Cumulative Reputation Systems for Peer-to-Peer Content Distribution

Similar documents
Reputation Management in P2P Systems

NSFA: Nested Scale-Free Architecture for Scalable Publish/Subscribe over P2P Networks

Making Gnutella-like P2P Systems Scalable

Introduction to Peer-to-Peer Systems

Peer-to-peer systems and overlay networks

Recommendation/Reputation. Ennan Zhai

978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 5, OCTOBER 2006

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

On-Demand Bandwidth Pricing for Congestion Control in Core Switches in Cloud Networks

Optimizing Random Walk Search Algorithms in P2P Networks

CPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University

- Content Security in P2P

MP-DSM: A Distributed Cross Layer Network Control Protocol

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science

Accountability and Resource Management

PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing *

Peer-to-Peer Networks

Incentive for P2P Fair Resource Sharing

Securing The Reputation Management in WINNOWING P2P Scheme. Nawaf Almudhahka Matthew Locklear

Introduction to Cryptoeconomics

Over-contribution in discretionary databases

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers

P2P Trust: An Efficient and Secure File Sharing Management in P2P Networks

Nash Equilibrium Load Balancing

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

Clustering. Robert M. Haralick. Computer Science, Graduate Center City University of New York

CS 268: Computer Networking

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

CS551 Router Queue Management

CSCI 5454, CU Boulder Samriti Kanwar Lecture April 2013

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

A Mathematical Proof. Zero Knowledge Protocols. Interactive Proof System. Other Kinds of Proofs. When referring to a proof in logic we usually mean:

Zero Knowledge Protocols. c Eli Biham - May 3, Zero Knowledge Protocols (16)

Hierarchical Trust Management of Community of Interest Groups in Mobile Ad Hoc Networks

Assignment 5. Georgia Koloniari

SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems

COALITION FORMATION IN P2P FILE SHARING SYSTEMS

Characterizing Improving Directions Unconstrained Optimization

OVERLAY INFRASTRUCTURE SUPPORT FOR INTERNET APPLICATIONS

Peer-to-Peer Applications Reading: 9.4

Telematics Chapter 9: Peer-to-Peer Networks

Peer-to-Peer Streaming Systems. Behzad Akbari

Determining Optimal Update Period for Minimizing Inconsistency in Multi-server Distributed Virtual Environments

A connection management protocol for promoting cooperation in Peer-to-Peer networks q

Accountability and Resource Management

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

Blockchain (de)constructed

Sharding. Making blockchains scalable, decentralized and secure.

Countering Hidden-Action Attacks on Networked Systems

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Performance Analysis and Improvement for BitTorrent-like File Sharing Systems

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Congestion Control In the Network

A Survey of Peer-to-Peer Content Distribution Technologies

Game Theory. Presented by Hakim Weatherspoon

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Handling Churn in a DHT

Trust Management for SOA-based IoT and Its Application to Service Composition

An Incentive Mechanism for P2P Networks

CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS

A Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology

Research Article Globally Decoupled Reputations for Large Distributed Networks

Integrating Dirichlet Reputation into Usage Control

Chapter 2: Application layer

Peer-to-Peer Internet Applications: A Review

arxiv: v3 [cs.ni] 3 May 2017

Lecture 19 Subgradient Methods. November 5, 2008

A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks

T-Chain: A General Incentive Scheme for Cooperative Computing

End-to-end bandwidth guarantees through fair local spectrum share in wireless ad hoc networks

EE 122: Peer-to-Peer Networks

Scheduling Strategies for Processing Continuous Queries Over Streams

A PARAMETRIC SIMPLEX METHOD FOR OPTIMIZING A LINEAR FUNCTION OVER THE EFFICIENT SET OF A BICRITERIA LINEAR PROBLEM. 1.

