SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems

Similar documents
P2P Trust: An Efficient and Secure File Sharing Management in P2P Networks

An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System

An Efficient and Secured way of Routing in Hybrid WSN

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach

MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention*

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

Collusion Detection in Reputation Systems for Peer-to-Peer Networks

MobiT: A Distributed and Congestion- Resilient Trajectory Based Routing Algorithm for Vehicular Delay Tolerant Networks

BAR Gossip. Lorenzo Alvisi UT Austin

RIAL: Resource Intensity Aware Load Balancing in Clouds

Survey on Community Question Answering Systems

Problems in Reputation based Methods in P2P Networks

Selective Data Replication for Online Social Networks with Distributed Datacenters Guoxin Liu *, Haiying Shen *, Harrison Chandler *

The Design of A Distributed Rating Scheme for Peer-to-peer Systems

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005

SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks

OVERLAY INFRASTRUCTURE SUPPORT FOR INTERNET APPLICATIONS

GroupRep: A Robust Group-based Reputation System for Peer-to-Peer Networks

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen

Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu

A P2P-based Infrastructure for Adaptive Trustworthy and Efficient Communication in Wide-Area Distributed Systems

OVERLAY INFRASTRUCTURE SUPPORT FOR INTERNET APPLICATIONS

AutoTune: Game-based Adaptive Bitrate Streaming in P2P-Assisted Cloud-Based VoD Systems

An Efficient Holistic Data Distribution and Storage Solution for Online Social Networks

Countering Sparsity and Vulnerabilities in Reputation Systems

SURVEY OF DETECTION OF MALICIOUS NODES IN PEER TO PEER

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks

Peer-to-Peer Systems. Chapter General Characteristics

Incentive for P2P Fair Resource Sharing

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

Peer-to-peer systems and overlay networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

On-Demand Bandwidth Pricing for Congestion Control in Core Switches in Cloud Networks

Introduction and Statement of the Problem

A Design for Securing Data Delivery in Mesh-Based Peer-to-Peer Streaming

SOCIAL NETWORKING IN TODAY S BUSINESS WORLD

Cooperation in Mobile Ad Hoc Networks

DISTRIBUTED systems are vulnerable to sybil attacks [1],

Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems

Mapping Internet Sensors with Probe Response Attacks

Countering Hidden-Action Attacks on Networked Systems

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks

A Case For OneSwarm. Tom Anderson University of Washington.

CSE 486/586 Distributed Systems Peer-to-Peer Architectures

Bloom Filters. From this point on, I m going to refer to search queries as keys since that is the role they

AN ADAPTIVE P2P TOPOLOGY EVOLVEMENT MODEL BASED ON INTEREST SIMILARITY

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing

Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks

Thwarting Traceback Attack on Freenet

Consolidating Complementary VMs with Spatial/Temporalawareness

VShare: A Wireless Social Network Aided Vehicle Sharing System Using Hierarchical Cloud Architecture

RepTrap: A Novel Attack on Feedback-based Reputation Systems

Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness

Integrating Dirichlet Reputation into Usage Control

A reputation system for BitTorrent peer-to-peer filesharing

- Content Security in P2P

Accountability and Resource Management

SOT Model towards Peer to Peer System

AVMEM: Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems

Study of Trust Management Approaches in Peer to Peer System

NSFA: Nested Scale-Free Architecture for Scalable Publish/Subscribe over P2P Networks

IEEE/ACM TRANSACTIONS ON NETWORKING 1

Reputation Management in P2P Systems

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

Accountability and Resource Management

A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks

An Economical and SLO- Guaranteed Cloud Storage Service across Multiple Cloud Service Providers Guoxin Liu and Haiying Shen

Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Mapping Internet Sensors with Probe Response Attacks

Functionality, Challenges and Architecture of Social Networks

Do incentives build robustness in BitTorrent?

