Recommendation/Reputation. Ennan Zhai

Size: px
Start display at page:

Download "Recommendation/Reputation. Ennan Zhai"

Transcription

1 Recommendation/Reputation Ennan Zhai

2 Lecture Outline Background Reputation System: EigenTrust & Credence Sybil-Resitance: DSybil

3 Lecture Outline Background Reputation System: EigenTrust & Credence Sybil-Resitance: DSybil

4 Motivating Example

5 Motivating Example

6 Motivating Example Search Result

7 Motivating Example Search Result

8 Motivating Example Search Result It is high possible for the consumer to select a bad object

9 Motivating Example Search Result But reputation systems can help you!

10 Reputation/Recommendation What is the reputation system?

11 Reputation/Recommendation What is the reputation system? What is the recommendation system?

12 Reputation/Recommendation What is the reputation system? What is the recommendation system? Difference?

13 Categories of Reputation Systems Three different types: Peer-based reputation systems, e.g., EigenTrust;

14 Categories of Reputation Systems Three different types: Peer-based reputation systems, e.g., EigenTrust; Object-based reputation systems, e.g., Credence;

15 Categories of Reputation Systems Three different types: Peer-based reputation systems, e.g., EigenTrust; Object-based reputation systems, e.g., Credence; Hybrid reputation systems, e.g., Scrubber.

16 Lecture Outline Background Reputation System: EigenTrust & Credence Sybil-Resitance: DSybil

17 Lecture Outline Background Reputation System: EigenTrust & Credence Sybil-Resitance: DSybil

18 EigenTrust The first peer-based reputation system: Similar to PageRank; Not a pure decentralized system.

19 Credence

20 Credence lice Request Decentralized file-sharing system

21 Credence Name Sources Voters F 10 P 2 P 6 P 2 P 4 P 6 F 22 P 2 P 6 P 8 P 2 P 7 lice F 4 P 2 P 4 P 2 P 4 P 7 F 6 P 11 P 13 P 14 P 11

22 Computing each File s Reputation Name Sources Voters F 10 P 2 P 6 P 2 P 4 P 6 F 22 P 2 P 6 P 8 P 2 P 7 lice F 4 P 2 P 4 P 2 P 4 P 7 F 6 P 11 P 13 P 14 P 11

23 File s Reputation Credence uses weighted averaging to compute the reputation of a file.

24 File s Reputation n Rep(F) = V i θ( lice,voter_i ) i=1 n θ( lice,voter_i ) i=1 [ -1, 1 ] Credence uses weighted averaging to compute the reputation of a file.

25 File s Reputation n The vote cast by voter i on F (+1 or -1) Rep(F) = V i θ( lice,voter_i ) i=1 n θ( lice,voter_i ) i=1 [ -1, 1 ]

26 File s Reputation n The vote cast by voter i on F (+1 or -1) Rep(F) = V i θ( lice,voter_i ) i=1 n θ( lice,voter_i ) i=1 [ -1, 1 ] The similarity between lice and voter i The range is [-1, +1].

27 Similarity between Nodes P 2 θlice, P4 lice P 4 P 6

28 Similarity between Nodes θ = (p-ab) / a (1-a) b(1-b)

29 Similarity between Nodes θ = (p-ab) / a (1-a) b(1-b) For the overlapping voting set (e.g., S) between lice and P i :

30 Similarity between Nodes θ = (p-ab) / a (1-a) b(1-b) For the overlapping voting set (e.g., S) between lice and P i : a = # of positive votes cast by lice on the files in S # of all the votes cast by lice on the files in S

31 Similarity between Nodes θ = (p-ab) / a (1-a) b(1-b) For the overlapping voting set (e.g., S) between lice and P i : a = b = # of positive votes cast by lice on the files in S # of all the votes cast by lice on the files in S # of positive votes cast by C i on the files in S # of all the votes cast by C i on the files in S

32 Similarity between Nodes θ = (p-ab) / a (1-a) b(1-b) For the overlapping voting set (e.g., S) between lice and P i : a = b = # of positive votes cast by lice on the files in S # of all the votes cast by lice on the files in S # of positive votes cast by C i on the files in S # of all the votes cast by C i on the files in S # of positive votes cast by both lice and C p = i on the files in S # of all the votes agreed by both lice and C i on the files in S

33 Example θ = (p-ab) / a (1-a) b(1-b) : +1 : -1 : -1 : +1 B: +1 B: -1 B: +1 B: +1 File 1 File 2 File 3 File 4

34 Practical Issues There are a few practical issues in Credence: Cold start; Overlapping voting history.

35 Possible Solution Flow-based Reputation: C θ ac = θ ab * θ bc B

36 Possible Solution Flow-based Reputation: 0.72 C θ ac = θ ab * θ bc B

37 Recall Reputation Computation n Rep(F) = V i θ( lice,voter_i ) i=1 n θ( lice,voter_i ) i=1 [ -1, 1 ] Why it works?

38 Reputation Name Sources Voters F 10 P 2 P 6 P 2 P 4 P 6 F 22 P 2 P 6 P 8 P 2 P 7 lice F 4 P 2 P 4 P 2 P 4 P 7 F 6 P 11 P 13 P 14 P 11

