Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers? Ennan Zhai, Ruichuan Chen, Zhuhua Cai, Long Zhang, Eng Keong Lua*, Huiping Sun, Sihan Qing, Liyong Tang, and Zhong Chen (Email:
[email protected])
Peking University & *Carnegie Mellon University
Background
I
What is the deceptive behavior in P2P content sharing systems ?
II
What is the existing solutions on this problem ?
III
IEEE P2P 2009
Our approach ?
Ennan Zhai
1
Background
I
What is the deceptive behavior in P2P content sharing systems ?
II
What is the existing solutions on this problem ?
III
IEEE P2P 2009
Our approach ?
Ennan Zhai
1
Deceptive Behavior
Individual or collusive attackers (deceivers) publish some polluted content items, and cast incorrect votes on them … …
IEEE P2P 2009
Ennan Zhai
2
Deceptive Behavior
Individual or collusive attackers (deceivers) publish some polluted content items, and cast incorrect votes on them … …
Normal users are deceived by votes and download these polluted content items.
IEEE P2P 2009
Ennan Zhai
2
Deceptive Behavior Alice’s Content items
1
3
I would like to download File 4.
4
Alice’s Votes 1
4
Bob 7
IEEE P2P 2009
10
15
Ennan Zhai
3
Deceptive Behavior
4
However, after downloading content 4, Bob finds this content item is polluted. We say Bob is deceived by Alice’s vote.
IEEE P2P 2009
Ennan Zhai
Bob
3
Background
I
What is the deceptive behavior in P2P content sharing systems ?
II
What is the existing solutions on this problem ?
III
IEEE P2P 2009
Our approach ?
Ennan Zhai
4
Existing Solutions • Reputation Models: 9 Peer-based: EigenTrust, PeerTrust, Scrubber … 9 Object-based: Credence, FileTrust … 9 Hybrid: XRep, X2Rep, Extended Scrubber…
• Micropayment Techniques: MojoNation. • Exchange Protocol …………
IEEE P2P 2009
Ennan Zhai
5
Existing Solutions • Reputation Models: 9 Peer-based: EigenTrust, PeerTrust, Scrubber … 9 Object-based: Credence, FileTrust … 9 Hybrid: XRep, X2Rep, Extended Scrubber…
• Micropayment Techniques: MojoNation. • Exchange Protocol …………
IEEE P2P 2009
Some Problems! Ennan Zhai
5
Background
I
What is the deceptive behavior in P2P content sharing systems ?
II
What is the existing solutions on this problem ?
III
IEEE P2P 2009
Our approach ?
Ennan Zhai
6
Sorcery 1
Introducing Social Network
2
Challenge-response Mechanism
3
Punishment Mechanism
4
Practical Issues
IEEE P2P 2009
Ennan Zhai
7
Sorcery 1
Introducing Social Network
2
Challenge-response Mechanism
3
Punishment Mechanism
4
Practical Issues
IEEE P2P 2009
Ennan Zhai
7
Introducing Social Network
Sorcery client stores friends’ information in his friend list. This friend list is confidential to other users in the system … …
IEEE P2P 2009
Ennan Zhai
8
Introducing Social Network
Sorcery client stores friends’ information in his friend list. This friend list is confidential to other users in the system … …
This is the dominant information for the client
IEEE P2P 2009
Ennan Zhai
8
Introducing Social Network Eve
Alice
2
8
1
1
2
1
4
8
14
7
9
Bob
6 6
1
2
3
2
3
5
11 20
Eve is Alice’s friend, but Bob cannot know the friend-relationship between Alice and Eve. IEEE P2P 2009
Ennan Zhai
9
Introducing Social Network Because friends’ experiences can be used, social network can address cold start problem which cannot be solved by the existing reputation models … …
IEEE P2P 2009
Ennan Zhai
10
Introducing Social Network Because friends’ experiences can be used, social network can address cold start problem which cannot be solved by the existing reputation models … …
New user joins in the system, he is easy to be deceived due to lack of experiences.
IEEE P2P 2009
Ennan Zhai
10
Sorcery 1
Introducing Social Network
2
Challenge-response Mechanism
3
Punishment Mechanism
4
Practical Issues
IEEE P2P 2009
Ennan Zhai
11
Challenge-response
Alice’s Friend list Friend1
Friend2
1
8
1
5
8
2
Friend4
1
4
8
4
8
5 1
Alice 1
5
Friend3 2
Bob 2
3
4
2
3
6 5
1 6
Eve
9
2
IEEE P2P 2009
1
Ennan Zhai
2
3
5
7
1
2
5
8
4
12
Challenge-response ChallengeMessage
Step 1
Alice’s Friend list Friend1
Friend2
1
8
1
5
8
2
Friend3
Friend4
1
4
8
4
8
2 5
1
Bob Alice 1
5
(File5,?),(File3,?),(File2,?)
9
Step 1
ChallengeMessage (File3,?),(File8,?),(File4,?)
