CPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University
|
|
- Percival Hudson
- 6 years ago
- Views:
Transcription
1 CPSC 426/526 Reputation Systems Ennan Zhai Computer Science Department Yale University
2 Recall: Lec-4 P2P search models: - How Chord works - Provable guarantees in Chord - Other DHTs, e.g., CAN and Pastry - Comparison between structured and unstructured P2P models red P2P network (Gnutella, KaZaA, etc.)tructured P2P network (Chord, CAN, Pastry, etc.) - More (Hybrid P2P, BitTorrent, etc.)
3 Lecture Roadmap Background Reputation Systems Case Study: Credence
4 Background foo A
5 Background NO Name Ava/Source 1 Foo1 70/78 2 foo1 60/66 foo A 3 foo 11/40 4 Foo-4 2/
6 Background NO Name Ava/Source Polluted { 1 Foo1 70/78 2 foo1 60/66 3 foo 11/40 4 Foo-4 2/
7 Pollution Attacks There are many ways to pollute files: - Corrupting the majority content of the files - Corrupting the block downloading at 99%
8 Pollution Attacks There are many ways to pollute files: - Corrupting the majority content of the files - Corrupting the block downloading at 99% I spent 3 hours on downloading this file, but this file is not what I want...
9 Pollution Attacks There are many ways to pollute files: - Corrupting the majority content of the files - Corrupting the block downloading at 99%
10 100,000 polluted files Background NO Name Ava/Source 100 files foo A 1 Foo1 70/78 2 foo1 60/66 3 foo 11/40 4 Foo-4 2/
11 100 files 100,000 polluted files foo Background NO Name Ava/Source 1 Foo1 70/78 It is high possible for customers to 2 foo1 60/66 search bad files! 3 foo 11/40 A 4 Foo-4 2/
12 Background Why there are so many pollution attacks: - Publishers (e.g., music companies) want copyright - Employ many programmers to launch these attacks red P2P network (Gnutella, KaZaA, etc.) The majority of content is polluted: - The service quality of P2P content sharing became low - Users gave up P2P content sharing systemsp2p network (Chord, CAN, Pastry, etc.) - More (Hybrid P2P, BitTorrent, etc.)
13 Lecture Roadmap Background Reputation Systems Case Study: Credence
14 Reputation Systems
15 Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems
16 Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems
17 How a reputation system works? Messages Author (Score) Votes
18 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0)
19 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0)
20 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0)
21 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) Bob Eve Dave
22 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) Bob Eve Dave
23 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) Like: Bob Eve Dave
24 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: Vi=1+1+1=3 Bob Eve Dave
25 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3)
26 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (1)
27 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (1) Alice Dave
28 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (1) Dislike: Alice Dave
29 How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (-1) Dislike: Vi=1-1-1=-1 Alice Dave
30 Examples
31 Global Reputation System Every entity has only one reputation score red P2P network (Gnutella, KaZaA, etc.) PageRank is a global peer-based trust model - Who plays the peer role in this context? - What are the historical activities of peers in this context?
32 PageRank [WWW 98] A B C
33 PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33
34 PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33
35 PageRank [WWW 98] B A C The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) # of outgoing links PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33
36 PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33
37 PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)= xPR(C) PR(B)= xPR(A) PR(C)= xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33