GreedyFlow: Distributed Greedy Packet Routing between Landmarks in DTNs

Limited Reputation Sharing in P2P Systems

Maximum Security with Minimum Impact : Going Beyond Next Gen

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

Presented by Yung-Ting Chuang

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

CloudFog: Leveraging Fog to Extend Cloud Gaming for Thin-Client MMOG with High Quality of Service

In Search of Homo Swappus : Evolution of Cooperation in Peer-to-Peer Systems

PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing *

Robust Incentives via Multi-level Tit-for-tat

Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks

Cumulative Reputation Systems for Peer-to-Peer Content Distribution

An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity. Chen Wang, Student Member, IEEE, and Li Xiao, Member, IEEE

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Kaspersky Security Network

Evaluating Unstructured Peer-to-Peer Lookup Overlays

UNIVERSITY OF CALGARY. Fighting Pollution Attacks in P2P Streaming. Md. Tauhiduzzaman A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES

The Eight Rules of Security

Friends and Foes: Preventing Selfishness in Open Mobile Ad Hoc Networks

Mechanisms of Multiparty Access Control in Online Social Network

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

IEEE/ACM TRANSACTIONS ON NETWORKING 1. DTN-FLOW: Inter-Landmark Data Flow for High-Throughput Routing in DTNs

Enforcing collaboration in a collaborative content distribution network

Sender Reputation Filtering

Transcription:

SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems Kang Chen 1, Guoxin Liu 2, Haiying Shen 2 and Fang Qi 2 1 Dept. Of ECE Southern Illinois Univ. (The work was done when at Clemson) 2 Dept. of ECE, Clemson Univ.

Outline Introduction Related Work System Design Performance Evaluation Conclusion

P2P file sharing systems Introduction Better exploit available file & bandwidth resources But are prone to have free-ridders and malware distribution In one test 85% of Gnutella users are selfish 44% of files downloaded through Kazaa contained malicious code

Introduction Reputation systems are invented Record behaviors for reputation evaluation Judge good or bad based on a threshold Are good but still suffer from attacks Free-ridding: maintain reputation slightly above the threshold White-washing: creating new accounts Collusion: maliciously manipulate the reputation systems I am good! I am good too! I am better!

Introduction Emerging social networks can help Friendship fosters collaboration Friendship discourages malicious behaviors Online social networks reflect friendships in the offline world

Introduction Social networks have limitations Not originally designed for file sharing Friendship is arbitrary in certain social networks Limited coverage, which means limited file resources Solution Combine a social network and reputation system Social network helps identify reliable servers Reputation system extends the coverage of social networks

Related Work Reputation management system [WWW 06, TKDE 08 10, TPDS 07 10] Evaluate peer reputations based on feedbacks Can be both centralized or distributed Vulnerable to aforementioned attacks Social network based P2P file sharing [PerCom 08, CoRR 11, ICNP 12,IPDPS 09] Construct a social network based overlay for file sharing Rely on social relationships to deduce trust Suffer from limited coverage of social networks

Outline Introduction Related Work System Design Performance Evaluation Conclusion

System Design Main components Social Network Construction Online connections: reliable file sharing experiences Offline connections: offline acquaintances Weighted Transaction Network Built based upon file sharing transactions Extend server selection to non-friends Server Selection and File Sharing Exploits both social network and weighted transaction network

System Design Social network construction Offline acquaintances are added directly as friends Online friends Each node sets a threshold for trust Only two nodes reach the threshold of each other Bi-directional User behavior: be cautious on adding/deleting a friend

System Design Social network based file sharing Query the P2P service center for server candidates Check whether there are friends in the server list If yes, select the friend as the server directly If multiple, select the one with the highest trust If none, rely on weighted transaction network

System Design Weighted transaction network Create links to connect non-friends for trust evaluation Each link has a direction Two nodes may not have the same trust to each other Each link has a weight (file size) Accumulated based on previous file sharing transactions Denotes the client s trust of obtaining a file from the source Ensures fair file sharing

