Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers? Ennan Zhai, Ruichuan Chen, Zhuhua Cai, Long Zhang, Eng Keong Lua*, Huiping Sun, Sihan Qing, Liyong Tang, and Zhong Chen (Email: [email protected])

Peking University & *Carnegie Mellon University

Background

I

What is the deceptive behavior in P2P content sharing systems ?

II

What is the existing solutions on this problem ?

III

IEEE P2P 2009

Our approach ?

Ennan Zhai

1

Background

I

What is the deceptive behavior in P2P content sharing systems ?

II

What is the existing solutions on this problem ?

III

IEEE P2P 2009

Our approach ?

Ennan Zhai

1

Deceptive Behavior

Individual or collusive attackers (deceivers) publish some polluted content items, and cast incorrect votes on them … …

IEEE P2P 2009

Ennan Zhai

2

Deceptive Behavior

Individual or collusive attackers (deceivers) publish some polluted content items, and cast incorrect votes on them … …

Normal users are deceived by votes and download these polluted content items.

IEEE P2P 2009

Ennan Zhai

2

Deceptive Behavior Alice’s Content items

1

3

I would like to download File 4.

4

Alice’s Votes 1

4

Bob 7

IEEE P2P 2009

10

15

Ennan Zhai

3

Deceptive Behavior

4

However, after downloading content 4, Bob finds this content item is polluted. We say Bob is deceived by Alice’s vote.

IEEE P2P 2009

Ennan Zhai

Bob

3

Background

I

What is the deceptive behavior in P2P content sharing systems ?

II

What is the existing solutions on this problem ?

III

IEEE P2P 2009

Our approach ?

Ennan Zhai

4

Existing Solutions • Reputation Models: 9 Peer-based: EigenTrust, PeerTrust, Scrubber … 9 Object-based: Credence, FileTrust … 9 Hybrid: XRep, X2Rep, Extended Scrubber…

• Micropayment Techniques: MojoNation. • Exchange Protocol …………

IEEE P2P 2009

Ennan Zhai

5

Existing Solutions • Reputation Models: 9 Peer-based: EigenTrust, PeerTrust, Scrubber … 9 Object-based: Credence, FileTrust … 9 Hybrid: XRep, X2Rep, Extended Scrubber…

• Micropayment Techniques: MojoNation. • Exchange Protocol …………

IEEE P2P 2009

Some Problems! Ennan Zhai

5

Background

I

What is the deceptive behavior in P2P content sharing systems ?

II

What is the existing solutions on this problem ?

III

IEEE P2P 2009

Our approach ?

Ennan Zhai

6

Sorcery 1

Introducing Social Network

2

Challenge-response Mechanism

3

Punishment Mechanism

4

Practical Issues

IEEE P2P 2009

Ennan Zhai

7

Sorcery 1

Introducing Social Network

2

Challenge-response Mechanism

3

Punishment Mechanism

4

Practical Issues

IEEE P2P 2009

Ennan Zhai

7

Introducing Social Network

Sorcery client stores friends’ information in his friend list. This friend list is confidential to other users in the system … …

IEEE P2P 2009

Ennan Zhai

8

Introducing Social Network

Sorcery client stores friends’ information in his friend list. This friend list is confidential to other users in the system … …

This is the dominant information for the client

IEEE P2P 2009

Ennan Zhai

8

Introducing Social Network Eve

Alice

2

8

1

1

2

1

4

8

14

7

9

Bob

6 6

1

2

3

2

3

5

11 20

Eve is Alice’s friend, but Bob cannot know the friend-relationship between Alice and Eve. IEEE P2P 2009

Ennan Zhai

9

Introducing Social Network Because friends’ experiences can be used, social network can address cold start problem which cannot be solved by the existing reputation models … …

IEEE P2P 2009

Ennan Zhai

10

Introducing Social Network Because friends’ experiences can be used, social network can address cold start problem which cannot be solved by the existing reputation models … …

New user joins in the system, he is easy to be deceived due to lack of experiences.

IEEE P2P 2009

Ennan Zhai

10

Sorcery 1

Introducing Social Network

2

Challenge-response Mechanism

3

Punishment Mechanism

4

Practical Issues

IEEE P2P 2009

Ennan Zhai

11

Challenge-response

Alice’s Friend list Friend1

Friend2

1

8

1

5

8

2

Friend4

1

4

8

4

8

5 1

Alice 1

5

Friend3 2

Bob 2

3

4

2

3

6 5

1 6

Eve

9

2

IEEE P2P 2009

1

Ennan Zhai

2

3

5

7

1

2

5

8

4

12

Challenge-response ChallengeMessage

Step 1

Alice’s Friend list Friend1

Friend2

1

8

1

5

8

2

Friend3

Friend4

1

4

8

4

8

2 5

1

Bob Alice 1

5

(File5,?),(File3,?),(File2,?)

