1 NETWORKING 2012 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 22, 2012 Reducing the History in Decentralized.

Slides:



Advertisements
Similar presentations
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Advertisements

Cognitive Publish/Subscribe for Heterogeneous Clouds Šarūnas Girdzijauskas, Swedish Institute of Computer Science (SICS) Joint work with:
School of Information University of Michigan Network resilience Lecture 20.
On the Economics of P2P Systems Speaker Coby Fernandess.
1 2.5K-Graphs: from Sampling to Generation Minas Gjoka, Maciej Kurant ‡, Athina Markopoulou UC Irvine, ETZH ‡
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Search in Power-Law Networks Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems Slides also borrowed from the following paper Path Finding Strategies.
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
The influence of search engines on preferential attachment Dan Li CS3150 Spring 2006.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
The Barabási-Albert [BA] model (1999) ER Model Look at the distribution of degrees ER ModelWS Model actorspower grid www The probability of finding a highly.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
Computing Trust in Social Networks
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Algorithms for Data Mining and Querying with Graphs Investigators: Padhraic Smyth, Sharad Mehrotra University of California, Irvine Students: Joshua O’
COVERTNESS CENTRALITY IN NETWORKS Michael Ovelgönne UMIACS University of Maryland 1 Chanhyun Kang, Anshul Sawant Computer Science Dept.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
1 Applications of Relative Importance  Why is relative importance interesting? Web Social Networks Citation Graphs Biological Data  Graphs become too.
Trustworthiness Management in the Social Internet of Things
Glasgow 02/02/04 NN k networks for content-based image retrieval Daniel Heesch.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Optimal Link Bombs are Uncoordinated Sibel Adali Tina Liu Malik Magdon-Ismail Rensselaer Polytechnic Institute.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
Andreas Papadopoulos - [DEXA 2015] Clustering Attributed Multi-graphs with Information Ranking 26th International.
Union-find Algorithm Presented by Michael Cassarino.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
Slides are modified from Lada Adamic
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
An Adaptive, High Performance MAC for Long-Distance Multihop Wireless Networks Sergiu Nedevschi *, Rabin K. Patra *, Sonesh Surana *, Sylvia Ratnasamy.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011)
1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations.
Informatics tools in network science
Multicast with Network Coding in Application-Layer Overlay Networks Y. Zhu, B. Li, and J. Guo University of Toronto Present by Cheng Huang
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
Comparative Network Analysis BMI/CS 776 Spring 2013 Colin Dewey
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Presented by Edith Ngai MPhil Term 3 Presentation
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Minimum Spanning Tree 8/7/2018 4:26 AM
(Parallel and) Distributed Systems Group
Multi-Core Parallel Routing
Minimum Spanning Tree.
Peer-to-Peer and Social Networks
The University of Adelaide, School of Computer Science
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Graphs.
Katz Centrality (directed graphs).
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Richard Anderson Lecture 22 Network Flow
Presentation transcript:

1 NETWORKING 2012 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 22, 2012 Reducing the History in Decentralized Interaction-Based Reputation Systems Dimitra Gkorou, Tamás Vinkó, Nitin Chiluka, Johan Pouwelse, and Dick Epema

2 NETWORKING 2012 Overview Interaction-based Reputation Systems Limitations of the Complete History Reducing the History Evaluation Conclusion

3 NETWORKING 2012 Reputation Systems: Basic Concepts the goal of reputation in large scale systems: establish trust among users incentives for good behavior Interaction-Based Reputation Systems why not use the complete history? resource requirements: computation + storage capacity dynamic behavior: population turnover + changing behavior reputation algorithm complete history of interactions reputations of nodes

4 NETWORKING 2012 Complete History (CH): modeled as a growing directed weighted graph Reduced History (RH): a dynamically maintained subset of CH with fixed size removal of the least important nodes and edges in Reducing the History: Basic Approach Complete History (CH) Reduced History (RH) node removal: freshness activity level reputation position edge removal: freshness weight position

5 NETWORKING 2012 parameters indicating the importance: freshness (node/edge): capturing the dynamics of the system position (node/edge): keeping the graph connected activity level (node): maintaining informative nodes reputation (node): maintaining trustworthy information weight (edge): importance of an edge combined to a priority score for each node and edge Reducing the History: Priority Score Complete History (CH) Reduced History (RH)

6 NETWORKING 2012 Reduced History: Construction Complete History: add new node + its edges add new edge connecting existing nodes Reduced History (fixed size): add the new node + remove the node with the lowest priority score add the new edge + remove the edge with the lowest priority score w ad w ab w bc wdwd Complete History w ad w ab w bc wdwd Reduced History w ed w ce wgwg b a d b a d c c e e f f g g w fg w ge w fe

7 NETWORKING 2012 Experiment Setup: Synthetic Graphs CH growing up to 5000 nodes random graphs: new nodes/edges connected to existent nodes with a constant probability scale-free graphs: new nodes/edges connected to existent nodes with a probability proportional to their degree multiple edges correspond to weights random graph scale-free graph

8 NETWORKING 2012 Experiment Setup: Real-world Graphs Bartercast Reputation mechanism: Tribler: the BitTorrent P2P file-sharing system provides incentives for contribution peers locally store the history of their own interactions + interactions among other peers i nformation exchange: using an epidemic protocol Bartercast graph: crawled the Bartercast reputation mechanism (4 months) union of all local graphs vertices: the peers of Tribler weighted edges: the amount of the transferred data between two peers

9 NETWORKING 2012 Experiment Setup: real-world graphs Author-to- author citation graph: derived from papers published in Physical Review E vertices: the authors of papers weighted edges: number of citations between authors small-world graphs Citation graph more densely connected than Bartercast graph# nodes# edgesaver. path lengthc.c. Bartercast10,63431, Citation15,360365,

10 NETWORKING 2012 Computation of Reputation Max-flow based computation: reputation computation of Bartercast the weights of edges graph as flows starting from the most central node j reputation of peer a: the difference of flows f aj and f ja Eigenvector centrality: well-studied metric interactions with highly reputed nodes contribute more Pagerank e j c b W ca\ac w bi f w gk k w bj g w jg w fg w ge W ba\ab w ga a w ia i

11 NETWORKING 2012 Evaluation Metrics the ranking of reputations is more important than their actual values the identification of the highest ranked nodes is more important consider the sequences of ranked nodes in CH and RH according to their reputation two metrics ranking error: the minimum number of swaps needed to get the same ranking sequence in RH and CH ranking overlap: the fraction of common nodes in the sequences of top-raked nodes in RH and CH

12 NETWORKING 2012 Evaluation: ranking error Max-Flow Pagerank ranking error Size of RH relatively to the size of CH Growth of CH relatively to the size of RH Max-Flow Pagerank scale-free and real-world graphs exhibit smaller ranking error pagerank exhibits smaller ranking error

13 NETWORKING 2012 Evaluation: ranking overlap Max-Flow Ranking overlap Size of RH relatively to the size of CH Pagerank max-flow achieves much higher ranking overlap random graphs exhibit the worst ranking overlap

14 NETWORKING 2012 Evaluation: ranking overlap Max-Flow Ranking overlap Pagerank Growth of CH relatively to the size of RH max-flow achieves much higher again ranking overlap

15 NETWORKING 2012 Conclusions the performance of RH depends on the topology scale-free and real-world graphs exhibit smaller ranking error and higher ranking overlap the performance of RH depends on the reputation algorithm pagerank achieves lower ranking error max-flow achieves higher ranking overlap RH achieves good accuracy for real-world graphs

16 NETWORKING 2012 Questions? contact: