Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”

Slides:



Advertisements
Similar presentations
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
On the Economics of P2P Systems Speaker Coby Fernandess.
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
Improving Search in Peer-to-Peer Networks Beverly Yang Hector Garcia-Molina Presented by Shreeram Sahasrabudhe
Incentive-based Schemes Smita Rai ECS289L. Outline Incentives for Co-operation in Peer-to- Peer Networks. Incentives for Co-operation in Peer-to- Peer.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Active Learning and Collaborative Filtering
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
1 A Framework for Lazy Replication in P2P VoD Bin Cheng 1, Lex Stein 2, Hai Jin 1, Zheng Zhang 2 1 Huazhong University of Science & Technology (HUST) 2.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Service Differentiated Peer Selection An Incentive Mechanism for Peer-to-Peer Media Streaming Ahsan Habib, Member, IEEE, and John Chuang, Member, IEEE.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
1 SLIC: A Selfish Link-based Incentive Mechanism for Unstructured P2P Networks Qixiang Sun Hector Garcia-Molina Stanford University.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
1 Maximizing Remote Work in Flooding-based P2P Systems Qixiang Sun Neil Daswani Hector Garcia-Molina Stanford University.
A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks Richard Ma, Sam Lee, John Lui (CUHK) David Yau (Purdue)
1 / 15 Attacks on Peer-to-Peer Networks Class Presentation CIS 510 – Peer-to-Peer Networking University of Oregon Christian Beckel Department of Computer.
Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.
What Can Databases Do for Peer-to-Peer Steven Gribble, Alon Halevy, Zachary Ives, Maya Rodrig, Dan Suciu Presented by: Ryan Huebsch CS294-4 P2P Systems.
Peer-to-peer archival data trading Brian Cooper and Hector Garcia-Molina Stanford University.
Conference title 1 A Few Bad Apples Are Enough. An Agent-Based Peer Review Game. Juan Bautista Cabotà, Francisco Grimaldo (U. València) Lorena Cadavid.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
Gnutella2: A Better Gnutella?
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani.
Trustworthiness Management in the Social Internet of Things
The EigenTrust Algorithm for Reputation Management in P2P Networks
The Design of A Distributed Rating Scheme for Peer-to-peer Systems Debojyoti Dutta 1, Ashish Goel 2, Ramesh Govindan 1, Hui Zhang 1 1 University of Southern.
Ivan Osipkov Fighting Freeloaders in Decentralized P2P File Sharing Systems.
Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.
Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked.
1 Maze A Hybrid P2P file sharing system Design by Networking and distributed System lab at Peking University Presenter:Elaine.
Emergent Group-Like Selection in a Peer-to-Peer Network ECCS Conference Paris, Nov. 16 th, 2005 David Hales University of Bologna, Italy
Impact of Incentives in BitTorrent By Jenny Liu and Seth Cooper.
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
Project funded by the Future and Emerging Technologies arm of the IST Programme From Selfish Nodes to Cooperative Networks – Emergent Link-based Incentives.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Repeated Game Modeling of Multicast Overlays Mike Afergan (MIT CSAIL/Akamai) Rahul Sami (University of Michigan) April 25, 2006.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations.
Reorganization in Network Regions for Optimality and Fairness Robert E. Beverly IV, MSc Thesis.
Peer-to-Peer Networks 15 Game Theory Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
03/19/02Scalab Seminar Series1 Finding Good Peers in Peer-to-Peer Networks Ramaswamy N.Vadivelu Scalab, ASU.
Proposal Pollution prevention in the P2P file sharing system Presenter: Elaine.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Peer-to-Peer Information Systems Week 13: Trust Old Dominion University Department of Computer Science CS 495/595 Fall 2003 Michael L. Nelson 11/17/03.
Contents of the Talk Preliminary Materials Motivation and Contribution
Load Weighting and Priority
Richard Ma, Sam Lee, John Lui (CUHK) David Yau (Purdue)
Presentation transcript:

Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”

In this talk … Peer-to-Peer Networks –Properties / Challenges –Threats –Solutions

Peer-to-Peer Networks Large Populations High Turnover Asymmetry of interest Zero-cost identity

Peer-to-Peer Networks (2) Threats –Malicious users: share bad resources –Free-Riders: selfish users Solutions –“Limited Reputation Sharing in P2P Systems” by Sergio Marti and Hector Garcia-Molina –“Robust Incentive Techniques for Peer-to-Peer Networks” by M. Feldman, K. Lai, I. Stoica and J. Chuang