38 PageRank [WWW 98] A A B C B C What are PageRanks? What s the problem in this example?
39 Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems
40 Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems
41 Personalized Reputation Model We focus on personalized reputation model Used in P2P content sharing systems Three different types: - Peer-based reputation systems, e.g., EigenTrust [WWW 03] - Object-based reputation systems, e.g., Credence [NSDI 06] - Hybrid reputation systems, e.g., Scrubber [P2P 07] Request Decentralized file-sharing system Alice
42 EigenTrust [WWW 03] EigenTrsut is the first peer-based reputation system: - Similar to PageRank - Each peer is assigned a personalized reputation score - Assumption: Good peer does not publish polluted files Problems: - Relying on recommenders - Cannot offer fine-grained reputation to each object - Difficult to decide parameters in practice
43 Lecture Roadmap Background Reputation Systems Case Study: Credence
44 Credence [NSDI 06] Credence is the first object-based reputation system: - In Alice s view, each object is assigned a reputation score - Defending against malicious recommenders - Fine-grained reputation for each object
45 Credence [NSDI 06] Files Providers Voters F10 P2, P6 P4 (+1), P6 (-1) F22 P2, P6, P8 P2 (-1), P7 (-1) F4 P2, P4 P2(+1), P4(-1), P7(-1) Alice F6 P11, P13, P14 P11(+1)
46 Computing each file s reputation Files Providers Voters F10 P2, P6 P4 (+1), P6 (-1) F22 P2, P6, P8 P2 (-1), P7 (-1) F4 P2, P4 P2(+1), P4(-1), P7(-1) Alice F6 P11, P13, P14 P11(+1)
47 A file s reputation For Alice, the reputation score of each object is computed by weighted average of voters similarities. n Rep(F) = V i θ( Alice,Voter_i ) i=1 n θ( Alice,Voter_i ) i=1 [ -1, 1 ]
48 A file s reputation For Alice, the reputation score of each object is computed by weighted average of voters similarities. n The vote cast by voter i on F (+1 or -1) Rep(F) = V i θ( Alice,Voter_i ) i=1 n θ( Alice,Voter_i ) i=1 [ -1, 1 ]
49 A file s reputation For Alice, the reputation score of each object is computed by weighted average of voters similarities. n The vote cast by voter i on F (+1 or -1) Rep(F) = V i θ( Alice,Voter_i ) i=1 n θ( Alice,Voter_i ) i=1 [ -1, 1 ] The similarity between Alice and voter i The range is [-1, +1].
50 How to compute similarity Sim = (p-ab) a(1-a)b(1-b) For the overlapping voting set (e.g., S) between Alice and C i : - a is # of positive votes cased by Alice on the files in S divided by # of all the votes casted by Alice on the files in S - b is # of positive votes casted by C i on the files in S divided by # of all the votes casted by C i on the files in S - p is # of positive votes casted by both Alice and C i on the files in S divided by # of all the votes agreed by both Alice and C i on the files in S
51 How to compute similarity Sim = (p-ab) a(1-a)b(1-b) Simplify it! Sim(A, B) = # of the same votes on S S where S is the set consisting of overlapping files voted by both A and B
52 Example B: +1 C: -1 D: +1 File1 A: +1 B: +1 C: -1 File2 A: -1 B: -1 File3 A: -1 C: +1 D: -1 File4 A C: +1 D: -1 File5 A: +1 D: -1 File6 C: +1 G: -1 File7
53 Practical Issues There are several practical issues in Credence: - Cold start - Lack of enough overlapping voting history
54 Solution: Flow-based Reputation I want to compute similarity with C, but I do not have direct similarity with C A C B
55 Solution: Flow-based Reputation I want to compute similarity with C, but I do not have direct similarity with C 0.8 * 0.9 = 0.72 A C B
56 Credence [NSDI 06] Files Providers Voters F10 P2, P6 P2, P4, P6 F22 P2, P6, P8 P2, P7 F4 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P
57 Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22 P2, P6, P8 P2, P7 F4 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P
58 Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P
59 Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4=0.9 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P
60 Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4=0.9 P2, P4 P2, P4, P7 Alice F6=0.6 P11, P13, P14 P
61 Credence [NSDI 06] Pick the highest reputation file Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4=0.9 P2, P4 P2, P4, P7 Alice F6=0.6 P11, P13, P14 P
62 Discussion: Does it work? Credence works under assumptions: - Malicious nodes publish many polluted files - Malicious users cast misleading votes - # of malicious users should not be higher than 1/2, say 20% - There is no large-scale sybil attack in the setting
63 Next Lecture In the lec-6, I will cover: - What is sybil attack - How to defend against sybil attacks - Case studies: SybilGuard and DSybil
Recommendation/Reputation. Ennan Zhai
Recommendation/Reputation Ennan Zhai ennan.zhai@yale.edu Lecture Outline Background Reputation System: EigenTrust & Credence Sybil-Resitance: DSybil Lecture Outline Background Reputation System: EigenTrust
More informationCPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University
CPSC / PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet
More informationCPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University
CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet
More informationDifferential Privacy
CPSC 426/526 Differential Privacy Ennan Zhai Computer Science Department Yale University Recall: Lec-11 In lec-11, we learned: - Cryptographic basics - Symmetric key cryptography - Public key cryptography
More informationReview Session. Ennan Zhai
Review Session Ennan Zhai ennan.zhai@yale.edu Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search Today s Mission USENET & Gossip Firewall
More informationUseNet and Gossip Protocol
CPSC 426/526 UseNet and Gossip Protocol Ennan Zhai Computer Science Department Yale University Recall: Lec-1 Understanding: - Distributed systems vs. decentralized systems - Why we need both? red P2P network
More informationCryptographic Systems
CPSC 426/526 Cryptographic Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-10 In lec-10, we learned: - Consistency models - Two-phase commit - Consensus - Paxos Lecture Roadmap
More informationDSybil: Optimal Sybil-Resistance for Recommendation Systems
DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons and Feng Xiao School of Computing, National University of Singapore, Singapore.