39 Reputation Name Sources Voters F 10 = 0.8 P 2 P 6 P 2 P 4 P 6 F 22 P 2 P 6 P 8 P 2 P 7 lice F 4 P 2 P 4 P 2 P 4 P 7 F 6 P 11 P 13 P 14 P 11

40 Reputation Name Sources Voters F 10 = 0.8 P 2 P 6 P 2 P 4 P 6 F 22 = 0.5 P 2 P 6 P 8 P 2 P 7 lice F 4 P 2 P 4 P 2 P 4 P 7 F 6 P 11 P 13 P 14 P 11

41 Reputation Name Sources Voters F 10 = 0.8 P 2 P 6 P 2 P 4 P 6 F 22 = 0.5 P 2 P 6 P 8 P 2 P 7 lice F 4 = 0.9 P 2 P 4 P 2 P 4 P 7 F 6 P 11 P 13 P 14 P 11

42 Reputation Name Sources Voters F 10 = 0.8 P 2 P 6 P 2 P 4 P 6 F 22 = 0.5 P 2 P 6 P 8 P 2 P 7 lice F 4 = 0.9 P 2 P 4 P 2 P 4 P 7 F 6 = 0.6 P 11 P 13 P 14 P 11

43 Ranking Name Sources Voters F 4 = 0.9 P 2 P 4 P 2 P 4 P 7 F 10 = 0.8 P 2 P 6 P 2 P 4 P 6 lice F 6 = 0.6 P 11 P 13 P 14 P 11 F 22 = 0.5 P 2 P 6 P 8 P 2 P 7

44 Discussions Credence is a practical system but has many problems: Cold start; Overlapping voting history; Sybil attack.

45 Sybil ttack

46 Sybil ttack Sybil attack is the killer of reputation systems: What is sybil attack?

47 Sybil ttack Sybil attack is the killer of reputation systems: What is sybil attack? How does sybil attack compromise Credence?

48 Sybil ttack Sybil attack is the killer of reputation systems: What is sybil attack? How does sybil attack compromise Credence? Can we defend against sybil attack?

49 Lecture Outline Background Reputation System: EigenTrust & Credence Sybil-Resitance: DSybil

50 Lecture Outline Background Reputation System: EigenTrust & Credence Sybil-Resitance: DSybil

51 Sybil Defense very hot but very hard topic Many good efforts

52 DSybil Based on feedback and reputation Loss (# of bad recommendations) is provable O(D logm) even under worst-case attack D: Dimension of the objects (less than 10 in Digg) M: Max # of sybil identities voting on each obj The authors prove Dsybil s loss is optimal

53 Challenges It is very challenging to defend against sybil: 1. How to identify correct but non-helpful votes?

54 Challenges It is very challenging to defend against sybil: 1. How to identify correct but non-helpful votes? 2. How to assign initial trust to new identities?

55 Challenges It is very challenging to defend against sybil: 1. How to identify correct but non-helpful votes? 2. How to assign initial trust to new identities? 3. How exactly to grow trust?

56 Challenges It is very challenging to defend against sybil: 1. How to identify correct but non-helpful votes? 2. How to assign initial trust to new identities? 3. How exactly to grow trust? 4. How to rank the results?

57 Key #1: Heavy-Tail Distribution Leveraging typical voting behavior of honest users: Exist very active users who cast many votes

58 Key #1: Heavy-Tail Distribution Leveraging typical voting behavior of honest users: Exist very active users who cast many votes % of users casting x votes # votes cast (on various objs)

59 Key #1: Heavy-Tail Distribution Leveraging typical voting behavior of honest users: Exist very active users who cast many votes % of users casting x votes # votes cast (on various objs)

60 Key Insight #2 Key #2: If user is already getting enough help, then do not give out more trust: This insight enables us to avoid giving trust to some sybil identities; The insight can make us strike an optimal balance.

61 System Model Objects to be recommended are either good or bad;

62 System Model Objects to be recommended are either good or bad; Votes are positive. Namely, DSybil only has positive votes.

63 System Model Objects to be recommended are either good or bad; Votes are positive. Namely, DSybil only has positive votes. DSybil is personalized:

64 fter search, we enter one round 2 good objs 2 bad objs DSybil does not know which are good

65 fter search, we enter one round 2 good objs 2 bad objs DSybil does not know which are good Each round has a pool of objects: DSybil recommends one object for lice to consume;

66 fter search, we enter one round 2 good objs 2 bad objs DSybil does not know which are good Each round has a pool of objects: DSybil recommends one object for lice to consume; lice provides feedback after consumption;

67 fter search, we enter one round 2 good objs 2 bad objs DSybil does not know which are good Each round has a pool of objects: DSybil recommends one object for lice to consume; lice provides feedback after consumption; DSybil adjusts reputations based on the feedback.