2
IEEE P2P 2009
2
3
4
2
3
6 1
6
1
Ennan Zhai
5
Eve 2
3
5
7
1
2
5
8
4
12
Challenge-response ChallengeMessage
Step 1
Alice’s Friend list Friend1
Friend2
1
8
1
5
8
2
Friend3
Friend4
1
4
8
4
8
2 5
1
Bob Alice 1
5
2
IEEE P2P 2009
(File5,?),(File3,?),(File2,?)
6 1
6
9
ChallengeMessage (File5,-1),(File3,+1),(File2,+1)
Step 1
Step 2
ChallengeMessage
(File3,-1),(File8,-1),(File4,-1)
Ennan Zhai
2
3
4
2
3
5
Eve
(File3,?),(File8,?),(File4,?)
ChallengeMessage
1
Step 2
2
3
5
7
1
2
5
8
4
12
Sorcery 1
Introducing Social Network
2
Challenge-response Mechanism
3
Punishment Mechanism
4
Practical Issues
IEEE P2P 2009
Ennan Zhai
13
Punishment Mechanism
Sorcery introduces approach to punish deceivers, thus reducing the possibility of impact brought by them … …
IEEE P2P 2009
Ennan Zhai
14
Punishment Mechanism max(-1, RDi(j) - pn2) RDi(j)= min(1, RDi(j) + r)
IEEE P2P 2009
Ennan Zhai
15
Punishment Mechanism max(-1, RDi(j) - pn2) RDi(j)= min(1, RDi(j) + r)
If j is a deceiver … …
IEEE P2P 2009
Ennan Zhai
15
Punishment Mechanism max(-1, RDi(j) - pn2) RDi(j)= min(1, RDi(j) + r) If j is not a deceiver, and i would like to upgrade RDi(j) … …
IEEE P2P 2009
Ennan Zhai
15
Sorcery 1
Introducing Social Network
2
Challenge-response Mechanism
3
Punishment Mechanism
4
Practical Issues
IEEE P2P 2009
Ennan Zhai
16
Practical Issues
• Lack of the Overlapping Votes • Unreliable Friends
IEEE P2P 2009
Ennan Zhai
17
Practical Issues
• Lack of the Overlapping Votes • Unreliable Friends
IEEE P2P 2009
Ennan Zhai
17
Non-overlapping Voting Histories
The studies in [J. Liang, INFOCOM’05] and [K. Walsh, NSDI’06] indicated it’s a high probability that most peers have overlapping votes with the voters of any content item … …
IEEE P2P 2009
Ennan Zhai
18
Non-overlapping Voting Histories
The studies in [J. Liang, INFOCOM’05] and [K. Walsh, NSDI’06] indicated it’s a high probability that most peers have overlapping votes with the voters of any content item … … The client should challenge some of voters of the target content item (Details see paper please).
IEEE P2P 2009
Ennan Zhai
18
Practical Issues
• Lack of the Overlapping Votes • Unreliable Friends
IEEE P2P 2009
Ennan Zhai
19
Unreliable Friends
In the practical applications, some friends may be online deceivers or compromised, Sorcery utilizes similarity based on cosine technique to filter those unreliable friends (The concrete equation see paper please) … …
IEEE P2P 2009
Ennan Zhai
20
Evaluation
IEEE P2P 2009
I
Simulation Setup
II
Experimental Results
Ennan Zhai
21
Evaluation
IEEE P2P 2009
I
Simulation Setup
II
Experimental Results
Ennan Zhai
21
Simulation Setup • Network Model: Gnutella Prototype • Peer Model: 5, 000 Peers • Social Model: Kleinberg Model • Content Model: ¾ 1,000 title, 500 Versions (50 good) ¾ Zipf Distribution a=0.8
IEEE P2P 2009
Ennan Zhai
22
Evaluation
IEEE P2P 2009
I
Simulation Setup
II
Experimental Results
Ennan Zhai
23
Normal Deceivers
IEEE P2P 2009
Ennan Zhai
24
Normal Deceivers
Rate of Deceivers
IEEE P2P 2009
Ennan Zhai
24
Normal Deceivers
Rate of Deceivers
IEEE P2P 2009
Ennan Zhai
24
Normal Deceivers
Rate of Deceivers
IEEE P2P 2009
Ennan Zhai
24
Tricky Deceivers
IEEE P2P 2009
Ennan Zhai
25
Tricky Deceivers Rate that Tricky Deceivers Vote Correctly
IEEE P2P 2009
Ennan Zhai
25
Tricky Deceivers Rate that Tricky Deceivers Vote Correctly
IEEE P2P 2009
Ennan Zhai
25
Conclusion and Discussion
• How to resist three types of attacks? ¾ Man-in-the-Middle (MITM) Attack ¾ Sybil Attack ¾ Denial-of-Service (DoS) Attack
IEEE P2P 2009
Ennan Zhai
26
Q&A
Thank you !
IEEE P2P 2009
Ennan Zhai
27