Cooperation Enforcement and Learning for Optimizing Packet Forwarding in Autonomous Wireless Networks

Unit 2 Packet Switching Networks - II

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

OVERLAY INFRASTRUCTURE SUPPORT FOR INTERNET APPLICATIONS

Using Reinforcement Learning to Optimize Storage Decisions Ravi Khadiwala Cleversafe

Distributed Systems. Characteristics of Distributed Systems. Lecture Notes 1 Basic Concepts. Operating Systems. Anand Tripathi

Distributed Systems. Characteristics of Distributed Systems. Characteristics of Distributed Systems. Goals in Distributed System Designs

{vsiris,athanas}j(ics.forth.gr

Distributed Knowledge Organization and Peer-to-Peer Networks

Secure Multiparty Computation: Introduction. Ran Cohen (Tel Aviv University)

An economic perspective of message-dropping attacks in peer-to-peer overlays

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability

WebPeer: A P2P-based System for

An Agent-based Model for the Evolution of the Internet Ecosystem

Directional Sensor Control for Maximizing Information Gain

Challenges in Ubiquitous Data Mining

A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

CMSC 332 Computer Networks P2P and Sockets

MATH3016: OPTIMIZATION

A BGP-Based Mechanism for Lowest-Cost Routing

Samsara: Honor Among Thieves in Peer-to-Peer Storage

Distributed Information Processing

Benefit-based Data Caching in Ad Hoc Networks

Transcription:

Cumulative Reputation Systems for Peer-to-Peer Content Distribution B. Mortazavi and G. Kesidis Pennsylvania State University also with Verizon Wireless CISS Princeton March 23, 2006 1

Outline P2P CDNs Literature review of incentive mechanisms Cumulative Reputation Mechanism Transaction process Convergence of reputations Hierarchical trust groups and security issues Model of a cumulative reputation system Non-hierarchical structure Hierarchical structure Misrepresentations A simple sequential transaction game A game involving up-link bandwidth resources 2

P2P CDNs P2P networks can be used for a variety of applications: Routing, QoS mgmt, VOIP (e.g., Skype), distributed computation (e.g., seti@home), content distribution networks (CDNs), etc. P2P CDNs Structured vs unstructured Decentralized, centralized, partially centralized, and hybrid centralized Chord, CAN, Pastry and Tapestry: decentralized, structured Gnutella: decentralized, unstructured Kazaa: partially centralized, unstructured Napster: Hybrid centralized, unstructured 3

Incentive Systems for P2P CDNs Rationally selfish behavior, e.g., free riding, degrades performance of P2P networks P2P resources similar to public good in economics Incentive Mechanisms: Rule based, Monetary based or Reputation based. 4

Review of Incentive Mechanisms Rule based: Bit-torrent Monetary based, e.g., using micro-payments Cumulative reputation based: Centralized (reputations stored and communicated through a server), e.g., ebay Decentralized (reputation values stored at peers), e.g., EigenTrust, Kazaa Partially decentralized (some peers responsible for holding and advertising the reputation rankings of certain others) Incentive mechanisms for rationally selfish peers have been evaluated using game models Reputation systems can isolate misbehaving peers But attacks are possible on reputation systems themselves 5

A Cumulative Reputation System: Definitions π j > 0 is the propensity to cooperate of peer j. R ij is the reputation of j from i s point of view. All reputations are normalized at each node. G j (π j, R i ) is the probability that j responds positively to i s query. The response function has the following properties: G is nondecreasing in both arguments, G(π, R) = 0 and π > 0 imply R = 0, and G(π, R) π for all R [0,1]. 6

A Cumulative Reputation System: Definitions (cont) Reputations are modified as a result of successful transactions: { Rij (n 1)+C, k = j i R ik (n) = 1+C R ik (n 1) 1+C, k j, i with probability G j (π j, R i (n 1)). otherwise reputations are left unmodified if the transaction is unsuccessful. Note the trade-off in the choice of fixed C > 0. 7

Transaction Process Query resolution is not covered in this work. Successive transactions assumed independent. ρ ij is the probability that peer j is on the system and that peer i is querying j. Peer arrivals and departures and the effect on query resolution are not considered. Ignoring a query and not being present in the P2P system are modeled in combination. 8

Convergence of Reputations Theorem: if επ G(π, R) π and G(π, R) = πg( R) then for completely disseminated and honest polling, lim ER ij(n) = n ρ ij π j k,k i ρ ik π k for all i j. So, if all types of queries are equally likely, then the reputation of each peer i is a consistent estimator of its propensity to cooperate π j. 9

