CPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University

Size: px
Start display at page:

Download "CPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University"

Transcription

1 CPSC 426/526 Reputation Systems Ennan Zhai Computer Science Department Yale University

2 Recall: Lec-4 P2P search models: - How Chord works - Provable guarantees in Chord - Other DHTs, e.g., CAN and Pastry - Comparison between structured and unstructured P2P models red P2P network (Gnutella, KaZaA, etc.)tructured P2P network (Chord, CAN, Pastry, etc.) - More (Hybrid P2P, BitTorrent, etc.)

3 Lecture Roadmap Background Reputation Systems Case Study: Credence

4 Background foo A

5 Background NO Name Ava/Source 1 Foo1 70/78 2 foo1 60/66 foo A 3 foo 11/40 4 Foo-4 2/

6 Background NO Name Ava/Source Polluted { 1 Foo1 70/78 2 foo1 60/66 3 foo 11/40 4 Foo-4 2/

7 Pollution Attacks There are many ways to pollute files: - Corrupting the majority content of the files - Corrupting the block downloading at 99%

8 Pollution Attacks There are many ways to pollute files: - Corrupting the majority content of the files - Corrupting the block downloading at 99% I spent 3 hours on downloading this file, but this file is not what I want...

9 Pollution Attacks There are many ways to pollute files: - Corrupting the majority content of the files - Corrupting the block downloading at 99%

10 100,000 polluted files Background NO Name Ava/Source 100 files foo A 1 Foo1 70/78 2 foo1 60/66 3 foo 11/40 4 Foo-4 2/

11 100 files 100,000 polluted files foo Background NO Name Ava/Source 1 Foo1 70/78 It is high possible for customers to 2 foo1 60/66 search bad files! 3 foo 11/40 A 4 Foo-4 2/

12 Background Why there are so many pollution attacks: - Publishers (e.g., music companies) want copyright - Employ many programmers to launch these attacks red P2P network (Gnutella, KaZaA, etc.) The majority of content is polluted: - The service quality of P2P content sharing became low - Users gave up P2P content sharing systemsp2p network (Chord, CAN, Pastry, etc.) - More (Hybrid P2P, BitTorrent, etc.)

13 Lecture Roadmap Background Reputation Systems Case Study: Credence

14 Reputation Systems

15 Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems

16 Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems

17 How a reputation system works? Messages Author (Score) Votes

18 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0)

19 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0)

20 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0)

21 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) Bob Eve Dave

22 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) Bob Eve Dave

23 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) Like: Bob Eve Dave

24 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: Vi=1+1+1=3 Bob Eve Dave

25 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3)

26 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (1)

27 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (1) Alice Dave

28 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (1) Dislike: Alice Dave

29 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (-1) Dislike: Vi=1-1-1=-1 Alice Dave

30 Examples

31 Global Reputation System Every entity has only one reputation score red P2P network (Gnutella, KaZaA, etc.) PageRank is a global peer-based trust model - Who plays the peer role in this context? - What are the historical activities of peers in this context?

32 PageRank [WWW 98] A B C

33 PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

34 PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

35 PageRank [WWW 98] B A C The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) # of outgoing links PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

36 PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

37 PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

38 PageRank [WWW 98] A A B C B C What are PageRanks? What s the problem in this example?

39 Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems

40 Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems

41 Personalized Reputation Model We focus on personalized reputation model Used in P2P content sharing systems Three different types: - Peer-based reputation systems, e.g., EigenTrust [WWW 03] - Object-based reputation systems, e.g., Credence [NSDI 06] - Hybrid reputation systems, e.g., Scrubber [P2P 07] Request Decentralized file-sharing system Alice

42 EigenTrust [WWW 03] EigenTrsut is the first peer-based reputation system: - Similar to PageRank - Each peer is assigned a personalized reputation score - Assumption: Good peer does not publish polluted files Problems: - Relying on recommenders - Cannot offer fine-grained reputation to each object - Difficult to decide parameters in practice

43 Lecture Roadmap Background Reputation Systems Case Study: Credence

44 Credence [NSDI 06] Credence is the first object-based reputation system: - In Alice s view, each object is assigned a reputation score - Defending against malicious recommenders - Fine-grained reputation for each object

45 Credence [NSDI 06] Files Providers Voters F10 P2, P6 P4 (+1), P6 (-1) F22 P2, P6, P8 P2 (-1), P7 (-1) F4 P2, P4 P2(+1), P4(-1), P7(-1) Alice F6 P11, P13, P14 P11(+1)

