CPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University

Similar documents
Recommendation/Reputation. Ennan Zhai

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

Differential Privacy

Review Session. Ennan Zhai

UseNet and Gossip Protocol

Cryptographic Systems

DSybil: Optimal Sybil-Resistance for Recommendation Systems

Securing The Reputation Management in WINNOWING P2P Scheme. Nawaf Almudhahka Matthew Locklear

Cumulative Reputation Systems for Peer-to-Peer Content Distribution

Reputation Management in P2P Systems

Content Search. Unstructured P2P

hirep: Hierarchical Reputation Management for Peer-to-Peer Systems

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 2 ARCHITECTURES

ENEE 457: E-Cash and Bitcoin

Replications and Consensus

Distributed Data-Intensive Systems

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Peer-to-Peer Networks

Peer-to-peer systems and overlay networks

Cryptography. Lecture 03

Problems in Reputation based Methods in P2P Networks

Sybil defenses via social networks

CPSC 536N: Randomized Algorithms Term 2. Lecture 4

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Aiding the Detection of Fake Accounts in Large Scale Social Online Services

Unit 8 Peer-to-Peer Networking

Telecommunication Services Engineering Lab. Roch H. Glitho

SOFIA: Social Filtering for Niche Markets

Content Search. Unstructured P2P. Jukka K. Nurminen

Chapter 2 ARCHITECTURES

Defining Encryption. Lecture 2. Simulation & Indistinguishability

Collusion Detection in Reputation Systems for Peer-to-Peer Networks

A reputation system for BitTorrent peer-to-peer filesharing

Today. Architectural Styles

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Overview. Background: Sybil Attack. Background: Defending Against Sybil Attack. Social Networks. Multiplayer Games. Class Feedback Discussion

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

CSCI-1680 P2P Rodrigo Fonseca

Introduction to Peer-to-Peer Systems

SybilGuard: Defending Against Sybil Attacks via Social Networks

P2PNS: A Secure Distributed Name Service for P2PSIP

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses

Security protocols and their verification. Mark Ryan University of Birmingham

ICT 6544 Distributed Systems Lecture 2: ARCHITECTURES

Peer-to-Peer Internet Applications: A Review

Reading Time: A Method for Improving the Ranking Scores of Web Pages

Peer-to-Peer (P2P) networks have emerged as a popular

Today. Architectural Styles

arxiv: v1 [cs.cr] 30 May 2014

Peer-to-Peer Systems and Security

SybilGuard: Defending Against Sybil Attacks via Social Networks

Proving the Impossible with Alibi Protocols

DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM

Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks

Net Trust: User-Centered Detection of Pharming, Phishing and Fraud. L Jean Camp

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

CPSC 467: Cryptography and Computer Security

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

Content Overlays. Nick Feamster CS 7260 March 12, 2007

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

Discrete Mathematics and Probability Theory Fall 2013 Midterm #2

Making P2P Downloading Dependable by Exploiting Social Networks

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?

Lecture 3. Introduction to Cryptocurrencies

Lecture 7 - Applied Cryptography

Computer Security module

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

DDoS Vulnerability of BitTorrent Peer Exchange Extension: Analysis and Defense

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

Latest Peer-to-Peer Technologies II Artjom Lind 1

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

- Content Security in P2P

Link Analysis and Web Search

SYBIL attacks [1] refer to individual malicious users creating

EE 122: Peer-to-Peer Networks

In Search of Homo Swappus : Evolution of Cooperation in Peer-to-Peer Systems

COMP6237 Data Mining Making Recommendations. Jonathon Hare

Sybil-Resilient Online Content Rating

Overlay and P2P Networks. Introduction. Prof. Sasu Tarkoma

Failures in Distributed Systems

Reputation-Based Trust Management for P2P Networks

Lightweight Signatures for (A Defense Against Phishing)

Scalable overlay Networks

An Offline Foundation for Accountable Pseudonyms

Distributed Information Processing

Study Guide for the Final Exam

Brief (non-technical) history

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

IJITKM Special Issue (ICFTEM-2014) May 2014 pp (ISSN )

Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

Transcription:

CPSC 426/526 Reputation Systems Ennan Zhai Computer Science Department Yale University

Recall: Lec-4 P2P search models: - How Chord works - Provable guarantees in Chord - Other DHTs, e.g., CAN and Pastry - Comparison between structured and unstructured P2P models red P2P network (Gnutella, KaZaA, etc.)tructured P2P network (Chord, CAN, Pastry, etc.) - More (Hybrid P2P, BitTorrent, etc.)