“Limited Reputation Sharing in P2P Systems” by Sergio Marti and Hector Garcia-Molina Studies the performance of P2P resource-sharing network in the presence of malicious nodes Uses limited information sharing between peers Studies the effect of reputation systems

System Model When a peer desires a file: –Queries all or a subset of the peers for the file –Collects responses (response set) –Selects a provider and accesses the resource –Verifies the authenticity of the file: V(R) –If V(R) determines that the file is invalid, the peer fetches another file from the response set Peer wants to minimize the use of V(R) “Limited Reputation Sharing in P2P Systems”

Threat Model: Malicious peers Propagate fake files Can pass false information Three types of malicious nodes: –N: Do not misinform –L: Lie about everyone –C: Collude and give bad ratings to good nodes and good ratings to bad nodes Subversion Set: the set of unique fake files π B : Percentage of malicious peers p B : Probability of a file to be in the Subversion set “Limited Reputation Sharing in P2P Systems”

Reputation Systems Peers collect statistics about other peers and form opinions about them (reputation rating) 0 <= Reputation Rating <= 1 Peers can share reputation ratings Selection procedure: selects from which peer to download based on reputation ratings “Limited Reputation Sharing in P2P Systems”

Reputation Systems (2) Random Selection: no reputation used Local Reputation System: uses only local reputation ratings –File selection: Select-Best – high load on few nodes Weighted – tries to distribute load –Friend-Cache (FC) with max size |FC| “Limited Reputation Sharing in P2P Systems”

Reputation Systems (3) Voting Reputation System: uses its own Reputation Rating R(q,r) and RRs of a quorum (Q) of its peers R(v,r). The combined rating is: –Quorum selection: Neighbor-voting Friend-voting Additional parameters: –  0 : default rating –  T : selection threshold Whitewashing “Limited Reputation Sharing in P2P Systems”

Metrics Efficiency –Total number of V(R) evaluations: –Verification ratio: Load –Load on node i: –Average load: Message Traffic: “Limited Reputation Sharing in P2P Systems”, r v  1

Metrics (2) Summary of Terms: “Limited Reputation Sharing in P2P Systems”

Simulation Fully connected power-law network –N = 1000 nodes –Max node degree d max = 40 –d avg = 3.1 –TTL = 5 Local reputation: 100 queries from a single node; 1 turnover per step; all malicious nodes change identity every 10 steps Voter Reputation: 100,000 queries; 1 turnover per 1000 steps; all malicious nodes change identity every 10,000 steps “Limited Reputation Sharing in P2P Systems”

Simulation (2) “Limited Reputation Sharing in P2P Systems”

Voting System Parameters “Limited Reputation Sharing in P2P Systems” Random: r v = 28.2 Local Reputation

Voting System Parameters (2) “Limited Reputation Sharing in P2P Systems” Malicious node type: N Friend voting

Voting System Parameters (3) “Limited Reputation Sharing in P2P Systems” Malicious node type: C Friend voting

Efficiency Comparisons (1) “Limited Reputation Sharing in P2P Systems” Malicious node type: N

Efficiency Comparisons (2) “Limited Reputation Sharing in P2P Systems” Malicious node type: N

Load on Good Nodes (1) “Limited Reputation Sharing in P2P Systems”

Load on Good Nodes (2) “Limited Reputation Sharing in P2P Systems”

Message Traffic “Limited Reputation Sharing in P2P Systems”

Conclusion Reputation rating decreases the times V(R) is performed Reputation sharing is less susceptible to malicious nodes White-Washing does have an impact Friend-Cache has to be big (around 100) to minimize Message Traffic. However, only the top few friends should be asked to vote Weighted and Best selection criteria have comparable efficiency, but Weighted selection distributes Load among nodes better “Limited Reputation Sharing in P2P Systems”

“Robust Incentive Techniques for Peer-to-Peer Networks” by M. Feldman, K. Lai, I. Stoica and J. Chuang Game Theoretic approach to address free-riding in P2P networks Design better incentives based on Generalized Prisoner’s Dilemma

Model Social Dilemma: Universal cooperation should maximize social welfare, but peers should benefit exploiting the cooperation of others Asymmetric Transactions: Should handle asymmetric payoff Untraceable defections: defections should be transparent Dynamic Population: Peers should enter and leave the system as they please and be able to change their strategy “Robust incentive Techniques for Peer-to-Peer Networks”