68 Initial Round E: 0.2 F: 0.2 H: 0.2 G: 0.2 H: 0.2 Total: 0.4 Total: 0.2 Total: 0.2 Total: 0.2 Each identity starts with initial trust 0.2 n object is overwhelming if total trust >=C (C = 1.0)

69 Initial Round E: 0.2 F: 0.2 H: 0.2 G: 0.2 H: 0.2 Total: 0.4 Total: 0.2 Total: 0.2 Total: Recommend uniformly random object

70 Initial Round E: 0.2 F: 0.2 H: 0.2 G: 0.2 H: 0.2 Total: 0.4 Total: 0.2 Total: 0.2 Total: Recommend uniformly random object 2. djust reputation after feedback - if obj is bad, multiply trust of voters by β= if obj is good, multiply trust of voters by α= 2

71 Rounds with Overwhelming Obj E: 1.0 H: 0.2 Total: 1.2 G: 0.2 H: 0.2 Total: 0.4 F: 1.0 Total: 1.0

72 Rounds with Overwhelming Obj E: 1.0 H: 0.2 Total: 1.2 G: 0.2 H: 0.2 Total: 0.4 F: 1.0 Total: Recommend arbitrary overwhelming object

73 Rounds with Overwhelming Obj E: 1.0 H: 0.2 Total: 1.2 F: 1.0 Total: Recommend arbitrary overwhelming object

74 Rounds with Overwhelming Obj E: 1.0 H: 0.2 Total: 1.2 F: 1.0 Total: Recommend arbitrary overwhelming object - Will confiscate sufficient trust if obj is bad

75 Rounds with Overwhelming Obj E: 1.0 H: 0.2 Total: 1.2 F: 1.0 Total: Recommend arbitrary overwhelming object - Will confiscate sufficient trust if obj is bad 2. djust trust after feedback - if obj is bad, multiply trust of voters by β= if obj is good, no additional trust given out (#2 key)

76 Why it works?

77 Guide Guide: set of honest users in the system are very active. Usually, the votes casted by guides can cover 60% objects.

78 Guide Guide: set of honest users in the system are very active. Usually, the votes casted by guides can cover 60% objects. % of users casting x votes # votes cast (on various objs)

79 Guide X X X X,Y Y Y, W,I W The minimal guide has 2 elements: {X,Y} or {X,W} or {X,}

80 Guide X X X X,Y Y Y, W,I W The minimal guide has 2 elements: {X,Y} or {X,W} or {X,} Note that DSybil does not know who are the guide

81 Guide X X X X,Y Y, Y, W,I X,W X Minimal guide = {X}

82 Guide X X Y W B B

83 Guide X X Y W B B {X,Y} or {X,W}

84 Guide X X Y W B B

85 Guide X X Y W B B Guide = {}

86 Leveraging Key Insight #1 The elements in the minimal guide is typically small in practice

87 Leveraging Key Insight #1 The elements in the minimal guide is typically small in practice Small number of elements -> will encounter guides frequently when picking random objs: * Reputation to guides quickly grow to C

88 Leveraging Key Insight #1 The elements in the minimal guide is typically small in practice Small number of elements -> will encounter guides frequently when picking random objs: * Reputation to guides quickly grow to C * This will result in overwhelming objs

89 Leveraging Key Insight #2 Consuming good overwhelming obj = lice already has sufficient help

90 Leveraging Key Insight #2 Consuming good overwhelming obj = lice already has sufficient help Thus do not give out additional reputation: * Prevent sybil identities from getting reputation for free * May hurt honest identities (but remember this is optimal)

91 Provable Guarantees Proof: ^^^ ++== ~~~,,l. End of Proof Proof for O(D logm) loss even under worst-case attack

92 Sybil ttack Summary gain, sybil-defense is very interesting but very hard In the future lecture, we will learn social network based solution against sybil attack.

CPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University CPSC 426/526 Reputation Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-4 P2P search models: - How Chord works - Provable guarantees in Chord - Other DHTs, e.g., CAN and Pastry

More information

DSybil: Optimal Sybil-Resistance for Recommendation Systems

DSybil: Optimal Sybil-Resistance for Recommendation Systems DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons and Feng Xiao School of Computing, National University of Singapore, Singapore.

