A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.

Slides:



Advertisements
Similar presentations
C. Mastroianni, D. Talia, O. Verta - A Super-Peer Model for Resource Discovery Services in Grids A Super-Peer Model for Building Resource Discovery Services.
Advertisements

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
CMPE 521 Improving Search In P2P Systems by Yang and Molina Prepared by Ayhan Molla.
Efficient Search - Overview Improving Search In Peer-to-Peer Systems Presented By Jon Hess cs294-4 Fall 2003.
Improving Search in Peer-to-Peer Networks Beverly Yang Hector Garcia-Molina Presented by Shreeram Sahasrabudhe
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Design and Performance Evaluation of Queue-and-Rate-Adjustment Dynamic Load Balancing Policies for Distributed Networks Zeng Zeng, Bharadwaj, IEEE TRASACTION.
Efficient, Proximity-Aware Load Balancing for DHT-Based P2P Systems Yingwu Zhu, Yiming Hu Appeared on IEEE Trans. on Parallel and Distributed Systems,
Improving Search in P2P Networks By Shadi Lahham.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Design, Implementation, and Evaluation of Differentiated Caching Services Ying Lu, Tarek F. Abdelzaher, Avneesh Saxena IEEE TRASACTION ON PARALLEL AND.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Efficient Search in Peer to Peer Networks By: Beverly Yang Hector Garcia-Molina Presented By: Anshumaan Rajshiva Date: May 20,2002.
Searching in Unstructured Networks Joining Theory with P-P2P.
ICDE A Peer-to-peer Framework for Caching Range Queries Ozgur D. Sahin Abhishek Gupta Divyakant Agrawal Amr El Abbadi Department of Computer Science.
On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda, Bharat K. Bhargava Presented by Sam Distributed Computing Systems, FTDCS Proceedings.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
P2P File Sharing Systems
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
An Evaluation model of botnet based on peer to peer Gao Jian KangFeng ZHENG,YiXian Yang,XinXin Niu 2012 Fourth International Conference on Computational.
IR Techniques For P2P Networks1 Information Retrieval Techniques For Peer-To-Peer Networks Demetrios Zeinalipour-Yazti, Vana Kalogeraki and Dimitrios Gunopulos.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Searching In Peer-To-Peer Networks Chunlin Yang. What’s P2P - Unofficial Definition All of the computers in the network are equal Each computer functions.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Routing Indices For P-to-P Systems ICDCS Introduction Search in a P2P system –Mechanisms without an index –Mechanisms with specialized index nodes.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
A Social Network-Based Trust Model for the Semantic Web Yu Zhang, Huajun Chen, and Zhaohui Wu Grid Computing Lab, College of Computer Science, Zhejiang.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
Peer to Peer Network Design Discovery and Routing algorithms
1 Reading Report 3 Yin Chen 20 Feb 2004 Reference: Efficient Search in Peer-to-Peer Networks, Beverly Yang, Hector Garcia-Molina, In 22 nd Int. Conf. on.
Evaluation GUESS and Non-Forwarding Peer-to-Peer search ICDCS paper Beverly Yang Patrick Vinograd Hector Garcia-Molina Computer Science Department, Stanford.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
ALTO: A Multi Dimensional Peer Selection Problem IETF 73 Saumitra Das
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Composing Web Services and P2P Infrastructure. PRESENTATION FLOW Related Works Paper Idea Our Project Infrastructure.
Presented by Edith Ngai MPhil Term 3 Presentation
Improving Performance in the Gnutella Protocol
Mobile P2P Data Retrieval and Caching
Presentation transcript:

A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15

Outline Introduction Access Control Framework Search techniques Conclusion Reference

Introduction P2P Concept  P2P file sharing allows users on the edge of network to directly access files from on another ’ s drives. Why P2P so attractive ?  Provide a flexible and universal model for the exchange of information.  Success of P2P file sharing network (i.e. Gnutella, Napster.....) But most P2P file sharing no provide access control.

Outline Introduction Access Control Framework Search techniques Conclusion Reference

Requirement Access control model requirements  No centralized control or support  Peer classification  Encourage sharing files  Limit spreading of malicious and harmful digital content

Basic idea of Framework An access control framework based on the discretionary access control. Each file being assigned two threshold which capture two access aspects. Two threshold values  Trust  Contribution

Overall Architecture RD : Resource Discovery FT : File Transfer AC : Access Control

Authentication In this framework, a peer is equipped with a 128-bit GUID number and a pair of public/private keys. Authentication procedure  Client sends authentication request.  Host checks in its database.  Host carries out authentication protocol. Authentication protocol based on SSL.

Scoring system Host peer needs to classify its client peers. Client peer is required to supply its rating certificates for the host. Access values are evaluated via four types of scores  Direct trust  Indirect trust  Direct contribution  Indirect contribution

Direct trust The host’s belief on the client’s capacities, honesty and reliability based on the host’s direct experiences. In this model, use Bethetal’s formula denotes the trust value that peer i has in peer j

Direct trust ( Cont. ) n is the number of peer i’s satisfied transactions with peer j. is the learning rate – a real number in the interval [0,1] must chose high enough.

Indirect trust Host peer often encounters a client peer that it has never met. The host’s belief on the client’s capacities, honesty and reliability based on recommendations from other peers.

Indirect trust ( Cont. ) The indirect trust calculated as denotes the indirect trust of peer i in peer j k is a number fixed by the host. will be range 0 to 1 and less than or

Indirect trust ( Cont. ) Indirect trust calculate example assume k = 1

Indirect trust ( Cont. ) The two main reasons why divide by k ?  Avoid the client submit only one highest recommendation.  Allowing the host to specify a required number of recommending peers.

Direct contribution The contribution of the client to the host in term of information download/upload between them. The direct contribution calculated as is the direct contribution of peer j to peer I denotes the amount information i download from j denotes the amount information j download from i

Indirect contribution The contribution of the client to the network in term of information volume exchange. denotes the indirect contribution of peer j from peer i’s point of view.

Granting access ( Cont. ) The client’s overall trust and contribution values calculated as value depending on host’s control policy.

Granting access Before making a file available for sharing, a host peer defines two thresholds value for the file. Any client peer who has equal to or greater than the corresponding thresholds can access the file

Trust and contribution management After completing a download operation, client peer has to issue the host peer a rating certificate. Rating certificate contains the direct trust and direct contribution value based on the transaction’s satisfaction level.

Rating certificate format

Satisfaction level Evaluate satisfaction level based on the download speeds and file quality. Five levels of satisfaction  Good  Fair T unchanged  Poor  Corrupted  Unknown  Harmful or malicious add to the black list

Local file system In local storage it stores follow  Received certificates in which the peer itself is the recommended peer.  Certificates which the peer issued to other peers.  A black list of peers who it believes to have committed malicious acts.

Framework interaction procedure

Outline Introduction Access Control Framework Search techniques Conclusion Reference

Metrics Some metrics for evaluate the effectiveness of search technique.  Cost Bandwidth consumed over every edge in the network on behalf of each query. Processing cost processing power consumed at every node on behalf of each query.

Metrics  Quality of results Satisfaction of query user specify a value Z, if the number of result is equal or more than Z, the query is satisfied. Time to satisfaction the time of result arrive.

Search techniques Inefficiency search  blind search (BFS) Three efficient search techniques :  Iterative deepening  Directed BFS  Local indices

Blind search Node forward to all their neighbors Find max number of results But inefficiency

Iterative deepening Satisfaction is the metric of chose. Multiple breadth-fist searches are initiated with successively larger depth limits until query is satisfied or max depth reached. Time cost smaller than blind search

Iterative deepening ex. if policy is  Source node initiates a BFS of depth a.  When depth reach, if query not satisfied then continue to depth b and c

Directed BFS Minimizing response time. DBFS technique send query messages to just a subset of its neighbors. In order to intelligently select neighbors, node will maintain statistic on its neighbors.

Directed BFS Some heuristic can help us to select the best neighbors  Highest number of results for previous query.  Response messages taken the lowest average hop.  Has forwarded the largest number of messages.  Shortest message queue.

Local indices Maintaining a high satisfaction rate and number of results while keeping low costs. Node maintains an index over the data of each node within r hops of itself. Parameter r is adjustable and independent of total size of network. It must notify when host joint network Node index the leaving node’s collective will remove after a timeout.

Local indices ex. if policy is  Query source will send the query message out to all its neighbors at depth 1.  All node at depth will process and forward to depth 2.  Depth not in list, it forward directly.  Process continue to depth 5

Outline Introduction Access Control Framework Search techniques Conclusion Reference

Conclusion The framework satisfies the requirements of access control for P2P file-sharing system by trust and contribution model, and the implemented contribution work effectively as a payment scheme that giving incentive for users to share their resource. The disadvantage is some overheads in validity of signatures in the rating certificate.

Reference B. Yang and H. Carcia-Molina. Efficient Search in peer-to-peer Networks, ICDCS 2002, Jul 2002 Thomas Beth and Malte Borcherding and Birgit klein Valuation of trust in open network