More informationSecuring The Reputation Management in WINNOWING P2P Scheme. Nawaf Almudhahka Matthew Locklear
Securing The Reputation Management in WINNOWING P2P Scheme Nawaf Almudhahka Matthew Locklear Agenda Overview Motivation Assumptions & Threat Model Approach Security Analysis of TVC Model Description Results
More informationCumulative Reputation Systems for Peer-to-Peer Content Distribution
Cumulative Reputation Systems for Peer-to-Peer Content Distribution B. Mortazavi and G. Kesidis Pennsylvania State University also with Verizon Wireless CISS Princeton March 23, 2006 1 Outline P2P CDNs
More informationReputation Management in P2P Systems
Reputation Management in P2P Systems Pradipta Mitra Nov 18, 2003 1 We will look at... Overview of P2P Systems Problems in P2P Systems Reputation Management Limited Reputation Sharing Simulation Results
More informationContent Search. Unstructured P2P
Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided
More informationhirep: Hierarchical Reputation Management for Peer-to-Peer Systems
hirep: Hierarchical Reputation Management for Peer-to-Peer Systems Xiaomei Liu, Li Xiao Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824 {liuxiaom, lxiao}@cse.msu.edu
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationBITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW
BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 2 ARCHITECTURES
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 2 ARCHITECTURES Architectural Styles Important styles of architecture for distributed systems Layered
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationReplications and Consensus
CPSC 426/526 Replications and Consensus Ennan Zhai Computer Science Department Yale University Recall: Lec-8 and 9 In the lec-8 and 9, we learned: - Cloud storage and data processing - File system: Google
More informationDistributed Data-Intensive Systems
Distributed Data-Intensive Systems CSCE 438 Texas A&M University Department of Computer Science and Engineering Instructor: Prof. James Caverlee Peer-to-Peer Systems February 6, 214 EigenTrust The EigenTrust
More informationLast Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1
Last Lecture SMTP SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1 This Lecture Peer-to-Peer (P2P) Applications SUNY at Buffalo; CSE 489/589 Modern Networking
More informationPeer-to-Peer Networks
Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More informationCryptography. Lecture 03
Cryptography Lecture 03 Recap Consider the following Encryption Schemes: 1. Shift Cipher: Crackable. Keyspace has only 26 elements. 2. Affine Cipher: Crackable. Keyspace has only 312 elements. 3. Vig Cipher:
More informationProblems in Reputation based Methods in P2P Networks
WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics
More informationSybil defenses via social networks
Sybil defenses via social networks Abhishek University of Oslo, Norway 19/04/2012 1 / 24 Sybil identities Single user pretends many fake/sybil identities i.e., creating multiple accounts observed in real-world
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 4
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 4 University of British Columbia In today s lecture we will see two applications of negative binomially distributed random variables.