More information

Differential Privacy

Differential Privacy CPSC 426/526 Differential Privacy Ennan Zhai Computer Science Department Yale University Recall: Lec-11 In lec-11, we learned: - Cryptographic basics - Symmetric key cryptography - Public key cryptography

More information

Sybil defenses via social networks

Sybil defenses via social networks Sybil defenses via social networks Abhishek University of Oslo, Norway 19/04/2012 1 / 24 Sybil identities Single user pretends many fake/sybil identities i.e., creating multiple accounts observed in real-world

More information

Network Economics and Security Engineering

Network Economics and Security Engineering (joint with Ross Anderson and Shishir Nagaraja) Computer Laboratory University of Cambridge DIMACS January 18, 2007 Outline Relevant network properties 1 Relevant network properties 2 3 Motivation Relevant

More information

Review Session. Ennan Zhai

Review Session. Ennan Zhai Review Session Ennan Zhai ennan.zhai@yale.edu Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search Today s Mission USENET & Gossip Firewall

More information

Sybil-Resilient Online Content Rating

Sybil-Resilient Online Content Rating Sybil-Resilient Online Content Rating Dinh Nguyen Tran, Bonan Min, Jinyang Li, Lakshminarayanan Subramanian Courant Institute of Mathematical Sciences New York University Email:{trandinh,bonan,jinyang,lakshmi}@cs.nyu.edu

More information

SYBIL attacks [1] refer to individual malicious users creating

SYBIL attacks [1] refer to individual malicious users creating IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 885 SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks Haifeng Yu, Phillip B. Gibbons, Member, IEEE, Michael Kaminsky,

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

Cumulative Reputation Systems for Peer-to-Peer Content Distribution

Cumulative Reputation Systems for Peer-to-Peer Content Distribution Cumulative Reputation Systems for Peer-to-Peer Content Distribution B. Mortazavi and G. Kesidis Pennsylvania State University also with Verizon Wireless CISS Princeton March 23, 2006 1 Outline P2P CDNs

More information

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yang, Yafei Dai Abstract With the popularity of voting systems in cyberspace,

More information

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yang, Yafei Dai Abstract With the popularity of voting systems in cyberspace,

More information

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview

More information

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks 2008 IEEE Symposium on Security and Privacy SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks Haifeng Yu National University of Singapore haifeng@comp.nus.edu.sg Michael Kaminsky

More information

Aiding the Detection of Fake Accounts in Large Scale Social Online Services

Aiding the Detection of Fake Accounts in Large Scale Social Online Services Aiding the Detection of Fake Accounts in Large Scale Social Online Services Qiang Cao Duke University Michael Sirivianos Xiaowei Yang Tiago Pregueiro Cyprus Univ. of Technology Duke University Tuenti,

More information

Algorithms, Games, and Networks February 21, Lecture 12

Algorithms, Games, and Networks February 21, Lecture 12 Algorithms, Games, and Networks February, 03 Lecturer: Ariel Procaccia Lecture Scribe: Sercan Yıldız Overview In this lecture, we introduce the axiomatic approach to social choice theory. In particular,

More information

SOFIA: Social Filtering for Niche Markets

SOFIA: Social Filtering for Niche Markets Social Filtering for Niche Markets Matteo Dell'Amico Licia Capra University College London UCL MobiSys Seminar 9 October 2007 : Social Filtering for Niche Markets Outline 1 Social Filtering Competence:

More information

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security A Brief Overview of Security & Privacy Issues 1 Topics to Be Covered Cloud computing RFID systems Bitcoin

More information

Identification Schemes

Identification Schemes Identification Schemes Lecture Outline Identification schemes passwords one-time passwords challenge-response zero knowledge proof protocols Authentication Data source authentication (message authentication):

More information

Overview. Background: Sybil Attack. Background: Defending Against Sybil Attack. Social Networks. Multiplayer Games. Class Feedback Discussion

Overview. Background: Sybil Attack. Background: Defending Against Sybil Attack. Social Networks. Multiplayer Games. Class Feedback Discussion Overview Social Networks Multiplayer Games Class Feedback Discussion L-27 Social Networks and Other Stuff 2 Background: Sybil Attack Sybil attack: Single user pretends many fake/sybil identities Creating

More information

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks University of Cambridge Computer Laboratory 22nd IFIP TC-11 International Information Security Conference Sandton,

More information

Formally Specifying Blockchain Protocols

Formally Specifying Blockchain Protocols Formally Specifying Blockchain Protocols 1 IOHK company building blockchain applications research focused invested in functional programming built Cardano network, Ada cryptocurrency 2 Blockchain Protocols

More information

CSE 373 MAY 10 TH SPANNING TREES AND UNION FIND

CSE 373 MAY 10 TH SPANNING TREES AND UNION FIND CSE 373 MAY 0 TH SPANNING TREES AND UNION FIND COURSE LOGISTICS HW4 due tonight, if you want feedback by the weekend COURSE LOGISTICS HW4 due tonight, if you want feedback by the weekend HW5 out tomorrow

More information

Hashing. Yufei Tao. Department of Computer Science and Engineering Chinese University of Hong Kong

Hashing. Yufei Tao. Department of Computer Science and Engineering Chinese University of Hong Kong Department of Computer Science and Engineering Chinese University of Hong Kong In this lecture, we will revisit the dictionary search problem, where we want to locate an integer v in a set of size n or

