A Trust Management Framework for Service-Oriented Environments William Conner, Arun Iyengar, Thomas Mikalsen, Isabelle Rouvellou, and Klara Nahrstedt

Slides:



Advertisements
Similar presentations
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Chapter 3 Launching a Business on the Internet. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction of E-Business Life Cycle.
Advanced Piloting Cruise Plot.
© Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Assurance Services Independent professional services that “improve the quality of information, or its context, for decision makers” Assurance service encompass.
1 Towards an Open Service Framework for Cloud-based Knowledge Discovery Domenico Talia ICAR-CNR & UNIVERSITY OF CALABRIA, Italy Cloud.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Remote Educational Programming Of Robots (REPOR) Tord Fauskanger Aurelie Aurilla Bechina Arntzen Dag Samuelsen Buskerud University College.
Accountability and Resource Management A discussion of issues for peer-to-peer systems Roger Dingledine Reputation Technologies Michael.
Chapter 1 Image Slides Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
REQ Enrollment in Demand Response Programs Process Flow Engineering Firm Retail Customer Demand Response Service Provider (DRSP) Distribution Company.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Towards Automating the Configuration of a Distributed Storage System Lauro B. Costa Matei Ripeanu {lauroc, NetSysLab University of British.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
A Media Subscription Service By Peter Kriens CEO aQute OSGi Technology Officer
1 Copyright © 2005, Oracle. All rights reserved. Introducing the Java and Oracle Platforms.
E-Marketplaces.
Public B2B Exchanges and Support Services
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Year 6 mental test 5 second questions
|epcc| NeSC Workshop Open Issues in Grid Scheduling Ali Anjomshoaa EPCC, University of Edinburgh Tuesday, 21 October 2003 Overview of a Grid Scheduling.
Evaluating Provider Reliability in Risk-aware Grid Brokering Iain Gourlay.
ZMQS ZMQS
Xia Zhou*, Stratis Ioannidis ♯, and Laurent Massoulié + * University of California, Santa Barbara ♯ Technicolor Research Lab, Palo Alto + Technicolor Research.
Micro Focus Research 1 As far as youre aware, how does your organization plan to drive business growth over the next three years? (Respondents' first choices)
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Configuration management
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
The Platform as a Service Model for Networking Eric Keller, Jennifer Rexford Princeton University INM/WREN 2010.
ABC Technology Project
1 Distributed k -ary System Algorithms for Distributed Hash Tables Ali Ghodsi PhD Defense, 7th December 2006,
Online Algorithm Huaping Wang Apr.21
A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Extending the Capacity of Mobile Devices Through Cloud Offloading Francisco Airton – PhD Student 04 of may, 2014 Workshop MoDCS
Trust Management of Services in Cloud Environments:
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
Cloud Computing for Education & Cloud Learning Minjuan Wang to BT Research Center (Abu Dhabi) Educational Technology San Diego State University
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Security and Privacy Concern.
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
15. Oktober Oktober Oktober 2012.
IONA Technologies Position Paper Constraints and Capabilities for Web Services
Squares and Square Root WALK. Solve each problem REVIEW:
All Rights Reserved. National Library Board Singapore Tracking and Measuring Performance of Reference Services at the National Library Board, Singapore.
Executional Architecture
A Virtual Research Environment for the Study of Documents and Manuscripts 1 1 Research administration Resource discovery Data creation, use and analysis.
Chapter 5 Test Review Sections 5-1 through 5-4.
SIMOCODE-DP Software.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
Week 1.
We will resume in: 25 Minutes.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
University of Minnesota Optimizing MapReduce Provisioning in the Cloud Michael Cardosa, Aameek Singh†, Himabindu Pucha†, Abhishek Chandra
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
Microsoft Volume Licensing
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Presentation transcript:

A Trust Management Framework for Service-Oriented Environments William Conner, Arun Iyengar, Thomas Mikalsen, Isabelle Rouvellou, and Klara Nahrstedt 18 th International World Wide Web Conference 1

Outline Background and motivation Trust management framework Performance evaluation Related work Conclusion 2

Distributed Computing Platforms Many options available for deploying distributed applications P2P systems Gnutella for file sharing PPLive for media streaming Computational grids Open Science Grid for scientific research Computing clouds IBM Blue Cloud, Google App Engine, and Amazon Web Services for web applications 3