More informationTrust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University
Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 14.1.2013 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationAiding the Detection of Fake Accounts in Large Scale Social Online Services
Aiding the Detection of Fake Accounts in Large Scale Social Online Services Qiang Cao Duke University Michael Sirivianos Xiaowei Yang Tiago Pregueiro Cyprus Univ. of Technology Duke University Tuenti,
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationSOFIA: Social Filtering for Niche Markets
Social Filtering for Niche Markets Matteo Dell'Amico Licia Capra University College London UCL MobiSys Seminar 9 October 2007 : Social Filtering for Niche Markets Outline 1 Social Filtering Competence:
More informationContent Search. Unstructured P2P. Jukka K. Nurminen
Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd
More informationChapter 2 ARCHITECTURES
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 2 ARCHITECTURES Plan Software architecture Architectural styles System architectures Centralized
More informationDefining Encryption. Lecture 2. Simulation & Indistinguishability
Defining Encryption Lecture 2 Simulation & Indistinguishability Roadmap First, Symmetric Key Encryption Defining the problem We ll do it elaborately, so that it will be easy to see different levels of
More informationCollusion Detection in Reputation Systems for Peer-to-Peer Networks
Collusion Detection in Reputation Systems for Peer-to-Peer Networks Ze Li, Haiying Shen and Karan Sapra Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 263 Email: {zel,
More informationA reputation system for BitTorrent peer-to-peer filesharing
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2006 A reputation system for BitTorrent peer-to-peer filesharing
More informationToday. Architectural Styles
Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationOverview. Background: Sybil Attack. Background: Defending Against Sybil Attack. Social Networks. Multiplayer Games. Class Feedback Discussion
Overview Social Networks Multiplayer Games Class Feedback Discussion L-27 Social Networks and Other Stuff 2 Background: Sybil Attack Sybil attack: Single user pretends many fake/sybil identities Creating
More informationPage 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"
How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth
More informationCSCI-1680 P2P Rodrigo Fonseca
CSCI-1680 P2P Rodrigo Fonseca Based partly on lecture notes by Ion Stoica, Sco5 Shenker, Joe Hellerstein Today Overlay networks and Peer-to-Peer Motivation Suppose you want to write a routing protocol
More informationIntroduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More informationSybilGuard: Defending Against Sybil Attacks via Social Networks
Expanded Technical Report. The original version appears In Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006), Pisa, Italy, September 2006 SybilGuard: Defending Against
More informationP2PNS: A Secure Distributed Name Service for P2PSIP
P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS
More informationVoting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yang, Yafei Dai Abstract With the popularity of voting systems in cyberspace,
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 12.1.2015 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationVoting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yang, Yafei Dai Abstract With the popularity of voting systems in cyberspace,
More informationSecurity protocols and their verification. Mark Ryan University of Birmingham
Security protocols and their verification Mark Ryan University of Birmingham Contents 1. Authentication protocols (this lecture) 2. Electronic voting protocols 3. Fair exchange protocols 4. Digital cash
More informationICT 6544 Distributed Systems Lecture 2: ARCHITECTURES
ICT 6544 Distributed Systems Lecture 2: ARCHITECTURES Hossen Asiful Mustafa 1 Introduction Distributed systems are often complex pieces of software of which the components are by definition dispersed across
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationReading Time: A Method for Improving the Ranking Scores of Web Pages
Reading Time: A Method for Improving the Ranking Scores of Web Pages Shweta Agarwal Asst. Prof., CS&IT Deptt. MIT, Moradabad, U.P. India Bharat Bhushan Agarwal Asst. Prof., CS&IT Deptt. IFTM, Moradabad,
More informationPeer-to-Peer (P2P) networks have emerged as a popular
, July 3-5, 213, London, U.K. On Combating Content Poisoning in Peer-to-Peer Networks Mohammed Hawa, Member, IAENG, Raed Al-Zubi, Khalid A. Darabkh, and Ghazi Al-Sukkar Abstract Poisoning attacks on Peer-to-Peer
More informationToday. Architectural Styles
Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed
More informationarxiv: v1 [cs.cr] 30 May 2014
ROMEO: ReputatiOn Model Enhancing OpenID Simulator Ginés Dólera Tormo 1, Félix Gómez Mármol 1, and Gregorio Martínez Pérez 2 arxiv:1405.7831v1 [cs.cr] 30 May 2014 1 NEC Europe Ltd., Kurfürsten-Anlage 36,