More information

Making P2P Downloading Dependable by Exploiting Social Networks

Making P2P Downloading Dependable by Exploiting Social Networks Making P2P Downloading Dependable by Exploiting Social Networks Yingwu Zhu Department of CSSE, Seattle University Seattle, WA 98122, USA Email: zhuy@seattleu.edu Abstract P2P file sharing networks are

More information

Lecture 9: Sorting Algorithms

Lecture 9: Sorting Algorithms Lecture 9: Sorting Algorithms Bo Tang @ SUSTech, Spring 2018 Sorting problem Sorting Problem Input: an array A[1..n] with n integers Output: a sorted array A (in ascending order) Problem is: sort A[1..n]

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

GNUnet Distributed Data Storage

GNUnet Distributed Data Storage GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview

More information

ENEE 459-C Computer Security. Security protocols (continued)

ENEE 459-C Computer Security. Security protocols (continued) ENEE 459-C Computer Security Security protocols (continued) Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p

More information

CSE373: Data Structures & Algorithms Lecture 17: Minimum Spanning Trees. Dan Grossman Fall 2013

CSE373: Data Structures & Algorithms Lecture 17: Minimum Spanning Trees. Dan Grossman Fall 2013 CSE373: Data Structures & Algorithms Lecture 7: Minimum Spanning Trees Dan Grossman Fall 03 Spanning Trees A simple problem: Given a connected undirected graph G=(V,E), find a minimal subset of edges such

More information

CSE 5852, Modern Cryptography: Foundations Fall Lecture 26. pk = (p,g,g x ) y. (p,g,g x ) xr + y Check g xr +y =(g x ) r.

CSE 5852, Modern Cryptography: Foundations Fall Lecture 26. pk = (p,g,g x ) y. (p,g,g x ) xr + y Check g xr +y =(g x ) r. CSE 5852, Modern Cryptography: Foundations Fall 2016 Lecture 26 Prof. enjamin Fuller Scribe: Tham Hoang 1 Last Class Last class we introduce the Schnorr identification scheme [Sch91]. The scheme is to

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC / PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Lecture #6: Mining Data Streams Seoul National University 1 Outline Overview Sampling From Data Stream Queries Over Sliding Window 2 Data Streams In many data mining situations,

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

Evaluating the Wisdom of Crowds in Assessing Phishing Sites

Evaluating the Wisdom of Crowds in Assessing Phishing Sites Evaluating the Wisdom of Crowds in Assessing Phishing Websites and Richard Clayton University of Cambridge Computer Laboratory 12th International Financial Cryptography and Data Security Conference (FC08)

More information

Maximum Security with Minimum Impact : Going Beyond Next Gen

Maximum Security with Minimum Impact : Going Beyond Next Gen SESSION ID: SP03-W10 Maximum Security with Minimum Impact : Going Beyond Next Gen Wendy Moore Director, User Protection Trend Micro @WMBOTT Hyper-competitive Cloud Rapid adoption Social Global Mobile IoT

More information

Reputation Management in P2P Systems

Reputation Management in P2P Systems Reputation Management in P2P Systems Pradipta Mitra Nov 18, 2003 1 We will look at... Overview of P2P Systems Problems in P2P Systems Reputation Management Limited Reputation Sharing Simulation Results

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

Evaluation. David Kauchak cs160 Fall 2009 adapted from:

Evaluation. David Kauchak cs160 Fall 2009 adapted from: Evaluation David Kauchak cs160 Fall 2009 adapted from: http://www.stanford.edu/class/cs276/handouts/lecture8-evaluation.ppt Administrative How are things going? Slides Points Zipf s law IR Evaluation For

More information

Today s Outline. Motivation. Disjoint Sets. Disjoint Sets and Dynamic Equivalence Relations. Announcements. Today s Topics:

Today s Outline. Motivation. Disjoint Sets. Disjoint Sets and Dynamic Equivalence Relations. Announcements. Today s Topics: Today s Outline Disjoint Sets and Dynamic Equivalence Relations Announcements Assignment # due Thurs 0/ at pm Today s Topics: Disjoint Sets & Dynamic Equivalence CSE Data Structures and Algorithms 0//0

More information

ENEE 459-C Computer Security. Security protocols

ENEE 459-C Computer Security. Security protocols ENEE 459-C Computer Security Security protocols Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p and g public.

