Accountability and Resource Management A discussion of issues for peer-to-peer systems Roger Dingledine Reputation Technologies Michael.

Slides:



Advertisements
Similar presentations
Reputation in Privacy Enhancing Technologies Paul Syverson Naval Research Laboratory URL: joint work.
Advertisements

TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Computer Concepts – Illustrated 8th edition
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Chapter 8 Payment Systems: Getting the Money
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
© Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
A Trust Management Framework for Service-Oriented Environments William Conner, Arun Iyengar, Thomas Mikalsen, Isabelle Rouvellou, and Klara Nahrstedt
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
ZMQS ZMQS
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Internet Search Engine freshness by Web Server help Presented by: Barilari Alessandro.
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
Chang-ho CHUNG 정창호, 鄭彰鎬 Judge, Republic of Korea, since 1993 Head of UNCITRAL and UNIDROIT Research Team of Supreme Court of Korea SNU, LSE, HKU 1.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
The ABCs of Credit Card Finance Essential Facts for Students 2007 Carol A. Carolan, Ph.D.
The ABCs of Credit Card Finance Essential Facts for Students 2012 Carol A. Carolan, Ph.D.
Teacher instructions:
A presentation by Werardt Systemss P Ltd An Online Machine Monitoring System.
Chapter Outline Hedging and Price Volatility Managing Financial Risk
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Slide
Chapter 18 Methodology – Monitoring and Tuning the Operational System Transparencies © Pearson Education Limited 1995, 2005.
S-Curves & the Zero Bug Bounce:
ABC Technology Project
A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds 作者:Xiaofei Wang, MinChen, Ted Taekyoung Kwon,
Location Based Services and Privacy Issues
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
Squares and Square Root WALK. Solve each problem REVIEW:
Copyright 2007 Thomson South-Western Chapter 4 Financial Decisions and Planning.
Copyright 2007 Thomson South-Western Chapter 7 Buying Decisions.
Database System Concepts and Architecture
Chapter 5 Test Review Sections 5-1 through 5-4.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
Directie Toezicht Energie, Bonn WS 8 february Bonn 1 SG Workshop: Secondary markets for interconnection capacity: way to adress contractual congestion.
Week 1.
Chapter 9 Understanding Work Teams
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
A SMALL TRUTH TO MAKE LIFE 100%
1 Unit 1 Kinematics Chapter 1 Day
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
How Cells Obtain Energy from Food
Copyright © 2009 Pearson Addison-Wesley. All rights reserved. Chapter 16 Stationary-Source Local Air Pollution.
Registry system data exchange General design requirements Pre-sessional Consultations on Registries 19 October 2002 New Delhi, India UNFCCC secretariat.
Off-the-Record Communication, or, Why Not To Use PGP
Accountability and Resource Management in Higher Ed P2P David Molnar, Free Haven Project and ShieldIP, Inc.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Presented by: Sanketh Beerabbi University of Central Florida.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Presentation transcript:

Accountability and Resource Management A discussion of issues for peer-to-peer systems Roger Dingledine Reputation Technologies Michael Freedman MIT The Free Haven Project freehaven.net

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 2 Managing scarce resources… Freenet: unpopular data is dropped; popular data is cached near the requester Gnutella: data is stored only on the publishers own computer Publius: currently limits submissions to 100K

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 3 Introducing accountability… Mojo Nation: micropayments are used for all peer-to-peer exchanges Free Haven: reputation system – publishers must provide reliable space of their own Mixmaster: statistics pages track uptime

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 4 Discussion outline Accountability problem Current systems Models of P2P systems Resource management techniques –Electronic payments –Reputation systems Conclusions

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 5 The resource management problem Goal: maximize a peer's utility to the overall system while minimizing its potential threat. Threat: peers eat resources Accountability –Approach to resource management –Resources more efficient and protected

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 6 Why is P2P accountability hard? Tragedy of the commons P2P discourages permanent public identification Hard to assess peers history or predict future performance Legal contracts are outdated and impractical

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 7 Problems to tackle Intentional attacks (adversaries) and simple overuse (freeloaders) User attacks –Communication DoS (query flooding) –Storage flooding –Computational overload

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 8 Problems to tackle Server attacks – low-quality service –Dropping data –Providing corrupted data –Ignoring requests –Going down when needed –Adversarial collusion …not following system protocol !

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 9 Problems in current P2P systems Freenet –Bandwidth overuse (query flooding) –Cache flushing (data flooding) Gnutella –Vulnerable to query flooding –Freeloading Publius –Public server identities: directed attack on bandwidth, storage space

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 10 Problems in current P2P systems Mojo Nation –How to set prices? –Performance tracking, not reputation Free Haven –Very vulnerable to query flooding –Protected against data flooding (reputation system is complex and untested) Mixmaster –No verifiability –Uptime is not reliability

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 11 Two accountability solutions Restrict access to resources –Digital payment mechanisms Select favored users –Reputation schemes

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 12 P2P models 1.Static, identified operators Examples: Mixmaster r er, Publius Limited users: legal mechanisms possible Reputation and payment schemes 2.Dynamic, identified operators Examples: Gnutella, Freenet, Mojo Nation Reputation and payment schemes

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 13 P2P models 3.Dynamic, pseudonymous operators Example: Free Haven Reputation and payment schemes Decisions may be based on prior behavior 4.Dynamic, anonymous operators Payment schemes only All information is ephemeral Decisions based only on current transaction

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 14 Goal of payment schemes Manage scarcity of resources –Charge for access Prevent intentional attacks Restrict freeloading Result: optimize for social efficiency –Users contribute to overall system robustness

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 15 Payment schemes: models Proofs-of-Work (POWs) –Examples: hash cash, Client Puzzles Fungible non-anonymous payments –Credit cards –Examples: MicroMint, PayWord, Millicent, Mondex Fungible anonymous payments –Cash –Examples: Chaums eCash, Brands digital cash

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 16 Congestion management Temporary resource allocation –Determine need dynamically –Areas: bandwidth, computation, caching –Solution? Only charge when congested Cumulative resource allocation –Once allocated, not easily recoverable –Area: persistent storage –Solution? Always charge

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 17 Reputation systems Track performance to predict future behavior Risk resources based on anticipated benefit Information provided by third parties

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 18 Example reputation systems PGP Web of Trust Slashdot, Advogato Free Haven, Mojo Nation Amazon, eBay Google, Clever

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 19 Some goals for reputation systems Local / personalized reputation Resist pseudospoofing Resist shilling, e.g., verify transactions Collect enough data to be useful Distinguish between reputation and credibility

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 20 Accountability slider Dynamically determine need and extent Digital payments –Adjust amount charged Reputation systems: –Adjust trust thresholds

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 21 Conclusion Peer-to-peer won't save you Accountability is not pixie dust Payment and reputation systems are efficient and flexible solutions Verifying behavior still necessary Convenience trumps accountability…

February 16, 2001 Accountability and Resource Management Roger Dingledine, Mike Freedman Page 22 Further reading… Peer-to-Peer: Harnessing the Power of Disruptive Technologies Chapter 16: Accountability The Free Haven Project freehaven.net