Reputation Management in P2P Systems

Similar documents
Distributed Data-Intensive Systems

Identity Crisis: Anonymity vs. Reputation in P2P Systems

Limited Reputation Sharing in P2P Systems

Problems in Reputation based Methods in P2P Networks

Introduction to Peer-to-Peer Systems

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Reliable and Resilient Trust Management in Distributed Service Provision Networks

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

Cumulative Reputation Systems for Peer-to-Peer Content Distribution

DHT Routing Using Social Links

New Metrics for Reputation Management in P2P Networks

Peer-to-peer systems and overlay networks

IJITKM Special Issue (ICFTEM-2014) May 2014 pp (ISSN )

Peer-to-Peer (P2P) networks have emerged as a popular

hirep: Hierarchical Reputation Management for Peer-to-Peer Systems

AN ADAPTIVE P2P TOPOLOGY EVOLVEMENT MODEL BASED ON INTEREST SIMILARITY

Peer to Peer Networks

The Design of A Distributed Rating Scheme for Peer-to-peer Systems

SPROUT: P2P Routing with Social Networks

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

A Priori Trust Vulnerabilities in EigenTrust

CS 347 Parallel and Distributed Data Processing

Content Overlays. Nick Feamster CS 7260 March 12, 2007

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

Peer-peer and Application-level Networking. CS 218 Fall 2003

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

PSH: A Private and Shared History-based Incentive Mechanism

Scalable overlay Networks

Impact of Feedback on Trust in P2P Networks

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p?

: Scalable Lookup

Addressing the Non-Cooperation Problem in Competitive P2P Systems

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme

Peer-to-Peer Networks

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

Analytical Evaluation of P2P Reputation Systems

Telematics Chapter 9: Peer-to-Peer Networks

A Survey on Peer-to-Peer File Systems

A Security Analysis of a P2P Incentive Mechanism for Mobile Devices

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p?

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

PSH: A Private and Shared History-Based Incentive Mechanism

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

Peer to Peer Networks

Ian Clarke Oskar Sandberg

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

A Case For OneSwarm. Tom Anderson University of Washington.

Nash Equilibrium Load Balancing

PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing *

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Reputation-Based Trust Management for P2P Networks

Preventing (Network) Time Travel with Chronos. Omer Deutsch, Neta Rozen Schiff, Danny Dolev, Michael Schapira

Accountability and Resource Management

An Offline Foundation for Accountable Pseudonyms

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation

CSE 486/586 Distributed Systems Peer-to-Peer Architectures

Keywords: Peer-to-Peer Networks; Free Riding; Connection Management; Distributed Systems

DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM

Peer-to-Peer Systems and Distributed Hash Tables

Certificate reputation. Dorottya Papp

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?

Preventing (Network) Time Travel with Chronos. Omer Deutsch, Neta Rozen Schiff, Danny Dolev, Michael Schapira

Peer-to-Peer Systems. Chapter General Characteristics

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

DHT Overview. P2P: Advanced Topics Filesystems over DHTs and P2P research. How to build applications over DHTS. What we would like to have..

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?

P2PNS: A Secure Distributed Name Service for P2PSIP

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Scalable overlay Networks

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

P2P Contents Distribution System with Routing and Trust Management

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2

EE 122: Peer-to-Peer Networks

Evaluating the Wisdom of Crowds in Assessing Phishing Sites

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

Accountability and Resource Management

Robust Incentives via Multi-level Tit-for-tat

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006

In Search of Homo Swappus : Evolution of Cooperation in Peer-to-Peer Systems

Design Space Analysis for Modeling Incentives in Distributed Systems

Collusion Detection in Reputation Systems for Peer-to-Peer Networks

Naming in Distributed Systems

Wireless Network Security Spring 2016

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables

Overlay and P2P Networks. Unstructured networks: Freenet. Dr. Samu Varjonen

Distributed Knowledge Organization and Peer-to-Peer Networks

Early Measurements of a Cluster-based Architecture for P2P Systems

Indian Journal of Science and Technology Vol. 5 No. 7 (July 2012) ISSN:

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Peer-to-Peer Applications Reading: 9.4

P2P Trust: An Efficient and Secure File Sharing Management in P2P Networks

PEER-TO-PEER NETWORKS, DHTS, AND CHORD

Information Retrieval in Peer to Peer Systems. Sharif University of Technology. Fall Dr Hassan Abolhassani. Author: Seyyed Mohsen Jamali

Peer to Peer I II 1 CS 138. Copyright 2015 Thomas W. Doeppner, Rodrigo Fonseca. All rights reserved.