More information

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while

More information

The Plurality-with-Elimination Method

The Plurality-with-Elimination Method The Plurality-with-Elimination Method Lecture 9 Section 1.4 Robb T. Koether Hampden-Sydney College Fri, Sep 8, 2017 Robb T. Koether (Hampden-Sydney College) The Plurality-with-Elimination Method Fri, Sep

More information

Cloud Computing. Ennan Zhai. Computer Science at Yale University

Cloud Computing. Ennan Zhai. Computer Science at Yale University Cloud Computing Ennan Zhai Computer Science at Yale University ennan.zhai@yale.edu About Final Project About Final Project Important dates before demo session: - Oct 31: Proposal v1.0 - Nov 7: Source code

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu [Kumar et al. 99] 2/13/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu

More information

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication NETWORKING 1. ITDNW01 Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social 2. ITDNW02 Congestion Control for Background Data Transfers With Minimal Delay Impact 3. ITDNW03 Transient

More information

arxiv: v1 [cs.ma] 8 May 2018

arxiv: v1 [cs.ma] 8 May 2018 Ordinal Approximation for Social Choice, Matching, and Facility Location Problems given Candidate Positions Elliot Anshelevich and Wennan Zhu arxiv:1805.03103v1 [cs.ma] 8 May 2018 May 9, 2018 Abstract

More information

2013/2/12 EVOLVING GRAPH. Bahman Bahmani(Stanford) Ravi Kumar(Google) Mohammad Mahdian(Google) Eli Upfal(Brown) Yanzhao Yang

2013/2/12 EVOLVING GRAPH. Bahman Bahmani(Stanford) Ravi Kumar(Google) Mohammad Mahdian(Google) Eli Upfal(Brown) Yanzhao Yang 1 PAGERANK ON AN EVOLVING GRAPH Bahman Bahmani(Stanford) Ravi Kumar(Google) Mohammad Mahdian(Google) Eli Upfal(Brown) Present by Yanzhao Yang 1 Evolving Graph(Web Graph) 2 The directed links between web

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Group Members: 1. Geng Xue (A0095628R) 2. Cai Jingli (A0095623B) 3. Xing Zhe (A0095644W) 4. Zhu Xiaolu (A0109657W) 5. Wang Zixiao (A0095670X) 6. Jiao Qing (A0095637R) 7. Zhang

More information

Topology Control in Wireless Networks 4/24/06

Topology Control in Wireless Networks 4/24/06 Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:

More information

Machine-Powered Learning for People-Centered Security

Machine-Powered Learning for People-Centered Security White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today

More information

CS 6604: Data Mining Large Networks and Time-Series

CS 6604: Data Mining Large Networks and Time-Series CS 6604: Data Mining Large Networks and Time-Series Soumya Vundekode Lecture #12: Centrality Metrics Prof. B Aditya Prakash Agenda Link Analysis and Web Search Searching the Web: The Problem of Ranking

More information

SybilGuard: Defending Against Sybil Attacks via Social Networks

SybilGuard: Defending Against Sybil Attacks via Social Networks Expanded Technical Report. The original version appears In Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006), Pisa, Italy, September 2006 SybilGuard: Defending Against

More information

SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation

SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation This paper was presented as part of the main technical program at IEEE INFOCOM 2011 SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Kyungbaek Kim Xiaowei Yang

More information

hirep: Hierarchical Reputation Management for Peer-to-Peer Systems

hirep: Hierarchical Reputation Management for Peer-to-Peer Systems hirep: Hierarchical Reputation Management for Peer-to-Peer Systems Xiaomei Liu, Li Xiao Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824 {liuxiaom, lxiao}@cse.msu.edu

More information

4&5 Binary Operations and Relations. The Integers. (part I)

4&5 Binary Operations and Relations. The Integers. (part I) c Oksana Shatalov, Spring 2016 1 4&5 Binary Operations and Relations. The Integers. (part I) 4.1: Binary Operations DEFINITION 1. A binary operation on a nonempty set A is a function from A A to A. Addition,

More information

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without

More information

Trust Models for Expertise Discovery in Social Networks. September 01, Table of Contents

Trust Models for Expertise Discovery in Social Networks. September 01, Table of Contents Trust Models for Expertise Discovery in Social Networks September 01, 2003 Cai Ziegler, DBIS, University of Freiburg Table of Contents Introduction Definition and Characteristics of Trust Axes of Trust

More information

Blockchains & Cryptocurrencies

Blockchains & Cryptocurrencies 1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:

More information

Byzantine Fault Tolerance

Byzantine Fault Tolerance Byzantine Fault Tolerance CS 240: Computing Systems and Concurrency Lecture 11 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. So far: Fail-stop failures

More information

Online Appendix: A Stackelberg Game Model for Botnet Data Exfiltration

Online Appendix: A Stackelberg Game Model for Botnet Data Exfiltration Online Appendix: A Stackelberg Game Model for Botnet Data Exfiltration June 29, 2017 We first provide Lemma 1 showing that the urban security problem presented in (Jain et al. 2011) (see the Related Work

More information

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed

More information

Combating Sybil attacks in cooperative systems

Combating Sybil attacks in cooperative systems Combating Sybil attacks in cooperative systems by Nguyen Tran A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Computer Science Courant

More information

Lecture 25 Spanning Trees

Lecture 25 Spanning Trees Lecture 25 Spanning Trees 15-122: Principles of Imperative Computation (Fall 2018) Frank Pfenning, Iliano Cervesato The following is a simple example of a connected, undirected graph with 5 vertices (A,

More information

Reliable and Resilient Trust Management in Distributed Service Provision Networks