Lecture Roadmap Background Reputation Systems Case Study: Credence

Background foo A

Background NO Name Ava/Source 1 Foo1 70/78 2 foo1 60/66 foo A 3 foo 11/40 4 Foo-4 2/3 5......

Background NO Name Ava/Source Polluted { 1 Foo1 70/78 2 foo1 60/66 3 foo 11/40 4 Foo-4 2/3 5......

Pollution Attacks There are many ways to pollute files: - Corrupting the majority content of the files - Corrupting the block downloading at 99%

Pollution Attacks There are many ways to pollute files: - Corrupting the majority content of the files - Corrupting the block downloading at 99% I spent 3 hours on downloading this file, but this file is not what I want...

Pollution Attacks There are many ways to pollute files: - Corrupting the majority content of the files - Corrupting the block downloading at 99%

100,000 polluted files Background NO Name Ava/Source 100 files foo A 1 Foo1 70/78 2 foo1 60/66 3 foo 11/40 4 Foo-4 2/3 5......

100 files 100,000 polluted files foo Background NO Name Ava/Source 1 Foo1 70/78 It is high possible for customers to 2 foo1 60/66 search bad files! 3 foo 11/40 A 4 Foo-4 2/3 5......

Background Why there are so many pollution attacks: - Publishers (e.g., music companies) want copyright - Employ many programmers to launch these attacks red P2P network (Gnutella, KaZaA, etc.) The majority of content is polluted: - The service quality of P2P content sharing became low - Users gave up P2P content sharing systemsp2p network (Chord, CAN, Pastry, etc.) - More (Hybrid P2P, BitTorrent, etc.)

Lecture Roadmap Background Reputation Systems Case Study: Credence

Reputation Systems

Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems

Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems

How a reputation system works? Messages Author (Score) Votes........................

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) 0..................

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) 0..................

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) 0..................

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) 0.................. Bob Eve Dave

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) 0.................. Bob Eve Dave

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (0) Like: 3.................. Bob Eve Dave

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3.................. Vi=1+1+1=3 Bob Eve Dave

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0............

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (1) 0......

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (1) 0...... Alice Dave

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (1) Dislike: 2...... Alice Dave

How a reputation system works? Messages Author (Score) Votes I like Yale Alice (3) Like: 3 Don t play with AlphaGo Alice (3) 0 I hate C++ Bob (-1) Dislike: 2...... Vi=1-1-1=-1 Alice Dave

Examples

Global Reputation System Every entity has only one reputation score red P2P network (Gnutella, KaZaA, etc.) PageRank is a global peer-based trust model - Who plays the peer role in this context? - What are the historical activities of peers in this context?

PageRank [WWW 98] A B C

PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)=0.1+0.7xPR(C) PR(B)=0.1+0.7xPR(A) PR(C)=0.1+0.7xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)=0.1+0.7xPR(C) PR(B)=0.1+0.7xPR(A) PR(C)=0.1+0.7xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

PageRank [WWW 98] B A C The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) # of outgoing links PR(A)=0.1+0.7xPR(C) PR(B)=0.1+0.7xPR(A) PR(C)=0.1+0.7xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)=0.1+0.7xPR(C) PR(B)=0.1+0.7xPR(A) PR(C)=0.1+0.7xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

PageRank [WWW 98] A The number of web pages N = 3 The damping parameter d = 0.7 PR(A)=(1-d)x(1/N)+dx(PR(C)/a) PR(B)=(1-d)x(1/N)+dx(PR(A)/b) PR(C)=(1-d)x(1/N)+dx(PR(B)/c) B C PR(A)=0.1+0.7xPR(C) PR(B)=0.1+0.7xPR(A) PR(C)=0.1+0.7xPR(B) By solving the linear equations: PR(A)=PR(B)=PR(C)=0.33

PageRank [WWW 98] A A B C B C What are PageRanks? What s the problem in this example?

Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems

Reputation Systems What is a reputation system: - Rating users or objects based on historical activities - Like credit cards - Assumption: high reputation users publish good content red P2P network (Gnutella, KaZaA, etc.) Types of reputation systems: - Global reputation model, e.g., PageRank - Personalized reputation model, e.g., EigenTrust and Credence Global reputation model is mainly used in centralized systems Personalized reputation is mainly used in P2P systems

Personalized Reputation Model We focus on personalized reputation model Used in P2P content sharing systems Three different types: - Peer-based reputation systems, e.g., EigenTrust [WWW 03] - Object-based reputation systems, e.g., Credence [NSDI 06] - Hybrid reputation systems, e.g., Scrubber [P2P 07] Request Decentralized file-sharing system Alice

EigenTrust [WWW 03] EigenTrsut is the first peer-based reputation system: - Similar to PageRank - Each peer is assigned a personalized reputation score - Assumption: Good peer does not publish polluted files Problems: - Relying on recommenders - Cannot offer fine-grained reputation to each object - Difficult to decide parameters in practice

Lecture Roadmap Background Reputation Systems Case Study: Credence

Credence [NSDI 06] Credence is the first object-based reputation system: - In Alice s view, each object is assigned a reputation score - Defending against malicious recommenders - Fine-grained reputation for each object

Credence [NSDI 06] Files Providers Voters F10 P2, P6 P4 (+1), P6 (-1) F22 P2, P6, P8 P2 (-1), P7 (-1) F4 P2, P4 P2(+1), P4(-1), P7(-1) Alice F6 P11, P13, P14 P11(+1)..................

Computing each file s reputation Files Providers Voters F10 P2, P6 P4 (+1), P6 (-1) F22 P2, P6, P8 P2 (-1), P7 (-1) F4 P2, P4 P2(+1), P4(-1), P7(-1) Alice F6 P11, P13, P14 P11(+1)..................

A file s reputation For Alice, the reputation score of each object is computed by weighted average of voters similarities. n Rep(F) = V i θ( Alice,Voter_i ) i=1 n θ( Alice,Voter_i ) i=1 [ -1, 1 ]

A file s reputation For Alice, the reputation score of each object is computed by weighted average of voters similarities. n The vote cast by voter i on F (+1 or -1) Rep(F) = V i θ( Alice,Voter_i ) i=1 n θ( Alice,Voter_i ) i=1 [ -1, 1 ]

A file s reputation For Alice, the reputation score of each object is computed by weighted average of voters similarities. n The vote cast by voter i on F (+1 or -1) Rep(F) = V i θ( Alice,Voter_i ) i=1 n θ( Alice,Voter_i ) i=1 [ -1, 1 ] The similarity between Alice and voter i The range is [-1, +1].

How to compute similarity Sim = (p-ab) a(1-a)b(1-b) For the overlapping voting set (e.g., S) between Alice and C i : - a is # of positive votes cased by Alice on the files in S divided by # of all the votes casted by Alice on the files in S - b is # of positive votes casted by C i on the files in S divided by # of all the votes casted by C i on the files in S - p is # of positive votes casted by both Alice and C i on the files in S divided by # of all the votes agreed by both Alice and C i on the files in S

How to compute similarity Sim = (p-ab) a(1-a)b(1-b) Simplify it! Sim(A, B) = # of the same votes on S S where S is the set consisting of overlapping files voted by both A and B

Example B: +1 C: -1 D: +1 File1 A: +1 B: +1 C: -1 File2 A: -1 B: -1 File3 A: -1 C: +1 D: -1 File4 A C: +1 D: -1 File5 A: +1 D: -1 File6 C: +1 G: -1 File7

Practical Issues There are several practical issues in Credence: - Cold start - Lack of enough overlapping voting history

Solution: Flow-based Reputation I want to compute similarity with C, but I do not have direct similarity with C A C 0.8 0.9 B

Solution: Flow-based Reputation I want to compute similarity with C, but I do not have direct similarity with C 0.8 * 0.9 = 0.72 A C 0.8 0.9 B

Credence [NSDI 06] Files Providers Voters F10 P2, P6 P2, P4, P6 F22 P2, P6, P8 P2, P7 F4 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P11..................

Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22 P2, P6, P8 P2, P7 F4 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P11..................

Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P11..................

Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4=0.9 P2, P4 P2, P4, P7 Alice F6 P11, P13, P14 P11..................

Credence [NSDI 06] Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4=0.9 P2, P4 P2, P4, P7 Alice F6=0.6 P11, P13, P14 P11..................

Credence [NSDI 06] Pick the highest reputation file Files Providers Voters F10=0.8 P2, P6 P2, P4, P6 F22=0.5 P2, P6, P8 P2, P7 F4=0.9 P2, P4 P2, P4, P7 Alice F6=0.6 P11, P13, P14 P11..................

Discussion: Does it work? Credence works under assumptions: - Malicious nodes publish many polluted files - Malicious users cast misleading votes - # of malicious users should not be higher than 1/2, say 20% - There is no large-scale sybil attack in the setting

Next Lecture In the lec-6, I will cover: - What is sybil attack - How to defend against sybil attacks - Case studies: SybilGuard and DSybil