic file from peer j, cij increases/decreases. Global trust value: ti The trust that the entire system places in peer i

More about Local trust value Normalization Otherwise, malicious peers can assign arbitrarily high local trust value to other malicious peers All cij is non-negative ci1+ci2+ci3+…+cin = 1 Local Trust Vector: ci contains all local trust values cij that peer i has of other peers j

Other Approaches Foundation of EigenTrust Past Experience Reply on past experience Friend-friend reference Past Experience Each peer bias choice based on its vector ci Peer with good experience will likely be selected Problem: each peer has limited past experience, knowing few other peers Ask friend opinion of other peers Weight their opinion by your trust in them Problem: various number of friends for each peer What their opinion of peer k Ask friend j Weight your friend’s opinion by how much you trust them

EigenTrust Combine and enhance Comprehensive Comprehensive, i.e., knowing all peers Lower overhead in term of computation and storage Comprehensive Iterative friend-friend reference Ask your friend: Ask their friend: Ask until all nodes: N large, converge to same vector for every peer i Peers can cooperate to compute and store t

Basic Algorithm:non-distributed Initialize Repeat until converge

Distributed algorithm 1 Each peer store its local trust vector Each peer store its own global trust value Each peer compute its own ti The component-wise version of is the distribution over pre-trusted peers Anti- malicious collectives and guarantee converge

Distributed algorithm 2 For each peer i { -First, ask peers who know you for their opinions of you. -Repeat until convergence { -Compute current trust value: ti (k+1) = c1i t1(k) +…+ cni tn(k) -Send your opinion cij and trust value ti(k) to your acquaintances. -Wait for the peers who know you to send you their trust values and opinions. }

Secure EigenTrust Peer should not hold its own t Problem: malicious node can report false value Solution: different peer compute t for one peer Leverage DHT T should not be computed by only one peer Problem: malicious node can collude Solution: multiple score managers + majority rule Score manager: peer i is j’s score manager if i computes its global trust value

Usage of global trust value Isolating malicious nodes bias the download from more reputable nodes Potential problem: highly trusted node overloaded Incenting freeriders to share Hinder the spread of inauthentic files

Performance Setup Node selection in trust system Deterministic algorithm => overload Probabilistic algorithm => balanced

Performance Thread Model A:Individual Malicious Peers B:Malicious Collectives C:Malicious Collectives with Camoflouge D:Malicious Spies

Thread model A:

Thread model: B

Thread model: C

Thread model: D

Conclusion EigenTrust Dramatically reduces number of inauthentic files on the network. Robust to malicious peers. Low overhead

Q&A