Reliable and Resilient Trust Management in Distributed Service Provision Networks Reliable and Resilient Trust Management in Distributed Service Provision Networks ZHIYUAN SU, State Key Laboratory of High-end Server & Storage Technology, Dalian University of Technology, Georgia Institute

More information

MATH 1340 Mathematics & Politics

MATH 1340 Mathematics & Politics MTH 1340 Mathematics & Politics Lecture 4 June 25, 2015 Slides prepared by Iian Smythe for MTH 1340, Summer 2015, at Cornell University 1 Profiles and social choice functions Recall from last time: in

More information

Peer-to-Peer Systems and Security

Peer-to-Peer Systems and Security Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universität München April 13, 2013 Salsa & AP3 Goal: eliminate trusted blender server Idea: Use DHT (AP3: Pastry, Salsa: custom

More information

Diffusion and Clustering on Large Graphs

Diffusion and Clustering on Large Graphs Diffusion and Clustering on Large Graphs Alexander Tsiatas Final Defense 17 May 2012 Introduction Graphs are omnipresent in the real world both natural and man-made Examples of large graphs: The World

More information

Hyper-Invertible Matrices and Applications

Hyper-Invertible Matrices and Applications Hyper-Invertible Matrices and Applications Martin Hirt ETH Zurich Theory and Practice of MPC, Aarhus, June 2012 Outline Hyper-Invertible Matrices Motivation Definition & Properties Construction Applications

More information

CS154. Streaming Algorithms and Communication Complexity

CS154. Streaming Algorithms and Communication Complexity CS154 Streaming Algorithms and Communication Complexity 1 Streaming Algorithms 2 Streaming Algorithms 01 42 3 L = {x x has more 1 s than 0 s} Initialize: C := 0 and B := 0 When the next symbol x is read,

More information

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway? HOW WORKS And Who Needs a Content Distribution Network Anyway? Efficient and Inefficient Networks If all networks were fast, efficient, and never suffered from congestion there wouldn t be any need for

More information

Algorand: Scaling Byzantine Agreements for Cryptocurrencies

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich Presented by: Preet Patel and Umang Lathia Outline Overview of Distributed

More information

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns This is a closed-book exam. You should have no material on your desk other than the exam itself and a pencil or pen.

More information

6.842 Randomness and Computation September 25-27, Lecture 6 & 7. Definition 1 Interactive Proof Systems (IPS) [Goldwasser, Micali, Rackoff]

6.842 Randomness and Computation September 25-27, Lecture 6 & 7. Definition 1 Interactive Proof Systems (IPS) [Goldwasser, Micali, Rackoff] 6.84 Randomness and Computation September 5-7, 017 Lecture 6 & 7 Lecturer: Ronitt Rubinfeld Scribe: Leo de Castro & Kritkorn Karntikoon 1 Interactive Proof Systems An interactive proof system is a protocol

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

Lecture 9: (Semi-)bandits and experts with linear costs (part I)

Lecture 9: (Semi-)bandits and experts with linear costs (part I) CMSC 858G: Bandits, Experts and Games 11/03/16 Lecture 9: (Semi-)bandits and experts with linear costs (part I) Instructor: Alex Slivkins Scribed by: Amr Sharaf In this lecture, we will study bandit problems

More information

QUESTION BANK FOR TEST

QUESTION BANK FOR TEST CSCI 2121 Computer Organization and Assembly Language PRACTICE QUESTION BANK FOR TEST 1 Note: This represents a sample set. Please study all the topics from the lecture notes. Question 1. Multiple Choice

More information

CprE 458/558: Real-Time Systems. Lecture 17 Fault-tolerant design techniques

CprE 458/558: Real-Time Systems. Lecture 17 Fault-tolerant design techniques : Real-Time Systems Lecture 17 Fault-tolerant design techniques Fault Tolerant Strategies Fault tolerance in computer system is achieved through redundancy in hardware, software, information, and/or computations.

More information

Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions

Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions Yehuda Lindell IBM T.J.Watson Research 19 Skyline Drive, Hawthorne New York 10532, USA lindell@us.ibm.com ABSTRACT In this paper

More information

Proof of Stake Made Simple with Casper

Proof of Stake Made Simple with Casper Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent

More information

Introduction to Cryptography Lecture 7

Introduction to Cryptography Lecture 7 Introduction to Cryptography Lecture 7 El Gamal Encryption RSA Encryption Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing

More information

CSC148 Week 7. Larry Zhang

CSC148 Week 7. Larry Zhang CSC148 Week 7 Larry Zhang 1 Announcements Test 1 can be picked up in DH-3008 A1 due this Saturday Next week is reading week no lecture, no labs no office hours 2 Recap Last week, learned about binary trees

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Chapter 1. Math review. 1.1 Some sets

Chapter 1. Math review. 1.1 Some sets Chapter 1 Math review This book assumes that you understood precalculus when you took it. So you used to know how to do things like factoring polynomials, solving high school geometry problems, using trigonometric