Transcription:

Reputation Management in P2P Systems Pradipta Mitra Nov 18, 2003 1

We will look at... Overview of P2P Systems Problems in P2P Systems Reputation Management Limited Reputation Sharing Simulation Results Global Reputation Sharing 2

P2P Systems Individual Computers connected in a overlay network Objective: Resource(File) Sharing Popularity of P2P is increasing Examples: Gnutella, Chord, CAN, Freenet A Peer A P2P System 3

P2P Systems(Continued) Autonomy Anonymity Decentralization Openness These attractive features are the very root of its problems! 4

Problems in P2P Systems Free Riding!...almost 70% of Gnutella users share no files, and nearly 50% of all responses are returned by the top 1% of sharing hosts [Study by Abar and Huberman (2000)] Uploading at slow rates A recent product, Bit Torrent claims to solve this problem. On average, the faster you upload to your peers, the faster you will be able to download. [http://bt.etree.org/] 5

But Selfishness is not the big problem The BIG PROBLEM is Maliciousness!... peers that volunteer to share files are not necessarily those who have desirable ones.... [this]adds vulnerability to the system. [Study by Abar and Huberman (2000)] There might be nodes in the system who don't want to access other people files, rather only are interested in propagating there own invalid files. 6

Maliciousness introduces two problems: Document Authenticity Problem: We shall not handle this! Detecting Malicious peers: Creation of a Reputation System. Design Considerations Self-policing Anonymity Maintaining Minimal Overhead Robust to Collectives 7

The System Model When a node queries the system for a file, it collects all replies in a response set. The node repeatedly selects responses from the set, fetches the file and verifies it until an authentic copy is found. A system without reputation management will select peers randomly. The goal is to create reputation for nodes so that the number of inauthentic files downloaded is minimized. 8

The Threat Model 1.Individual Malicious peers who are somewhat stupid: They always provide an inauthentic file when selected as a download source. 2.Malicious Collectives: Similar as (1) but provides high reputation values for each other and low for all others. 3.Malicious Collectives with Camouflage: Provides inauthentic files in f% of cases that it is selected. 4.Malicious Spies: Themselves provide good files but try to increase the reputation of other malicious peers. 9

5.Good nodes unknowingly providing bad files. Three Approaches Global Reputation System: Ask Everyone. Limited Reputation Sharing System Local Reputation System: Self-Help is the Best Help. Voting Reputation System: Ask for opinions of some other peers. 10

Local Reputation Systems Reasons for Considering Local Reputation: Calculating a consistent global reputation is costly. Each node maintains a statistics on how many files it has verified from each peer and how many of those were authentic. Each peer's reputation rating is calculated as the fraction of verified files which were authentic. This results in a rating ranging from 0 to 1. 11

Select-best Weighted Doesn't distinguish between bad nodes and nodes with which it hasn't interacted. Two methods of choosing from a response set: Selection Procedure: Has the problem of overloading the best nodes. Selection procedure: Select a peer probabilistically. The probability of choosing a peer will be proportional to its reputation. Simulations show that the weighted method distributes load better without degrading efficiency much. 12

13

Friend-Cache in Local Reputation Systems In Select-best method a node maintains an ordered list of most reputable nodes it knows. This list is known as the friend-cache and has a maximum size FC The Friend-First technique uses the 14

Friend-Cache by querying the friends first before querying the network in the usual fashion. Reduces the message traffic by upto 85%. 15