46 Computing each file s reputation Files Providers Voters F10 P2, P6 P4 (+1), P6 (-1) F22 P2, P6, P8 P2 (-1), P7 (-1) F4 P2, P4 P2(+1), P4(-1), P7(-1) Alice F6 P11, P13, P14 P11(+1)

47 A file s reputation For Alice, the reputation score of each object is computed by weighted average of voters similarities. n Rep(F) = V i θ( Alice,Voter_i ) i=1 n θ( Alice,Voter_i ) i=1 [ -1, 1 ]

48 A file s reputation For Alice, the reputation score of each object is computed by weighted average of voters similarities. n The vote cast by voter i on F (+1 or -1) Rep(F) = V i θ( Alice,Voter_i ) i=1 n θ( Alice,Voter_i ) i=1 [ -1, 1 ]

49 A file s reputation For Alice, the reputation score of each object is computed by weighted average of voters similarities. n The vote cast by voter i on F (+1 or -1) Rep(F) = V i θ( Alice,Voter_i ) i=1 n θ( Alice,Voter_i ) i=1 [ -1, 1 ] The similarity between Alice and voter i The range is [-1, +1].

50 How to compute similarity Sim = (p-ab) a(1-a)b(1-b) For the overlapping voting set (e.g., S) between Alice and C i : - a is # of positive votes cased by Alice on the files in S divided by # of all the votes casted by Alice on the files in S - b is # of positive votes casted by C i on the files in S divided by # of all the votes casted by C i on the files in S - p is # of positive votes casted by both Alice and C i on the files in S divided by # of all the votes agreed by both Alice and C i on the files in S

51 How to compute similarity Sim = (p-ab) a(1-a)b(1-b) Simplify it! Sim(A, B) = # of the same votes on S S where S is the set consisting of overlapping files voted by both A and B

52 Example B: +1 C: -1 D: +1 File1 A: +1 B: +1 C: -1 File2 A: -1 B: -1 File3 A: -1 C: +1 D: -1 File4 A C: +1 D: -1 File5 A: +1 D: -1 File6 C: +1 G: -1 File7

53 Practical Issues There are several practical issues in Credence: - Cold start - Lack of enough overlapping voting history

54 Solution: Flow-based Reputation I want to compute similarity with C, but I do not have direct similarity with C A C B

55 Solution: Flow-based Reputation I want to compute similarity with C, but I do not have direct similarity with C 0.8 * 0.9 = 0.72 A C B

56 Credence [NSDI 06] Files Providers Voters F10 P2, P6 P2, P4, P6 F22 P2, P6, P8 P2, P7 F4 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P

57 Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22 P2, P6, P8 P2, P7 F4 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P

58 Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P

59 Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4=0.9 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P

60 Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4=0.9 P2, P4 P2, P4, P7 Alice F6=0.6 P11, P13, P14 P

61 Credence [NSDI 06] Pick the highest reputation file Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4=0.9 P2, P4 P2, P4, P7 Alice F6=0.6 P11, P13, P14 P

62 Discussion: Does it work? Credence works under assumptions: - Malicious nodes publish many polluted files - Malicious users cast misleading votes - # of malicious users should not be higher than 1/2, say 20% - There is no large-scale sybil attack in the setting

63 Next Lecture In the lec-6, I will cover: - What is sybil attack - How to defend against sybil attacks - Case studies: SybilGuard and DSybil

Recommendation/Reputation. Ennan Zhai

Recommendation/Reputation. Ennan Zhai Recommendation/Reputation Ennan Zhai ennan.zhai@yale.edu Lecture Outline Background Reputation System: EigenTrust & Credence Sybil-Resitance: DSybil Lecture Outline Background Reputation System: EigenTrust

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC / PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

Differential Privacy

Differential Privacy CPSC 426/526 Differential Privacy Ennan Zhai Computer Science Department Yale University Recall: Lec-11 In lec-11, we learned: - Cryptographic basics - Symmetric key cryptography - Public key cryptography

More information

Review Session. Ennan Zhai

Review Session. Ennan Zhai Review Session Ennan Zhai ennan.zhai@yale.edu Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search Today s Mission USENET & Gossip Firewall

More information

UseNet and Gossip Protocol

UseNet and Gossip Protocol CPSC 426/526 UseNet and Gossip Protocol Ennan Zhai Computer Science Department Yale University Recall: Lec-1 Understanding: - Distributed systems vs. decentralized systems - Why we need both? red P2P network

More information

Cryptographic Systems

Cryptographic Systems CPSC 426/526 Cryptographic Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-10 In lec-10, we learned: - Consistency models - Two-phase commit - Consensus - Paxos Lecture Roadmap

More information

DSybil: Optimal Sybil-Resistance for Recommendation Systems

DSybil: Optimal Sybil-Resistance for Recommendation Systems DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons and Feng Xiao School of Computing, National University of Singapore, Singapore.