More information

Using Reinforcement Learning to Optimize Storage Decisions Ravi Khadiwala Cleversafe

Using Reinforcement Learning to Optimize Storage Decisions Ravi Khadiwala Cleversafe Using Reinforcement Learning to Optimize Storage Decisions Ravi Khadiwala Cleversafe Topics What is Reinforcement Learning? Exploration vs. Exploitation The Multi-armed Bandit Optimizing read locations

More information

Lecture 6. Register Allocation. I. Introduction. II. Abstraction and the Problem III. Algorithm

Lecture 6. Register Allocation. I. Introduction. II. Abstraction and the Problem III. Algorithm I. Introduction Lecture 6 Register Allocation II. Abstraction and the Problem III. Algorithm Reading: Chapter 8.8.4 Before next class: Chapter 10.1-10.2 CS243: Register Allocation 1 I. Motivation Problem

More information

Reading. Disjoint Union / Find. Union. Disjoint Union - Find. Cute Application. Find. Reading. CSE 326 Data Structures Lecture 14

Reading. Disjoint Union / Find. Union. Disjoint Union - Find. Cute Application. Find. Reading. CSE 326 Data Structures Lecture 14 Reading Disjoint Union / Find Reading Chapter 8 CE Data tructures Lecture Disjoint Union/Find - Lecture Disjoint Union - Find Maintain a set of pairwise disjoint sets {,,, {,,8, {9, {, Each set has a unique

More information

Securing The Reputation Management in WINNOWING P2P Scheme. Nawaf Almudhahka Matthew Locklear

Securing The Reputation Management in WINNOWING P2P Scheme. Nawaf Almudhahka Matthew Locklear Securing The Reputation Management in WINNOWING P2P Scheme Nawaf Almudhahka Matthew Locklear Agenda Overview Motivation Assumptions & Threat Model Approach Security Analysis of TVC Model Description Results

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

An Offline Foundation for Accountable Pseudonyms

An Offline Foundation for Accountable Pseudonyms An Offline Foundation for Accountable Pseudonyms Bryan Ford MIT CSAIL Jacob Strauss SocialNets April 1, 2008 Introduction Anonymity is a cherished principle Traditional: voting, peer review Online: email,

More information

CS261: A Second Course in Algorithms Lecture #14: Online Bipartite Matching

CS261: A Second Course in Algorithms Lecture #14: Online Bipartite Matching CS61: A Second Course in Algorithms Lecture #14: Online Bipartite Matching Tim Roughgarden February 18, 16 1 Online Bipartite Matching Our final lecture on online algorithms concerns the online bipartite

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

SYNERGY INSTITUTE OF ENGINEERING & TECHNOLOGY,DHENKANAL LECTURE NOTES ON DIGITAL ELECTRONICS CIRCUIT(SUBJECT CODE:PCEC4202)

SYNERGY INSTITUTE OF ENGINEERING & TECHNOLOGY,DHENKANAL LECTURE NOTES ON DIGITAL ELECTRONICS CIRCUIT(SUBJECT CODE:PCEC4202) Lecture No:5 Boolean Expressions and Definitions Boolean Algebra Boolean Algebra is used to analyze and simplify the digital (logic) circuits. It uses only the binary numbers i.e. 0 and 1. It is also called

More information

9.1 Cook-Levin Theorem

9.1 Cook-Levin Theorem CS787: Advanced Algorithms Scribe: Shijin Kong and David Malec Lecturer: Shuchi Chawla Topic: NP-Completeness, Approximation Algorithms Date: 10/1/2007 As we ve already seen in the preceding lecture, two

More information

Secure Multiparty Computation

Secure Multiparty Computation Secure Multiparty Computation Li Xiong CS573 Data Privacy and Security Outline Secure multiparty computation Problem and security definitions Basic cryptographic tools and general constructions Yao s Millionnare

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Lecture #11: Link Analysis 3 Seoul National University 1 In This Lecture WebSpam: definition and method of attacks TrustRank: how to combat WebSpam HITS algorithm: another algorithm

More information

Comp 310 Computer Systems and Organization

Comp 310 Computer Systems and Organization Comp 310 Computer Systems and Organization Lecture #9 Process Management (CPU Scheduling) 1 Prof. Joseph Vybihal Announcements Oct 16 Midterm exam (in class) In class review Oct 14 (½ class review) Ass#2

More information

Principles of Parallel Algorithm Design: Concurrency and Mapping

Principles of Parallel Algorithm Design: Concurrency and Mapping Principles of Parallel Algorithm Design: Concurrency and Mapping John Mellor-Crummey Department of Computer Science Rice University johnmc@rice.edu COMP 422/534 Lecture 3 17 January 2017 Last Thursday

More information

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Michiel Smid October 14, 2003 1 Introduction In these notes, we introduce a powerful technique for solving geometric problems.

More information