1 / 29

Trust Management in P2P systems

Trust Management in P2P systems. Presenter: Lintao Liu April 21th, 2003. Papers:. Managing Trust in a P2P information system Karl Aberer, et, Switzerland, 2001 Choosing Reputable Servents in a P2P network

derick
Download Presentation

Trust Management in P2P systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003

  2. Papers: • Managing Trust in a P2P information system • Karl Aberer, et, Switzerland, 2001 • Choosing Reputable Servents in a P2P network • A Reputation-Based Approach for Choosing Reliable Resources in P2P networks • Fabrizio Cornelli, et. Italy, 2002 • Cooperative Peer Groups in NICE • Seungjoon Lee, et. UMD, 2003 • And more…

  3. Problems Definition • Peer-to-Peer is a fully distributed system: • With no central coordination • No central database • No global view of the system • Peers are autonomous, and may be anonymous • Peers are unreliable • Transactions are performed between Peers • How to make a transaction more likely to succeed (not cheated)? • Choose the node which is more reliable

  4. Trust Management And Reputation • Trust Management: • any mechanism that allows to establish mutual trust. • Reputation: • a measure that is derived from direct or indirect knowledge on earlier transactions. • Reputation-based trust management: • one specific form of Trust Management.

  5. More for anonymity • Reputations must be associated with self-appointed Identifiers rather than with externally obtained identities. • Peers are not required to keep a stable identifier (along with its reputation), but: • Good peers should benefit from a persistent ID • Malicious peers should not get much advantage by changing their ID to avoid bad reputation

  6. Basic Elements in a Trust Management System • Global Trust Model: • How to describe whether an agent is trustworthy? Binary or Real or Discrete? • Local Algorithm to determine trust: • Computational procedure to determine the trust (Or determine the unreliability of a agent) • Data and Comm. Management: • How to store and exchange the data which is necessary for the local algorithm? (Earlier transaction data)

  7. Paper 1: • Manage Trust in a P2P information system

  8. Trust Model: • Binary trust • When a transaction fails, • The honest peer will file a complaint about the cheater. • The dishonest one can also file a complaint. • The reputation of an agent p could be: • T(p) = |{c(p,q)}| * |{c(q,p)}| (q is any peer) • But it requires global knowledge.

  9. Data Management • P-Grid • Peers organized as a virtual binary search tree • (Scan and Chord can also perform this task) • Basic idea: • Given a node ID, one node can be located which is responsible to store some information about that node ID.(P-Grid mechanism) • A complaint can be inserted at any node, but it will be routed to one responsible node. And complaints can be retrieved with the same way. • So, this mechanism is fully distributed and it uses the underlying P-Grid to mange complaints

  10. Local computation of Trust • Complaints can be retrieved using the data management mechanism. • But, the node (say, A) which provides the complaints can be malicious • Because of the same problem, you can verify whether A is malicious • Solution: • Making r replicas • If enough replicas say that p is trustworthy, it’s done. • Otherwise, continue to retrieve more data. • No clear decision is made, then give up.

  11. Algorithm: • W = {(cri(q), cfi(q), ai, fi)|i=1, …w} • ai,…aw are witness of q • Cri(q) is the number of complaints sent from q to ai • cfi(q) is the number of complaints send from ai to q

  12. Paper 2: • Choosing Reputable Servents in a P2P network

  13. Basic Idea: • Designed for Gnutella • Using a polling protocol to decide the reputation • After get all queryhits, select some interesting results (nodes which have the query data), ask other peers to vote on those results. • Binary vote (but still can be other type) • Contact the node with highest reputation to retrieve the data

  14. basic Polling Protocol:

  15. Basic Polling Protocol: (Ctd..) • Polling message: • Poll(T, PKpoll): polling message • PollReplay({(IP, port, Votes)}pkpool) • Verify vote: • TrueVote(Votesj) • TrueVoteReplay(response) • Challenge: • Challenge(r) • Response([r]sks, PKs)

  16. Enhanced pooling protocol:

  17. Enhanced Polling Protocol: • Polling message: • Poll(T, PKpoll): polling message • PollReplay({[(IP, port, Votes, serv_id)]ski, pki)}pkpool) • Basically the vote peer includes PK and its own IP/Port info • So, the initiator can verify the voter • Verify vote: • AreYou(serv_id) • AreYouReply(response) • Challenge: the same

  18. Data Structures • Experience_repository: • (serv_id, num_plus, num_minus) • Vote: Different criteria • Binary (1 or 0) • vote 1 only when num_minus = 0 • Credibility_repository • (serv_id, num_agree, num_disagree) • Used to check whether a node is malicious

  19. Removing suspects from poll • IP-address clustering is not good • A lot of peers may use proxies from some ISP companies like AOL. • Compute an aggregation (arithmetic mean) of votes from a cluster of votes, where weights are inversely related to cluster size • Then, A random sample of voters are checked • If some voters are not found, increase the sample size • If no voters are found, abort the procedure

  20. Security improvement • Distribution of Tampered with Information • David declares some files it doesn’t have and response with bad data • Prevent by the bad reputation he will get • Man in the Middle Attack: • Public/private keys are used to prevent such attack • Same for any communication

  21. Paper 3: • A reputation-based Approach for Choosing Reliable Resources in P2P networks

  22. Basic Idea: • Servents can have a reputation. Resources can also have a reputation. • Quite similar to the previous paper • Experience repositories: • Resource repository • (resource_id, value) (value is binary) • Resource Id is the digest of the content • Servent repository • (serv_id, num_plus, num_minus)

  23. XREP protocol: • Binary vote • Phase 1: Resource searching • QueryHit includes both node and resource info • Phase 2: Resource selection & vote polling • Same with the previous paper • Vote Evaluation • Including check valid vote • Challenging and download data

  24. Combinaing servent/resource based reputation: • Reputations’ life cycle: • New res from good nodes usually are good • Impact on peers anonymity: • Sev-based reputation prefers the ID to be persistent, while res-based doesn’t require that • Cold-start: • With res-based reputation, new nodes can participate in distribution of well known resources (for a good rep) • Performance bottlenecks • More serious in ser-based reputation • Res-based reputation can help to resolve that • Blacklisting: • Connect the bad resources with the initiator

  25. Security Issues: • Attacks to P2P systems: • Self-replication • Answering requests with bad contents • Man in the Middle • Attacks to reputation-based systems • Pseudospoofing: using different ID to send bad data • Digesting can stop the propagation of bad content • ID Stealth: • ? Not very clear about that • Shilling: • One using several IDs (work as several malicious nodes) to cheat other nodes. • This will be found with valid vote checking

  26. Questions…

  27. Paper 4: • Cooperative Peer Groups in NICE

  28. Basic Idea: • After each transaction between A and B: • A sends B a cookie stating the quality of the transaction • B does the same thing to A • For later transaction between A and C: • A shows C the cookies that A has • C does the same things

  29. More… • How/who to store those cookies? • How to get cookies? • Basic algorithm and refinement • How to assign values to cookies?

More Related