Sketch of Proof of Convergence Define X ij (n) ρ ij π j k,k i ρ ik π k R ij (n) for all i j and n 0. Condition on R(n 1) to show E X ij (n) (1 α)e X ij (n 1). for a scalar 0 < α < 1. Thus, E X ij (n) 0 exponentially quickly. 10

Reputation Systems: Vulnerabilities and Trust Groups Potential attacks on cumulative distributed reputation systems include but, are not limited to, badmouthing and ballot box stuffing which are variations of Byzantine attacks (false reputation referrals and associated collusions). Similar to [Buchegger et al. 04, Kamva et al. 03, Marti et al. 04, Yu et al. 04], our model can be extended to account for misrepresentation, weighted sampling, and sub-sampling of reputations. As a special case, we can model federations that are used by peers for feasible and reliable reputation polling (in the presence of both lying and spoofing of reputation referrals); light weight authentication could be used intra-group. 11

Sybil Attacks Sybil attacks [Castro et al. 02] occur when one end-user employs many different identities. A typical solution to Sybil attacks involves a centralized registration server that authenticates a unique identifier upon registration for each peer. Also, if authenticated reputations based only on positive feedback and reputation referrals only among trusted peers, then multiple identities will dilute the reputation of the end-user, thereby providing a natural disincentive for Sybil attacks. 12

Simulations: Reputation System Models Response function G(π, R) = π min(1,(n/2) R). A first-order autoregressive estimator, with forgetting factor 0 < β < 1, is adjusted on a transactionby-transaction basis: R(n) = β R(n 1) + (1 β)r(n) Note the trade-off in the choice of β is similar to that of C. We simulated a non-hierarchical structure where all nodes were polled by all for reputation referrals. We also simulated a hierarchical structure wherein: nodes were arranged in trust groups; intra-group transactions involved only intra-group polling for reputation referrals; and inter-group transactions involved the group reputations instead of the individual ones. 13

Simulations: Non-Hierarchical Structure N = 100 nodes. π j /Π i is the horizontal line in the figures. First two figures depict sample path of R j ( ), the mean reputation of a specific node j, with forgetting factors β = 0.95 and 0.15. Last figure depicts sample path of R ji, the reputations of a specific node j from the point of view of a node i without referrals, with β = 0.95. Individual increases (directly related to C chosen to be 3/N) indicate successful transactions for which j was a provider. 14

Non-Hierarchical Structure (cont) Reductions in sample paths occur upon successful transactions for which node j was not involved, and the general effect of forgetting factor β. As expected, reputations converge to the nodes propensity to cooperate. 15

Non-Hierarchical Weighted Voting Alternatively, the reputations received from other notes (during voting) were weighted using the reputations of the voters themselves. I.e., aggregated reputations can be defined as: k,k i h(r jk (n))r ki (n) R ji (n) = k,k i h(r jk (n)) For all nodes, we took h(r) R in one set of trials and h(r) = 1{R > θ} with θ = 0.01 in another. For both cases, the reputation dynamics were observed to be similar to those when no weighting was used. This was expected since all transactions were equally likely and the π j values were selected independently using the same distribution. 16

Simulations: Hierarchical Structure We simulated 20 nodes partitioned into 5 trustgroups of 4. Inter-group transactions involved normalized individual reputations, and intra-group transactions involved normalized group reputations, maintained at the group supernodes. Figure 1 is the sample path of one group s reputation from the point of view of another. Figure 2 depicts an individual node s mean reputation (within a group). 17

Hierarchical Structure (cont) Intra-group transactions were more frequent than inter-groups, hence group reputation sample path appears smoother and has a shorter transient phase than the individual reputation sample path. Decreases in the sample path occur less frequently than in non-hierarchical system counterpart because inter-group transactions had no effect (i.e., a lower transaction rate). Reputations fluctuate about their expected mean cooperation value as in the non-hierarchical experiments. 18

Simulations: Considering Misrepresentations Parameter λ is introduced into aggregated reputations as: R ji (n) = k,k i λ jkih(r jk (n))r ki (n)/ k,k i h(r jk(n Assumptions: 25% of the nodes lied unfavorably about all nodes to all nodes (λ = 0.75) 10% lied in favor (λ = 1.25) 65% were honest (λ = 1) Expect that the limiting sample paths will slightly deviate from the propensity to cooperate because: (0.25 0.75 + 0.10 1.25 + 0.65 1) π j Π i = 0.9625 π j Π i. Indeed, we observed nodes received about 4% fewer successful transactions compared to completely honest reporting. Note that when h(r) = R, the highly reputable nodes can lie more effectively. 19