System Design Weighted transaction network

System Design Weighted transaction network Trust of a path: smallest link weight The weakest link limits the overall trust on the path Trust-flow The largest path weight of all paths from the server to the client Denotes the file size the client can reliably download from the server, i.e., its trust to the server Upload-flow The largest path weight of all paths from the client to the server Reflects the past transaction from the client to the server For fair trading consideration

System Design Weighted transaction network based file sharing Query the P2P service center for server candidates For each server, calculate the trust-flow and upload-flow Filter servers Trust-flow < size of the requested file: not trustable enough Trust-flow upload-flow > Thr: not fair sharing Select the server with the largest trust-flow after above steps

System Design Weighted transaction network based file sharing a) C1 asks a file owned by B2 with size 4 b) Trust-flow from B2 to C1 is 6 through B2->B->A->C->C1 c) Upload-flow from C1 to B2 is 2 through C1->C->A->B->B2 d) Since trust-flow - upload-flow = 4 (suppose the threshold here is 8) and trust-flow > 4, the transaction is approved and B2 will be selected

System Design Weighted transaction network update Updated after a file sharing transaction between non-friends If there is no link, create a new link Positive feedback The weights of all links on the trust path from the server to the client is added by the size of the shared file Negative feedback The weights of all links on the trust path from the server to the client is reduced by the size of the shared file Neural or no feedback Nothing changes

System Design Summary Social network Represents trust among friends Considers both online and offline relationships Used directly when available Weighted transaction network Represents the trust among non-friends Updated based on transactions Complements the social network by expanding server candidates to non-friends

Attack Resistance Free-riding: When a node is reluctant to contribute to others, other non-friends are not willing to provide files to it too Whitewashing: A link is created only after a successful transaction without links, whitewashers will not be selected by nonfriends as servers and cannot download files from others Collusion Though colluding nodes have high-weight links connecting each other, the weights of their links to outside nodes are very low or even 0

Outline Introduction Related Work System Design Performance Evaluation Conclusion

Simulation Performance Evaluation 10% bad nodes, 20% neutral nodes, and 70% good nodes One round: each node randomly generates a file request Social network LiveJournal[1] trace with 5,000 nodes Comparison methods SocialTrust [2]: first rely on social network, and then use reputation system to facilitate the server selection process Social: relies only on social relationships within 2 hops for file sharing 21 [1] L. Backstrom, D. Huttenlocher, J. Kleinberg and X. Lan, Group formation in large social networks: membership, growth, and evolution, in Proc. of KDD, 2006. [2] K. Chen, H. Shen, K. Sapra, and G. Liu, A social network integrated reputation system for cooperative P2P file sharing, IEEE TPDS, 2015

Detecting Suspicious Transactions SocialLink-B: A version of SocialLink in which the central trust center can block suspicious transactions # false negative decreases fast to a very small number # of malicious transactions decreases quickly due to timely block from SocialLink-B 22

Preventing Free-riding 20% of 5,000 nodes are free-riders in the system that have 50% probability to reject file requests SocialLink-R: A version of SocialLink in which the central trust center always selects the server with the highest reputation SocialLink leads to the least free-riders downloads due to the fairness consideration in server selection 23

Resisting White-washing 50% of malicious nodes whitewash SocialLink leads to the least number of selected bad servers since white-washers have no links to non-friends and can hardly be selected as servers 24

Resisting Collusion Each bad node conducts 100 transactions with randomly selected colluders SocialLink generates the smallest number of transactions with bad nodes as servers 25

SocialLink Conclusions A reputation system for P2P file sharing Combines both social network and transaction link The social network exploits the trust from social relationships The weighted transaction network exploits the trust accumulated from file sharing among non-friends Future work Improve the weighted transaction network through in-depth modeling and analysis 26

27 Thank you! Questions & Comments? Haiying Shen shenh@clemson.edu Pervasive Communication Lab Clemson University