More information

Securing The Reputation Management in WINNOWING P2P Scheme. Nawaf Almudhahka Matthew Locklear

Securing The Reputation Management in WINNOWING P2P Scheme. Nawaf Almudhahka Matthew Locklear Securing The Reputation Management in WINNOWING P2P Scheme Nawaf Almudhahka Matthew Locklear Agenda Overview Motivation Assumptions & Threat Model Approach Security Analysis of TVC Model Description Results

More information

Cumulative Reputation Systems for Peer-to-Peer Content Distribution

Cumulative Reputation Systems for Peer-to-Peer Content Distribution Cumulative Reputation Systems for Peer-to-Peer Content Distribution B. Mortazavi and G. Kesidis Pennsylvania State University also with Verizon Wireless CISS Princeton March 23, 2006 1 Outline P2P CDNs

More information

Reputation Management in P2P Systems

Reputation Management in P2P Systems Reputation Management in P2P Systems Pradipta Mitra Nov 18, 2003 1 We will look at... Overview of P2P Systems Problems in P2P Systems Reputation Management Limited Reputation Sharing Simulation Results

More information

Content Search. Unstructured P2P

Content Search. Unstructured P2P Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided

More information

hirep: Hierarchical Reputation Management for Peer-to-Peer Systems

hirep: Hierarchical Reputation Management for Peer-to-Peer Systems hirep: Hierarchical Reputation Management for Peer-to-Peer Systems Xiaomei Liu, Li Xiao Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824 {liuxiaom, lxiao}@cse.msu.edu

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 2 ARCHITECTURES

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 2 ARCHITECTURES DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 2 ARCHITECTURES Architectural Styles Important styles of architecture for distributed systems Layered

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Replications and Consensus

Replications and Consensus CPSC 426/526 Replications and Consensus Ennan Zhai Computer Science Department Yale University Recall: Lec-8 and 9 In the lec-8 and 9, we learned: - Cloud storage and data processing - File system: Google

More information

Distributed Data-Intensive Systems

Distributed Data-Intensive Systems Distributed Data-Intensive Systems CSCE 438 Texas A&M University Department of Computer Science and Engineering Instructor: Prof. James Caverlee Peer-to-Peer Systems February 6, 214 EigenTrust The EigenTrust

More information

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

Cryptography. Lecture 03

Cryptography. Lecture 03 Cryptography Lecture 03 Recap Consider the following Encryption Schemes: 1. Shift Cipher: Crackable. Keyspace has only 26 elements. 2. Affine Cipher: Crackable. Keyspace has only 312 elements. 3. Vig Cipher:

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Sybil defenses via social networks

Sybil defenses via social networks Sybil defenses via social networks Abhishek University of Oslo, Norway 19/04/2012 1 / 24 Sybil identities Single user pretends many fake/sybil identities i.e., creating multiple accounts observed in real-world

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 4

CPSC 536N: Randomized Algorithms Term 2. Lecture 4 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 4 University of British Columbia In today s lecture we will see two applications of negative binomially distributed random variables.

More information

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 14.1.2013 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Aiding the Detection of Fake Accounts in Large Scale Social Online Services

Aiding the Detection of Fake Accounts in Large Scale Social Online Services Aiding the Detection of Fake Accounts in Large Scale Social Online Services Qiang Cao Duke University Michael Sirivianos Xiaowei Yang Tiago Pregueiro Cyprus Univ. of Technology Duke University Tuenti,

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

SOFIA: Social Filtering for Niche Markets

SOFIA: Social Filtering for Niche Markets Social Filtering for Niche Markets Matteo Dell'Amico Licia Capra University College London UCL MobiSys Seminar 9 October 2007 : Social Filtering for Niche Markets Outline 1 Social Filtering Competence:

More information

Content Search. Unstructured P2P. Jukka K. Nurminen

Content Search. Unstructured P2P. Jukka K. Nurminen Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd

More information

Chapter 2 ARCHITECTURES

Chapter 2 ARCHITECTURES DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 2 ARCHITECTURES Plan Software architecture Architectural styles System architectures Centralized

