Download presentation
Presentation is loading. Please wait.
Published byLucy Powers Modified over 8 years ago
1
Reputation Based Trust The using of reputation to accomplish trust between users on the Internet M.Vološin, R.Gore, Ibe2roč. PF UPJŠ, Košice, Slovakia
2
Contents What is Reputation Based Trust What is Reputation Based Trust Various systems for Reputation Based Trust on Internet Various systems for Reputation Based Trust on Internet –Human driven environments Auctions systems Auctions systems –Ebay –Amazon Auctions –Yahoo Auctions (retired from June 2007) “Expert Sites” like www.Allexperts.com “Expert Sites” like www.Allexperts.comwww.Allexperts.com Reviews sites like www.Epinions.com Reviews sites like www.Epinions.comwww.Epinions.com Other … Other … –Automated environments P2P networks P2P networks Computing markets and grids Computing markets and grids (One such system we describe here in detail) (One such system we describe here in detail)
3
What is Reputation Based Trust? Anonymity on the Internet Anonymity on the Internet Viruses Viruses Why we trust our friends Why we trust our friends Name + recorded past activities Name + recorded past activities available and visible for everybody available and visible for everybody = Reputation Based Trust = Reputation Based Trust
4
Ebay How to sell goods somebody from Australia? How to make it secure? How to sell goods somebody from Australia? How to make it secure? Feedback forum on Ebay Feedback forum on Ebay Ebay is Auction system Ebay is Auction system Bussiness on Ebay Bussiness on Ebay
8
Reputation Based Trust in Automated Environments P2P networks P2P networks Distributed computation markets Distributed computation markets
9
Distributed Computation Markets The Servers provides service – complicated time- consuming computations And the Clients pay for this. The Servers provides service – complicated time- consuming computations And the Clients pay for this. How to trust a server that it has least-costly, fastest service, how it advertised? How to trust a server that it has least-costly, fastest service, how it advertised? How to ensure that Server performed all work and didn't give fake results? How to ensure that Server performed all work and didn't give fake results? Solution: Proof by computation ”ringers” and “threshold witnessing” mechanism Solution: Proof by computation ”ringers” and “threshold witnessing” mechanism
10
Step 1 – Witness selection Step 1 – Witness selection Step 2 – B sends service request Step 2 – B sends service request Step 3 – Server selection process Step 3 – Server selection process Step 4 – Executing of computation Step 4 – Executing of computation Step 5 – Returning the execution proofs and computation result Step 5 – Returning the execution proofs and computation result Step 6 – Signing new rating by witnesses Step 6 – Signing new rating by witnesses
13
Building blocks Rating Store management Rating Store management –Every participant stores the most recent data for every other participant –Reputation value can be created or changed only if at least c+1 participants agree. Witness Selection Witness Selection –B select 2c+1 witnesses randomly –creates a multicast channel for the witnesses –sends the (signed) job description: f, the set of input values{x1...xa}, the maximum time B is willing to wait for job completion, the maximum amount B is willing to pay for the computation
14
Server Selection Server Selection –The 2c+1 witnesses selects the most suitable service provider (A) –A is added to the witness multicast group. –One of the witnesses multicasts the job description received from B. Threshold Witnessing Threshold Witnessing –Ringer Generation – Each witness (Wj) selects one random value xz from the input set specified by B in the job description and computes a ringer r j = H(f(xz)) Each witness (Wj) selects one random value xz from the input set specified by B in the job description and computes a ringer r j = H(f(xz)) Wj sends SWj(H(Id(Wj); sid; rj)), its identifier, sid, the ringer, together with the signed digest and Wj's public key certifcate to A Wj sends SWj(H(Id(Wj); sid; rj)), its identifier, sid, the ringer, together with the signed digest and Wj's public key certifcate to A A waits to receive 2c+1 valid messages A waits to receive 2c+1 valid messages A sends a multicast message to all the witnesses with concatenation of all the signed ringers received A sends a multicast message to all the witnesses with concatenation of all the signed ringers received The witnesse, inquire the remaining witnesses for their ringers. The witnesse, inquire the remaining witnesses for their ringers.
15
–Revealing the Ringers A performs the computation and reveals the input values x z hidden in the 2c+1 ringers A performs the computation and reveals the input values x z hidden in the 2c+1 ringers A creates a single message containing Swj (H(Id(Wj); sid; rj)) and SA(H(Id(A); sid; z)), for j = 1...2c+1. There also are the results of the computation, f(x1),...,f(xA), along with its signed digest. A creates a single message containing Swj (H(Id(Wj); sid; rj)) and SA(H(Id(A); sid; z)), for j = 1...2c+1. There also are the results of the computation, f(x1),...,f(xA), along with its signed digest. Each witness Wj verifies the correctness of only its own ringer Each witness Wj verifies the correctness of only its own ringer If any witness Wj discovers that rj <> H(f(xz)), Wj sends a multicast message to all the other witnesses revealing this fact If any witness Wj discovers that rj <> H(f(xz)), Wj sends a multicast message to all the other witnesses revealing this fact The witnesses are able to verify the claim by computing the correct answer to Wj's ringer and compare it with the answer sent back by Alice The witnesses are able to verify the claim by computing the correct answer to Wj's ringer and compare it with the answer sent back by Alice
16
–Signature Generation each witness Wj is able to compute A's new rating each witness Wj is able to compute A's new rating Each Wj then generates a verifiable signature share of A's new reputation Each Wj then generates a verifiable signature share of A's new reputation Wj sends this value, its certified verification key VKj and A's new rating in clear, to all the other witnesses, using the group's multicast channel Wj sends this value, its certified verification key VKj and A's new rating in clear, to all the other witnesses, using the group's multicast channel Each witness waits to receive c correct signature shares for the same new reputation of A as the one generated by itself. Each witness waits to receive c correct signature shares for the same new reputation of A as the one generated by itself. each witness is able to generate the signed new rating of A locally each witness is able to generate the signed new rating of A locally Reputation Distribution Reputation Distribution –The results of the computation are returned to B and the new reputation of A is distributed (by the first witness is in charge on the broadcast channel to all the participants in the system) –Note that a witness cannot simply send an incorrect reputation since it will be easily detected –Punishing Malicious Witnesses
19
Possible attacks? Bad-mouthing (incorrect negative feedback) Bad-mouthing (incorrect negative feedback) Ballot-stuffing (un-earned positive feedback) Ballot-stuffing (un-earned positive feedback) Lazy behavior Lazy behavior –Improvement: adding fake ringers Sybil Attacks Sybil Attacks Mobile Virus Attacks Mobile Virus Attacks
20
Conclusions With reputation based trust we can make Internet more secure and usable in more areas of our activities. Thank you.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.