Generalized Prisoner’s Dilemma Client Always to cooperate (request service) Server chooses whether to Cooperate or Defect based on previous experience with the client Client cannot trace defections Agents alternate between client/server every game round Agents can exploit blind cooperation from others “Robust incentive Techniques for Peer-to-Peer Networks”

Population Dynamics In each round of the game, each player plays one game as client and one game as server At the end of each round, players can: –Mutate –Learn –Turnover –Stay the same “Robust incentive Techniques for Peer-to-Peer Networks”

Strategy A strategy consists of: –Decision function –Private or shared history –Server selection mechanism –Stranger policy Examples of Strategies: –100% Cooperate –100% Defect We want to strike a balance between the two: –Cooperate with good peers –Defect bad peers “Robust incentive Techniques for Peer-to-Peer Networks”

Decision Function For peer i: –p i is a measure of services it has provides –c i is a measure of services it has consumed i’s generosity: –Discriminates against peers that (for the time being) have consumed more than they have provided. Server will deny service even if it is of the same type Normalized generosity: –Servers treat peers with respect to their own generosity Reciprocative decision function = Cooperate with i with Pr. min(g j (i), 1) “Robust incentive Techniques for Peer-to-Peer Networks”

Simulation Server Selection, History and Stranger Policy are shown through simulation results “Robust incentive Techniques for Peer-to-Peer Networks”

Baseline Results “Robust incentive Techniques for Peer-to-Peer Networks”

Baseline Results (2) “Robust incentive Techniques for Peer-to-Peer Networks”

Server Selection Transactions are asymmetric –Most likely to receive service from peer that I gave service –Also likely to receive service from a peer that provided service earlier Store past servers and clients Randomly choose a server or a client for new transactions “Robust incentive Techniques for Peer-to-Peer Networks”

Shared History Every player knows about transactions that other players perform Increases the size of “known” servers to select from Advantage: Scales better with: –Large populations –High turnover –Asymmetry Drawback: –Susceptible to collusion –Harder to implement “Robust incentive Techniques for Peer-to-Peer Networks”

Simulation Results (Shared History & Selection) “Robust incentive Techniques for Peer-to-Peer Networks”

Simulation Results (Shared History & Selection) 2 “Robust incentive Techniques for Peer-to-Peer Networks”

Shared History Attack: Collusion Group of peers lie about transactions Positive (bad peer claims another bad peer cooperated) Negative (bad peer claims that good peer defected) Bad for objective (trust everyone) reputation Need subjective reputation mechanism “Robust incentive Techniques for Peer-to-Peer Networks”

Shared History Attack: Collusion (2) Can use Maxflow graph algorithm as a distributed, subjective reputation system Reputation i (j) = Services Received/Services Provided = “Robust incentive Techniques for Peer-to-Peer Networks”

Shared History Attack: Collusion (3) “Robust incentive Techniques for Peer-to-Peer Networks”

Shared History Attack: False Reports One node may want to lower the reputation of another Easily identified: one node says transaction occurred and the other says it didn’t Solution: Modify MaxFlow so that a node always believes nodes closer to it. “Robust incentive Techniques for Peer-to-Peer Networks”

Zero-cost identities Motivates whitewashing Problem: –a node generous to newcomers motivates whitewashing –A node stingy with newcomer discourages newcomers to join the network Solution: Stranger Adaptive Strategy –Cooperate with stranger with Pr. min(p s /c s, 1 ) Susceptible to traitor attack Solution: Bind p s + c s to a constant k and keep only ratio r=p s /c s “Robust incentive Techniques for Peer-to-Peer Networks”

Zero-cost identities (2) “Robust incentive Techniques for Peer-to-Peer Networks”

Zero-cost identities (3) “Robust incentive Techniques for Peer-to-Peer Networks”

Traitors “Robust incentive Techniques for Peer-to-Peer Networks”

Conclusion A strategy for P2P networks: –Model over Asymmetrical Generalized Prisoner’s Dilema –Decision function: Reciprocative function = Cooperate with i with Pr. min(g j (i), 1) –Shared (short term) history Use maxflow to rate peer reputation Adaptive Stranger policy –Discriminative selection mechanism “Robust incentive Techniques for Peer-to-Peer Networks”

Summing it all up … For a good P2P system we need: –Reputation rating (based on outcomes of past transactions) –Reputation sharing between peers –Subjective reputation (weighted function vs. maxflow) –Eliminate White-Washing or decrease its effectiveness –Short History