More information

Defining Encryption. Lecture 2. Simulation & Indistinguishability

Defining Encryption. Lecture 2. Simulation & Indistinguishability Defining Encryption Lecture 2 Simulation & Indistinguishability Roadmap First, Symmetric Key Encryption Defining the problem We ll do it elaborately, so that it will be easy to see different levels of

More information

Collusion Detection in Reputation Systems for Peer-to-Peer Networks

Collusion Detection in Reputation Systems for Peer-to-Peer Networks Collusion Detection in Reputation Systems for Peer-to-Peer Networks Ze Li, Haiying Shen and Karan Sapra Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 263 Email: {zel,

More information

A reputation system for BitTorrent peer-to-peer filesharing

A reputation system for BitTorrent peer-to-peer filesharing University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2006 A reputation system for BitTorrent peer-to-peer filesharing

More information

Today. Architectural Styles

Today. Architectural Styles Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Overview. Background: Sybil Attack. Background: Defending Against Sybil Attack. Social Networks. Multiplayer Games. Class Feedback Discussion

Overview. Background: Sybil Attack. Background: Defending Against Sybil Attack. Social Networks. Multiplayer Games. Class Feedback Discussion Overview Social Networks Multiplayer Games Class Feedback Discussion L-27 Social Networks and Other Stuff 2 Background: Sybil Attack Sybil attack: Single user pretends many fake/sybil identities Creating

More information

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Page 1. How Did it Start? Model Main Challenge CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth

More information

CSCI-1680 P2P Rodrigo Fonseca

CSCI-1680 P2P Rodrigo Fonseca CSCI-1680 P2P Rodrigo Fonseca Based partly on lecture notes by Ion Stoica, Sco5 Shenker, Joe Hellerstein Today Overlay networks and Peer-to-Peer Motivation Suppose you want to write a routing protocol

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

SybilGuard: Defending Against Sybil Attacks via Social Networks

SybilGuard: Defending Against Sybil Attacks via Social Networks Expanded Technical Report. The original version appears In Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006), Pisa, Italy, September 2006 SybilGuard: Defending Against

More information

P2PNS: A Secure Distributed Name Service for P2PSIP

P2PNS: A Secure Distributed Name Service for P2PSIP P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS

More information

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yang, Yafei Dai Abstract With the popularity of voting systems in cyberspace,

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 12.1.2015 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yang, Yafei Dai Abstract With the popularity of voting systems in cyberspace,

More information

Security protocols and their verification. Mark Ryan University of Birmingham

Security protocols and their verification. Mark Ryan University of Birmingham Security protocols and their verification Mark Ryan University of Birmingham Contents 1. Authentication protocols (this lecture) 2. Electronic voting protocols 3. Fair exchange protocols 4. Digital cash

More information

ICT 6544 Distributed Systems Lecture 2: ARCHITECTURES

ICT 6544 Distributed Systems Lecture 2: ARCHITECTURES ICT 6544 Distributed Systems Lecture 2: ARCHITECTURES Hossen Asiful Mustafa 1 Introduction Distributed systems are often complex pieces of software of which the components are by definition dispersed across

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

Reading Time: A Method for Improving the Ranking Scores of Web Pages

Reading Time: A Method for Improving the Ranking Scores of Web Pages Reading Time: A Method for Improving the Ranking Scores of Web Pages Shweta Agarwal Asst. Prof., CS&IT Deptt. MIT, Moradabad, U.P. India Bharat Bhushan Agarwal Asst. Prof., CS&IT Deptt. IFTM, Moradabad,

More information

Peer-to-Peer (P2P) networks have emerged as a popular

Peer-to-Peer (P2P) networks have emerged as a popular , July 3-5, 213, London, U.K. On Combating Content Poisoning in Peer-to-Peer Networks Mohammed Hawa, Member, IAENG, Raed Al-Zubi, Khalid A. Darabkh, and Ghazi Al-Sukkar Abstract Poisoning attacks on Peer-to-Peer

More information

Today. Architectural Styles

Today. Architectural Styles Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed

More information

arxiv: v1 [cs.cr] 30 May 2014

arxiv: v1 [cs.cr] 30 May 2014 ROMEO: ReputatiOn Model Enhancing OpenID Simulator Ginés Dólera Tormo 1, Félix Gómez Mármol 1, and Gregorio Martínez Pérez 2 arxiv:1405.7831v1 [cs.cr] 30 May 2014 1 NEC Europe Ltd., Kurfürsten-Anlage 36,