9

Step 1

ChallengeMessage (File3,?),(File8,?),(File4,?)

2

IEEE P2P 2009

2

3

4

2

3

6 1

6

1

Ennan Zhai

5

Eve 2

3

5

7

1

2

5

8

4

12

Challenge-response ChallengeMessage

Step 1

Alice’s Friend list Friend1

Friend2

1

8

1

5

8

2

Friend3

Friend4

1

4

8

4

8

2 5

1

Bob Alice 1

5

2

IEEE P2P 2009

(File5,?),(File3,?),(File2,?)

6 1

6

9

ChallengeMessage (File5,-1),(File3,+1),(File2,+1)

Step 1

Step 2

ChallengeMessage

(File3,-1),(File8,-1),(File4,-1)

Ennan Zhai

2

3

4

2

3

5

Eve

(File3,?),(File8,?),(File4,?)

ChallengeMessage

1

Step 2

2

3

5

7

1

2

5

8

4

12

Sorcery 1

Introducing Social Network

2

Challenge-response Mechanism

3

Punishment Mechanism

4

Practical Issues

IEEE P2P 2009

Ennan Zhai

13

Punishment Mechanism

Sorcery introduces approach to punish deceivers, thus reducing the possibility of impact brought by them … …

IEEE P2P 2009

Ennan Zhai

14

Punishment Mechanism max(-1, RDi(j) - pn2) RDi(j)= min(1, RDi(j) + r)

IEEE P2P 2009

Ennan Zhai

15

Punishment Mechanism max(-1, RDi(j) - pn2) RDi(j)= min(1, RDi(j) + r)

If j is a deceiver … …

IEEE P2P 2009

Ennan Zhai

15

Punishment Mechanism max(-1, RDi(j) - pn2) RDi(j)= min(1, RDi(j) + r) If j is not a deceiver, and i would like to upgrade RDi(j) … …

IEEE P2P 2009

Ennan Zhai

15

Sorcery 1

Introducing Social Network

2

Challenge-response Mechanism

3

Punishment Mechanism

4

Practical Issues

IEEE P2P 2009

Ennan Zhai

16

Practical Issues

• Lack of the Overlapping Votes • Unreliable Friends

IEEE P2P 2009

Ennan Zhai

17

Practical Issues

• Lack of the Overlapping Votes • Unreliable Friends

IEEE P2P 2009

Ennan Zhai

17

Non-overlapping Voting Histories

The studies in [J. Liang, INFOCOM’05] and [K. Walsh, NSDI’06] indicated it’s a high probability that most peers have overlapping votes with the voters of any content item … …

IEEE P2P 2009

Ennan Zhai

18

Non-overlapping Voting Histories

The studies in [J. Liang, INFOCOM’05] and [K. Walsh, NSDI’06] indicated it’s a high probability that most peers have overlapping votes with the voters of any content item … … The client should challenge some of voters of the target content item (Details see paper please).

IEEE P2P 2009

Ennan Zhai

18

Practical Issues

• Lack of the Overlapping Votes • Unreliable Friends

IEEE P2P 2009

Ennan Zhai

19

Unreliable Friends

In the practical applications, some friends may be online deceivers or compromised, Sorcery utilizes similarity based on cosine technique to filter those unreliable friends (The concrete equation see paper please) … …

IEEE P2P 2009

Ennan Zhai

20

Evaluation

IEEE P2P 2009

I

Simulation Setup

II

Experimental Results

Ennan Zhai

21

Evaluation

IEEE P2P 2009

I

Simulation Setup

II

Experimental Results

Ennan Zhai

21

Simulation Setup • Network Model: Gnutella Prototype • Peer Model: 5, 000 Peers • Social Model: Kleinberg Model • Content Model: ¾ 1,000 title, 500 Versions (50 good) ¾ Zipf Distribution a=0.8