Voting Reputation Systems Extends local reputation systems by considering opinions of other peers in the selection stage. When a node q has received a set of responses to a query, it contacts a set of nodes Q, for their opinions of the responders. The final rating for each responder p r is calculated by: p r = (1-w Q )R(q,r)+ w Q ( v QR(q,v)R(v,r))/ v QR(q,v) R(a,b): node a's opinion of b. For each voter, the opninion of the voter is weighted by the reputation of 16

that voter. The final rating is a combination of local experience and peer responses. These two values are combined using the quorumweight w Q. When w Q = 0, the voting reputation system becomes the local reputation system. The select-best procedure and the weighted procedure apply to voting reputation systems as well. 17

How to Select Voters? Neighbor-voting: Asking opninions from ones neighbors in the overlay network. Number and Identity of voters remain relatively constant. Friend-voting: Ask peers from whom one has fetched files and who have proven to be reputable. The friendcache can be used. Before discussing simulation results, there is one big issue to resolve. What else but... 18

IDENTITY! Anonymity allows for various attacks on a P2P system: Sybil attack: Automatically creating indentities. Solvable using captcha. Whitewashing: Malicious peers change their identities when their reputation goes down. The second problem can be tackled by two different approaches: Centralized Login Server: Real world identity tied to one unique system ID. 19

Makes Changing Identities difficult (if not impossible) However, contrary to the spirit of P2P. Assigning new nodes low reputation ranking: This eliminates the incentives of changing identities. However, again somewhat contrary to the spirit of P2P. Unfortunately, if we allow users to change identity... No strategy... can do substantially better than punishing all newcomers. [Friedman and Resnick, 2000] 20

No definitive solution found so far. Reserachers have proposed Initial reputation p 0 = 0. Simulation Results for Limited Reputation Sharing Metrics Verification Ratio, r v = ( i V i )/q succ i V i is number of file verifications done over all nodes q succ is the number of successful queries. 21

Relative Message Traffic MT rel =Nfriend/Nflood Nfriend: No of FF Messages Nflood:No of Flooding Messages Parameters n = 1000 d max = 50 d avg = 3 Connectivity follows Power-law distribution Number of copies of each file is also a Zipf distribution 22

For whitewashing p 0 = 0 Otherwise p 0 = 0.3 (Default) fraction of malicious nodes, π B = 0.3 23

24

25

Global Reputation Systems Can be seen as an extension of the Voting Reputation System (where everyone votes) Clearly would have better performance, but large overhead The Eigentrust Algorithm c ij =normalized local trust value t ik = j c ij c jk t i =C T c i for some n, (C T ) n c i will converge for all i. The Eigentrust Algorithm(Contd.) If we had centralized server, it could 26

calculate the global trust values for us. Instead, we use distributed hash tables. Depends on the sparsity of the matrix for fast convergence. This makes Eigentrust usable only with complex P2P systems such as CAN and Chord. Still requires much more communication overhead than limited reputation systems. However, gives good performance where π B = 0.7! 27

Challenges and Conclusion 28

Handling Peers who are selfish in that they always choose select-best procedure. Devising global reputation system that works without using DHTs. Good nodes may inadvertently share invalid files. Allowing nodes to assign a confidence value to the files may be a useful. Examining the effect of weighting individual transactions in some way. Examining how long it takes for new 29

nodes to build up a reputation in self managed ID systems. Having partial authenticity instead of binary authenticity. Study so far is quite intuitive, specially the limited reputation schemes. Work done so far depends mostly on simulation results to prove their claims. Providing a theoretical framework is a big challenge. References: 1. Kamvar, Sepandar D., Schlosser, Mario T., Garcia-Molina, Hector.: The EigenTrust Algorithm for Reputation Management in P2P Networks 2. Marti, Sergio; Garcia-Molina, Hector: Limited Reputation Sharing in P2P Systems 3. Marti, Sergio; Garcia-Molina, Hector: Identity Crisis: Anonymity vs. Reputation in P2P Systems 30