A Simple Sequential Transaction Game Nodes modify their own cooperation level π as they file-swap. In each round of the game, peer nodes request files from each other. Again, whether the requestee of a transaction grants or denies a request is based on the requestee s cooperation level and the requester s reputation ranking in the system. For a successful transaction, the requester increases the requestee s reputation level as described above. Peers evaluate their success rate S (number of successfully received files versus the number requested) for every round. If S > σ (the peer s satisfaction level), π may be reduced to conserve resources (uplink bandwidth in particular [Feldman et al. 04],[Ma et al. 04]). Else, π is increased in order to obtain higher satisfaction (as a result of subsequently higher reputation). 20

Game Assumptions and Dynamics Satisfaction levels were chosen in {15%, 50%, 75%} Cooperation levels were initialized and randomly chosen from the interval [0.5,1]. Satisfactory success rates at the end of each round resulted in a small decrease (to conserve resources) in propensity to cooperate and in a small increase otherwise (ε = 0.01). A user with desired success rate of 50% maximizes their cooperation level (π 1). The cooperation parameters for easily satisfied (15%) users oscillated about a mean of approximately 0.3. 21

A Game Involving Uplink Resources As before, R ij is the reputation of j from the point of view of i and response function G is a function of the reputation of the requester and the propensity to cooperate of the requestee. Upon each successful transaction, the requester increases requestee s reputation level as described above At the end of each round, peers evaluate their success rate and adjust their uplink rate accordingly to maximize their net utility. 22

Uplink Game Assumptions Each peer i has a fixed aggregate upload capacity U i. Peer i s selected upload capacity for the P2P network u i < U i changes dynamically. Peers play a game in hopes of maximizing a net utility V (ξ) au where ξ is an estimation of the user s success (quasi-stationarity assumption). Requested rates r are scaled according to uplinks u to cause congestion. 23

Uplink Game Dynamics Step 1: Peer i queries peer j with probability ρ ij : Requester i is informed of the current uplink rate u i of requestee j. The file size requested by i is r i. File size is implicitly assumed to be divided by a common unit of discrete time and, so, is interpreted as a rate. 24

Uplink Game Dynamics (cont) Step 2: Each peer j is in receipt of a set M j of queries: Note M j may be empty. Each requester i M j deserves an allocation: δ i R ji k M j R jk u j The excess demand is ε r k u j k Mj + The penalty for excess demand is distributed among those nodes who have requested transfer rates, r i, more than what they deserve: r i > δ i, i.e., i M j M j. The allocation for such nodes i is: x ji = r i k M j g(r ji ) g(r jk ) ε, where g is positive non-increasing, otherwise x ji = r i. 25

Uplink Game Dynamics (cont) Step 3: Each requester i adjusts their reputation of requestee j by adding R ij + cx ij for some constant c and then normalizing all reputations stored at i. Step 4: At this point, a requestee can assess the value obtained from the CDN, from the result x of the current transaction (or by accumulation of past and present transactions) via a utility function: V (x/r) or V (x). The utility function is assumed to be non-decreasing but concave (law of diminishing returns) with V (0) = 0. A game is formulated here where peers iteratively adjusts their uplink rate, u, to maximize their unimodal net utility assessed over an interval. Net utility is V (X i (n)) au i (n) where X i (n) = (n+1)t 1 k=nt x i (k). Each user i sequentially modifies their constrained uplink rate u i [1, u max i ] to maximize their net utility using, e.g., an annealing strategy. 26

Uplink game designed so that... A peer does not receive at a rate larger than requested. Under overloaded conditions, nodes with: higher reputation and lower requested rate receive at the rates requested and low reputation and high requested rate receive at a rate much lower than requested. Choose g so that peer with no reputation (initialization) will be granted a positive uplink capacity when R = 0. If a user reduces their uplink rate u, their reputation R will eventually be reduced and their allocation x will be reduced during periods of excessive demand. Dynamics are continuous so can apply Brouwer s theorem to obtain existence of a fixed point. Basic assumption that excess demand ε is frequently > 0. 27