More information

Peer-to-Peer Systems and Security

Peer-to-Peer Systems and Security Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universität München April 13, 2013 Salsa & AP3 Goal: eliminate trusted blender server Idea: Use DHT (AP3: Pastry, Salsa: custom

More information

SybilGuard: Defending Against Sybil Attacks via Social Networks

SybilGuard: Defending Against Sybil Attacks via Social Networks SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu Michael Kaminsky Phillip B. Gibbons Abraham Flaxman Intel Research Pittsburgh Carnegie Mellon University {haifeng.yu,michael.e.kaminsky,phillip.b.gibbons}@intel.com

More information

Proving the Impossible with Alibi Protocols

Proving the Impossible with Alibi Protocols Proving the Impossible with Alibi Protocols Dave Levin Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee, Bo Han, John Douceur, Jacob Lorch, Thomas Moscibroda Uncooperative behavior Cooperation

More information

DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM

DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM Rehan Akbani, Turgay Korkmaz, and G. V. S. Raju {rakbani@cs.utsa.edu, korkmaz@cs.utsa.edu, and gvs.raju@utsa.edu} University of Texas

More information

Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks

Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks Niels Zeilemaker #1, Zekeriya Erkin 2, Paolo Palmieri #3, Johan Pouwelse #4 # Parallel and Distributed Systems Group, Delft University

More information

Net Trust: User-Centered Detection of Pharming, Phishing and Fraud. L Jean Camp

Net Trust: User-Centered Detection of Pharming, Phishing and Fraud. L Jean Camp Net Trust: User-Centered Detection of Pharming, Phishing and Fraud L Jean Camp www.ljean.com Core Problem Statement How to inform individual assessments of trustworthiness of a potential online transaction.

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Michael J. Fischer Lecture 4 September 11, 2017 CPSC 467, Lecture 4 1/23 Analyzing Confidentiality of Cryptosystems Secret ballot elections Information protection Adversaries

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks 2008 IEEE Symposium on Security and Privacy SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks Haifeng Yu National University of Singapore haifeng@comp.nus.edu.sg Michael Kaminsky

More information

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao

More information

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically

More information

Discrete Mathematics and Probability Theory Fall 2013 Midterm #2

Discrete Mathematics and Probability Theory Fall 2013 Midterm #2 CS 70 Discrete Mathematics and Probability Theory Fall 013 Midterm # 1. (30 points) Short Answer. No justification necessary. Please write only the answer in the space provided after each question. Please

More information

Making P2P Downloading Dependable by Exploiting Social Networks

Making P2P Downloading Dependable by Exploiting Social Networks Making P2P Downloading Dependable by Exploiting Social Networks Yingwu Zhu Department of CSSE, Seattle University Seattle, WA 98122, USA Email: zhuy@seattleu.edu Abstract P2P file sharing networks are

More information

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway? HOW WORKS And Who Needs a Content Distribution Network Anyway? Efficient and Inefficient Networks If all networks were fast, efficient, and never suffered from congestion there wouldn t be any need for

More information

Lecture 3. Introduction to Cryptocurrencies

Lecture 3. Introduction to Cryptocurrencies Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must

More information

Lecture 7 - Applied Cryptography

Lecture 7 - Applied Cryptography CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 7 - Applied Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger

More information

Computer Security module

Computer Security module Computer Security module Revision notes Mark D. Ryan June 2010 There won't be a revision lecture for the Computer Security module. Instead, these notes are provided to help you prepare for the exam. Revision

More information

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS R. K. Prasad and Vipin Sharma 1 Department of Mechanical Engineering ABSTRACT: P A College of Engineering Nadupadavu, Mangalore, India In this implemented

More information

DDoS Vulnerability of BitTorrent Peer Exchange Extension: Analysis and Defense

DDoS Vulnerability of BitTorrent Peer Exchange Extension: Analysis and Defense IEEE ICC 2012 - Communication and Information Systems Security Symposium DDoS Vulnerability of BitTorrent Peer Exchange Extension: Analysis and Defense Majing Su 1, Hongli Zhang 1, Bingxing Fang 1, Xiaojiang

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

Latest Peer-to-Peer Technologies II Artjom Lind 1

Latest Peer-to-Peer Technologies II Artjom Lind 1 Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

- Content Security in P2P

- Content Security in P2P Why Jenny can t share the content with Jane? - Content Security in P2P Heather Yu Huawei Technologies heathery@ieee.org Future of Networked Home A vision voice video text Data gaming IPTV streaming IM