More informationPeer-to-Peer Systems and Security
Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universität München April 13, 2013 Salsa & AP3 Goal: eliminate trusted blender server Idea: Use DHT (AP3: Pastry, Salsa: custom
More informationSybilGuard: Defending Against Sybil Attacks via Social Networks
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu Michael Kaminsky Phillip B. Gibbons Abraham Flaxman Intel Research Pittsburgh Carnegie Mellon University {haifeng.yu,michael.e.kaminsky,phillip.b.gibbons}@intel.com
More informationProving the Impossible with Alibi Protocols
Proving the Impossible with Alibi Protocols Dave Levin Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee, Bo Han, John Douceur, Jacob Lorch, Thomas Moscibroda Uncooperative behavior Cooperation
More informationDEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM
DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM Rehan Akbani, Turgay Korkmaz, and G. V. S. Raju {rakbani@cs.utsa.edu, korkmaz@cs.utsa.edu, and gvs.raju@utsa.edu} University of Texas
More informationBuilding a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks
Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks Niels Zeilemaker #1, Zekeriya Erkin 2, Paolo Palmieri #3, Johan Pouwelse #4 # Parallel and Distributed Systems Group, Delft University
More informationNet Trust: User-Centered Detection of Pharming, Phishing and Fraud. L Jean Camp
Net Trust: User-Centered Detection of Pharming, Phishing and Fraud L Jean Camp www.ljean.com Core Problem Statement How to inform individual assessments of trustworthiness of a potential online transaction.
More informationSmalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold
Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Michael J. Fischer Lecture 4 September 11, 2017 CPSC 467, Lecture 4 1/23 Analyzing Confidentiality of Cryptosystems Secret ballot elections Information protection Adversaries
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationContent Overlays. Nick Feamster CS 7260 March 12, 2007
Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not
More informationSybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
2008 IEEE Symposium on Security and Privacy SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks Haifeng Yu National University of Singapore haifeng@comp.nus.edu.sg Michael Kaminsky
More informationSecurity for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818
Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao
More informationP2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems
P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically
More informationDiscrete Mathematics and Probability Theory Fall 2013 Midterm #2
CS 70 Discrete Mathematics and Probability Theory Fall 013 Midterm # 1. (30 points) Short Answer. No justification necessary. Please write only the answer in the space provided after each question. Please
More informationMaking P2P Downloading Dependable by Exploiting Social Networks
Making P2P Downloading Dependable by Exploiting Social Networks Yingwu Zhu Department of CSSE, Seattle University Seattle, WA 98122, USA Email: zhuy@seattleu.edu Abstract P2P file sharing networks are
More informationHOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?
HOW WORKS And Who Needs a Content Distribution Network Anyway? Efficient and Inefficient Networks If all networks were fast, efficient, and never suffered from congestion there wouldn t be any need for
More informationLecture 3. Introduction to Cryptocurrencies
Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must
More informationLecture 7 - Applied Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 7 - Applied Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger
More informationComputer Security module
Computer Security module Revision notes Mark D. Ryan June 2010 There won't be a revision lecture for the Computer Security module. Instead, these notes are provided to help you prepare for the exam. Revision
More informationSELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS
SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS R. K. Prasad and Vipin Sharma 1 Department of Mechanical Engineering ABSTRACT: P A College of Engineering Nadupadavu, Mangalore, India In this implemented
More informationDDoS Vulnerability of BitTorrent Peer Exchange Extension: Analysis and Defense
IEEE ICC 2012 - Communication and Information Systems Security Symposium DDoS Vulnerability of BitTorrent Peer Exchange Extension: Analysis and Defense Majing Su 1, Hongli Zhang 1, Bingxing Fang 1, Xiaojiang
More informationHow Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization
Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed
More informationLatest Peer-to-Peer Technologies II Artjom Lind 1
Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured
More informationOverlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.
Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University
More information- Content Security in P2P
Why Jenny can t share the content with Jane? - Content Security in P2P Heather Yu Huawei Technologies heathery@ieee.org Future of Networked Home A vision voice video text Data gaming IPTV streaming IM
More informationLink Analysis and Web Search
Link Analysis and Web Search Moreno Marzolla Dip. di Informatica Scienza e Ingegneria (DISI) Università di Bologna http://www.moreno.marzolla.name/ based on material by prof. Bing Liu http://www.cs.uic.edu/~liub/webminingbook.html
More informationSYBIL attacks [1] refer to individual malicious users creating
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 885 SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks Haifeng Yu, Phillip B. Gibbons, Member, IEEE, Michael Kaminsky,
More informationEE 122: Peer-to-Peer Networks
EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer
More informationIn Search of Homo Swappus : Evolution of Cooperation in Peer-to-Peer Systems
In Search of Homo Swappus : Evolution of Cooperation in Peer-to-Peer Systems John Chuang School of Information Management and Systems University of California at Berkeley chuang@sims.berkeley.edu http://p2pecon.berkeley.edu/
More informationCOMP6237 Data Mining Making Recommendations. Jonathon Hare
COMP6237 Data Mining Making Recommendations Jonathon Hare jsh2@ecs.soton.ac.uk Introduction Recommender systems 101 Taxonomy of recommender systems Collaborative Filtering Collecting user preferences as
More informationSybil-Resilient Online Content Rating
Sybil-Resilient Online Content Rating Dinh Nguyen Tran, Bonan Min, Jinyang Li, Lakshminarayanan Subramanian Courant Institute of Mathematical Sciences New York University Email:{trandinh,bonan,jinyang,lakshmi}@cs.nyu.edu
More informationOverlay and P2P Networks. Introduction. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction Prof. Sasu Tarkoma 13.1.2014 Contents Course Overview Lectures Assignments/Exercises Course Overview Overlay networks and peer-to-peer technologies have become key
More informationFailures in Distributed Systems
CPSC 426/526 Failures in Distributed Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-14 In lec-14, we learned: - Difference between privacy and anonymity - Anonymous communications
More informationReputation-Based Trust Management for P2P Networks
Reputation-Based Trust Management for P2P Networks Ali Aydın Selçuk Ersin Uzun Mark Reşat Pariente Department of Computer Engineering Bilkent University Ankara, 68, Turkey selcuk@cs.bilkent.edu.tr, {euzun,resat}@ug.bilkent.edu.tr
More informationLightweight Signatures for (A Defense Against Phishing)
Lightweight Signatures for Email (A Defense Against Phishing) Ben Adida ben@mit.edu Cryptography and Information Security Group CSAIL, MIT 6.857 - December 7th, 2005 (joint with David Chau, Susan Hohenberger
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large
More informationAn Offline Foundation for Accountable Pseudonyms
An Offline Foundation for Accountable Pseudonyms Bryan Ford MIT CSAIL Jacob Strauss SocialNets April 1, 2008 Introduction Anonymity is a cherished principle Traditional: voting, peer review Online: email,
More informationDistributed Information Processing
Distributed Information Processing 14 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2016 Eom, Hyeonsang All Rights Reserved Outline
More informationStudy Guide for the Final Exam
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #22 Professor M. J. Fischer April 30, 2005 1 Exam Coverage Study Guide for the Final Exam The final
More informationBrief (non-technical) history
Web Data Management Part 2 Advanced Topics in Database Management (INFSCI 2711) Textbooks: Database System Concepts - 2010 Introduction to Information Retrieval - 2008 Vladimir Zadorozhny, DINS, SCI, University
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationIJITKM Special Issue (ICFTEM-2014) May 2014 pp (ISSN )
Security Enhancement Technique In Peer to Peer Network: A Review Varun Chanana 1, Sandeep Kumar 2, Ravikat Jaiswal 3 1,2,3 Department of CSE,Ganpati Institute of Technology and Management,Bilaspur,Yamunanagar
More informationDynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme
Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme Anurag Garg, Roberto Battiti, and Gianni Costanzi Dipartimento di Informatica e Telecomunicazioni, Università
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More information