The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.

Slides:



Advertisements
Similar presentations
Cope with selfish and malicious nodes
Advertisements

A P RESENTATION O N R ESOURCE D ISCOVERY I N T HE P EER- T O- P EER N ETWORK by Aravind Renganathan.
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
COMS 486 Iowa State University Introduction to Bitcoin A P2P Electronic Cash System.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
A Survey of Trust Evaluation Methods (Supervisor: Yan Wang) Name:Erden Sacan Student ID: Unit:ITEC810.
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Service Differentiated Peer Selection An Incentive Mechanism for Peer-to-Peer Media Streaming Ahsan Habib, Member, IEEE, and John Chuang, Member, IEEE.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
UCDavis, ecs251 Fall /29/2007Trust and Reputation System1 S. Felix Wu University of California, Davis
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
1 SLIC: A Selfish Link-based Incentive Mechanism for Unstructured P2P Networks Qixiang Sun Hector Garcia-Molina Stanford University.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Wide-area cooperative storage with CFS
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
P-Grid Presentation by Thierry Lopez P-Grid: A Self-organizing Structured P2P System Karl Aberer, Philippe Cudré-Mauroux, Anwitaman Datta, Zoran Despotovic,
Stacey Greenaway Managing Reputation and Trust in Peer-to-Peer Networks. CP4022 Research Topics in Networks and Distributed Systems. Assessment 2 Stacey.
Trust Course CS Grid and Peer-to-Peer Computing Gerardo Padilla.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
1 GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks Runfang Zhou, Kai Hwang, and Min Cai University of Southern California IEEE Transaction.
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Unit 9 Transaction Processing. Key Concepts Distributed databases and DDBMS Distributed database advantages. Distributed database disadvantages Using.
Node Lookup in P2P Networks. Node lookup in p2p networks In a p2p network, each node may provide some kind of service for other nodes and also will ask.
Fast Searching in Peer-to-Peer Networks Self-Organizing Parallel Search Clusters Rocky Dunlap.
Examining Dynamic Trust Relationships in Autonomy-Oriented Partner Finding Department of Computer Science, HKBU, HK International WIC Institute, BJUT,
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Trust Management for the Semantic Web Matthew Richardson1†, Rakesh Agrawal2, Pedro Domingos By Tyrone Cadenhead.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003.
The EigenTrust Algorithm for Reputation Management in P2P Networks
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Trusted P2P Transactions with Fuzzy Reputation Aggregation Authors: S. song, K. Hwang, and R. Zhou University of Southern California Yu-Kwong Kwok University.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
Proposal Pollution prevention in the P2P file sharing system Presenter: Elaine.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Peer-to-Peer Information Systems Week 13: Trust Old Dominion University Department of Computer Science CS 495/595 Fall 2003 Michael L. Nelson 11/17/03.
The Chord P2P Network Some slides taken from the original presentation by the authors.
Presented by Edith Ngai MPhil Term 3 Presentation
Talal H. Noor, Quan Z. Sheng, Lina Yao,
PeerFlow: Secure Load Balancing in Tor Aaron Johnson1 Rob Jansen1 Aaron Segal2 Nicholas Hopper3 Paul Syverson1 1U.S. Naval Research Laboratory 2Yale.
Review session For DS final exam.
Trustworthiness Management in the Social Internet of Things
CASCADE: AN ATTACK-RESISTANT DHT WITH MINIMAL HARD STATE
CSE 486/586 Distributed Systems Distributed Hash Tables
OneSwarm: Privacy Preserving P2P
CSE 486/586 Distributed Systems Distributed Hash Tables
Presentation transcript:

The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina

P2P Networks and Reputation Systems P2P Networks –open and anonymous Problem –Malicious peers –Inauthentic files Reputation Systems –Centralized system (eBay) –Distributed System Local Trust Value j i

How to Aggregate Local Trust Values? Aggregates the ratings of only a few peers –Can’t get a wide view about a peer’s reputation Aggregates the ratings of all the peers –Congesting the network with system messages asking for each peer’s local trust values at every query Global Trust Value –The overall estimation of, for each peer j –How to calculate these global trust values?

Aggregating Local Trust Values Normalizing Local Trust Values Why normalizing? Aggregating Local Trust Values (transitive trust) A Probabilistic Interpretation i j k

Aggregating Local Trust Values (2) The global trust vector; also, the Eigenvector of C The global trust value of peer j (quantify how much trust the system as a whole places peer j)

Basic EigenTrust Assumption: including server at this stage –A server stores all the values and performs the computation

Practical Issues A priori notions of trust –Can we assign any profit to newcomers? –Only the first few peers to join the network are known to be trustworthy – if, and otherwise –Use instead of

Practical Issues(2) Inactive Peers –What happens if peer i doesn't download from anybody else? –Choose to trust the pre-trusted peers

Practical Issues(3) Malicious Collectives –a group of malicious peers who know each other –How to prevent them from subverting the system? –The modified algorithm:

Distributed EigenTrust Assumption: Everyone is honest Each peer compute its own global trust value:

Algorithm Complexity The algorithm converges fast –A network of 100 peers after 100 query cycles

Algorithm Complexity(2) Specifically limit the number of local trust values that a peer reports

Secure Eigentrust Malicious peers can report false trust values, subverting the system Have a different peer compute the trust value of a peer The trust value of one peer will be computed by more than one other peer How to assign score mangers?

Assign Score Managers DHT (Distributed Hash Table)

The Algorithm

Using Global Trust Values Have each peer download from the most highly trusted peer who responds to its query Two problems –The most highly trusted peers be overloaded

Using Global Trust Values(2) –Does not allow newcomers to build reputation Probabilistically based on the trust values –With a probability of 10%, select a peer j that has a zero trust value –

Isolating Malicious Peers

Conclusion Goal: minimize the impact of malicious peers on the P2P system Using global trust value Compute in a distributed manner