IEEE P2P 2009

Ennan Zhai

22

Evaluation

IEEE P2P 2009

I

Simulation Setup

II

Experimental Results

Ennan Zhai

23

Normal Deceivers

IEEE P2P 2009

Ennan Zhai

24

Normal Deceivers

Rate of Deceivers

IEEE P2P 2009

Ennan Zhai

24

Normal Deceivers

Rate of Deceivers

IEEE P2P 2009

Ennan Zhai

24

Normal Deceivers

Rate of Deceivers

IEEE P2P 2009

Ennan Zhai

24

Tricky Deceivers

IEEE P2P 2009

Ennan Zhai

25

Tricky Deceivers Rate that Tricky Deceivers Vote Correctly

IEEE P2P 2009

Ennan Zhai

25

Tricky Deceivers Rate that Tricky Deceivers Vote Correctly

IEEE P2P 2009

Ennan Zhai

25

Conclusion and Discussion

• How to resist three types of attacks? ¾ Man-in-the-Middle (MITM) Attack ¾ Sybil Attack ¾ Denial-of-Service (DoS) Attack

IEEE P2P 2009

Ennan Zhai

26

Q&A

Thank you !

IEEE P2P 2009

Ennan Zhai

27

Sorcery: Could We Make P2P Content Sharing Systems ...

Sorcery. Introducing Social Network. Challenge-response Mechanism ... be solved by the existing reputation models … … IEEE P2P 2009. Ennan Zhai. 10 ...

409KB Sizes 1 Downloads 143 Views

Recommend Documents

MobiShare: Cloud-enabled Opportunistic Content Sharing among ...
MobiShare: Cloud-enabled Opportunistic Content Sharing among Mobile Peers. Kuldeep Yadav, Vinayak Naik, Amarjeet Singh. Indraprastha Institute of ...

Hedge Sorcery - Darker Days Podcast
Willpower: 9. Virtues: Conscience 2 .... laptop, a deck of cards, personal wifi hotspot. Arctos. In Greenwich ... Base of Operations 9 (Luxury 4, Size 2,. Security 3) ...

Hedge Sorcery - Darker Days Podcast
Merits & Flaws: True Faith 7, Addi. Vampire Blood 3 (Should Caiaphas flaw he immediately gains the Flaw Lam. Notes: Caiaphas once had a True Fait of 4 but ...

Content-Based Filtering for Video Sharing Social ...
for video social networks, a very challenging task, not only because the .... The most popular local descriptor, SIFT [7], is both a point of interest detector, .... classification tasks, including pornography detection in images and videos [1][4][10

9 Food Projects That Could Make You Completely Self-Sufficient.pdf ...
Reliable and easy to grow, beans are a nutritional staple for the homesteading family. Prepare the soil early, and plan on 2-3 months of growing before harvest. 2. Poultry. If starting with chicks, expect 2-3 years of successful rearing, selection, b

VillageShare, Facilitating content generation and sharing in rural ...
VillageShare, Facilitating content generation and sharing in rural networks, ACM DEV 2012.pdf. VillageShare, Facilitating content generation and sharing in ...

Skyline Queries in P2P Systems by Daniel Zinn
should be queried (for example some ratings in Zagat [zag], the distance to a local point determined by MapQuest [map] ) are fetched from different sources sorted according to respective score functions. Based on that sorted access, the central “sk

Hedge Sorcery - Darker Days Podcast
4(business world), Melee 2,Performance 2,. Academics 3 .... they just can't store it. Hedge Witches can ..... effects of the spell, including the app of any spell ...

USR Sword Sorcery Rulebook.pdf
Download. Connect more apps... Try one of the apps below to open or edit this item. USR Sword Sorcery Rulebook.pdf. USR Sword Sorcery Rulebook.pdf. Open.

P2P Whitepaper
Dec 6, 2000 - of the role of automated software agents in a peering infrastructure. ... phone a service technician can be alerted to a service call, obtain driving ...

JXTA_ Java P2P Programming
After you have selected OK, configuration files and directories will be written to disk and the platform will boot. Before the platform fully boots, you will be presented with a security login dialog that requests the name and password you chose in t

Web Content Manager - ICARDA Corporate Systems
Closing date: 08 March 2016. Main purpose of the position ... Coordinate web, online and social media projects across departments. •. Maintain a consistent look ...

Guide to Learning Management Systems - Content Type ...
presented in the training. But this type of training often pulled. multiple people away from their jobs, disrupting the daily. workflow and potentially impacting deadlines and revenue. Page 3 of 23. Guide to Learning Management Systems - Content Type

Web Content Manager - ICARDA Corporate Systems
Mar 8, 2016 - email newsletters, and online outreach campaigns, ... Coordinate web, online and social media projects across ... Basic Adobe Photoshop skills.

USR Sword Sorcery Character Sheet.pdf
Sorcery. War Beasts & Retainers. Artifacts & Mutations. Enemies & Allies. Page 2 of 2. USR Sword Sorcery Character Sheet.pdf. USR Sword Sorcery Character ...