Trust Management Parties in distributed transactions often concerned with trust Client perspective: server selection Server perspective: access control ClientServer Buying / Selling (eBay) Download / Upload (P2P) Request / Response (Web) INVITE / OK (SIP) 4

Trust Management Credential-based trust management Exchange credentials prior to transaction Suitable when parties are known directly or indirectly Not our focus Reputation-based trust management Gather feedback ratings on prior transactions Suitable for open environments when parties are unknown to each other 5

Trust Management Service (TMS) Reputation-based Server-side access control for distributed infrastructures Enable sharing of reputation feedback from many sources Enable simultaneous use of different reputation metrics 6

Target Environment Service-hosting infrastructure Computing cloud would be an example Many external clients sending requests Many different services fulfilling requests 7

Security Assumptions No Sybil attacks XRep and PeerTrust share this assumption Secure communications within infrastructure Public key cryptography Attacks characterized by negative feedback Other Web-based attacks outside scope Bad feedback implicitly handled by reputation metrics 8

Collecting Reputation Feedback External Client CHosted Service STMS REQUEST REPLY H 1 = (C,S,Fdbk 1,Attrs 1 ) TMS Records (C,S,Fdbk 1,Attrs 1 ) TMS Records (C,S,Fdbk 1,Attrs 1 ) (C,S,Fdbk 2,Attrs 2 ) H 2 = (C,S,Fdbk 2,Attrs 2 ) H = service invocation history record C = client invoking service S = invoked service Fdbk = feedback value between -1 and 1 Attrs = trust-related attributes 9

Feedback Example 10

Assessing Trust External Client CHosted Service STMS REQUEST REPLY TMS Records H 1 = (C,S,Fdbk 1,Attrs 1 ) H 2 = (C,S,Fdbk 2,Attrs 2 ) (C,F S ) Rep C,S = F S ({H 1,H 2 }) GRANT if Rep C,S T S DENY, otherwise C = client invoking service S = invoked service F S = reputation scoring function for S Rep C,S = reputation of C according to S T S = minimum trust threshold for S 11

Custom Reputation Metrics TMS supports flexible reputation metrics Select from library of available scoring functions Define user-specific scoring function eBay reputation metric Summation of feedback ratings PeerTrust reputation metric satisfaction credibilitytransaction context community context 12

Distributed TMS Multiple TMS nodes organized into DHT Consistent hashing used for load balancing Replication on successor nodes for availability Hosted Service S TMS 1 TMS 0 TMS 2 13

Consistent Hashing Apply cryptographic hash function to client identifier to get hash value hash C Example hash functions: SHA-1, MD5 Assign hash C to numerically closest TMS identifier hash C Similar to Chord DHT hash C node crash

Replication TMS nodes might crash Stored records unavailable Reports reassigned based on consistent hash Enhance availability of TMS records Replicate TMS records on up to k nodes where k = 0,…,N-1 Similar to successor replication on Chord 15

Replication Probability of losing record Assume nodes fail independently with probability p Assume replication factor k Prob = p k successor node

Trust Value Caching External Client CHosted Service STMS REQUEST REPLY (C,F S ) Rep C,S = F S ({H 1,H 2 }) Additional processing and round trip 17

Trust Value Caching Observation Q: Is it necessary to re-evaluate trust each time? A: Depends on scoring function and client activity since last evaluation Example eBay is scoring function used Client has 5 transactions since last evaluation If Rep C = 100, then always grant If Rep C = -100, then always deny 18

Trust Value Caching TMS periodically updates services on client activity levels Maintain frequency count for each client Create Bloom histogram to approximate frequency count Services estimate upper and lower bound on client reputation TMS only contacted if re-evaluation necessary 19

Trust Value Caching 20

Performance Evaluation Integrated TMS into Supply Chain Management application Retailers Warehouses Manufacturers Measured latency and throughput through experiments Trusted ILLIAC (LAN environment) PlanetLab (WAN environment) 21

Performance Evaluation 22

Latency 23

Throughput 24

Related Work Online auctions Buyers and sellers rate each other eBay is best known example P2P file sharing Avoid bogus or malicious content XRep [Damiani et al. 02], EigenTrust [Kamvar et al. 03], and PeerTrust [Xiong and Liu 04] Web service selection Clients send requests to most reputable services Examples include [Zeng et al. 03, Kalepu et al. 04, Park et al. 05] 25

Conclusion Trust management framework Reputation-based Server-side access control Enable sharing of feedback Enable flexible trust assessments Reasonable latency and throughput overhead 26