More information

Link Analysis and Web Search

Link Analysis and Web Search Link Analysis and Web Search Moreno Marzolla Dip. di Informatica Scienza e Ingegneria (DISI) Università di Bologna http://www.moreno.marzolla.name/ based on material by prof. Bing Liu http://www.cs.uic.edu/~liub/webminingbook.html

More information

SYBIL attacks [1] refer to individual malicious users creating

SYBIL attacks [1] refer to individual malicious users creating IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 885 SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks Haifeng Yu, Phillip B. Gibbons, Member, IEEE, Michael Kaminsky,

More information

EE 122: Peer-to-Peer Networks

EE 122: Peer-to-Peer Networks EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer

More information

In Search of Homo Swappus : Evolution of Cooperation in Peer-to-Peer Systems

In Search of Homo Swappus : Evolution of Cooperation in Peer-to-Peer Systems In Search of Homo Swappus : Evolution of Cooperation in Peer-to-Peer Systems John Chuang School of Information Management and Systems University of California at Berkeley chuang@sims.berkeley.edu http://p2pecon.berkeley.edu/

More information

COMP6237 Data Mining Making Recommendations. Jonathon Hare

COMP6237 Data Mining Making Recommendations. Jonathon Hare COMP6237 Data Mining Making Recommendations Jonathon Hare jsh2@ecs.soton.ac.uk Introduction Recommender systems 101 Taxonomy of recommender systems Collaborative Filtering Collecting user preferences as

More information

Sybil-Resilient Online Content Rating

Sybil-Resilient Online Content Rating Sybil-Resilient Online Content Rating Dinh Nguyen Tran, Bonan Min, Jinyang Li, Lakshminarayanan Subramanian Courant Institute of Mathematical Sciences New York University Email:{trandinh,bonan,jinyang,lakshmi}@cs.nyu.edu

More information

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key

More information

Failures in Distributed Systems

Failures in Distributed Systems CPSC 426/526 Failures in Distributed Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-14 In lec-14, we learned: - Difference between privacy and anonymity - Anonymous communications

More information

Reputation-Based Trust Management for P2P Networks

Reputation-Based Trust Management for P2P Networks Reputation-Based Trust Management for P2P Networks Ali Aydın Selçuk Ersin Uzun Mark Reşat Pariente Department of Computer Engineering Bilkent University Ankara, 68, Turkey selcuk@cs.bilkent.edu.tr, {euzun,resat}@ug.bilkent.edu.tr

More information

Lightweight Signatures for (A Defense Against Phishing)

Lightweight Signatures for  (A Defense Against Phishing) Lightweight Signatures for Email (A Defense Against Phishing) Ben Adida ben@mit.edu Cryptography and Information Security Group CSAIL, MIT 6.857 - December 7th, 2005 (joint with David Chau, Susan Hohenberger

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large

More information

An Offline Foundation for Accountable Pseudonyms

An Offline Foundation for Accountable Pseudonyms An Offline Foundation for Accountable Pseudonyms Bryan Ford MIT CSAIL Jacob Strauss SocialNets April 1, 2008 Introduction Anonymity is a cherished principle Traditional: voting, peer review Online: email,

More information

Distributed Information Processing

Distributed Information Processing Distributed Information Processing 14 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2016 Eom, Hyeonsang All Rights Reserved Outline

More information

Study Guide for the Final Exam

Study Guide for the Final Exam YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #22 Professor M. J. Fischer April 30, 2005 1 Exam Coverage Study Guide for the Final Exam The final

More information

Brief (non-technical) history

Brief (non-technical) history Web Data Management Part 2 Advanced Topics in Database Management (INFSCI 2711) Textbooks: Database System Concepts - 2010 Introduction to Information Retrieval - 2008 Vladimir Zadorozhny, DINS, SCI, University

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

IJITKM Special Issue (ICFTEM-2014) May 2014 pp (ISSN )

IJITKM Special Issue (ICFTEM-2014) May 2014 pp (ISSN ) Security Enhancement Technique In Peer to Peer Network: A Review Varun Chanana 1, Sandeep Kumar 2, Ravikat Jaiswal 3 1,2,3 Department of CSE,Ganpati Institute of Technology and Management,Bilaspur,Yamunanagar

More information

Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme

Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme Anurag Garg, Roberto Battiti, and Gianni Costanzi Dipartimento di Informatica e Telecomunicazioni, Università

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information