SlideShare una empresa de Scribd logo
1 de 26
PEER-TO-PEER FILE SHARING WITH INCENTIVES


  Instructor: Dr.Saleh Yosefi
  Student: Amir Maboudi
  maboudi.amir@yahoo.com
  Urmia university
  course: Performance Evaluation




PEER-TO-PEER FILE SHARING
WITH INCENTIVES - 22slides
PEER-TO-PEER FILE SHARING WITH INCENTIVES




  Discussion: Security issues
  Incentives for cooperation when uploading




PEER-TO-PEER FILE SHARING
WITH INCENTIVES - 22slides
Security issues




 •    Security expert Bruce Schneider is often quoted as claiming that “Security is a
      process.”
 •    Centralized or decentralized security administration .
 •    There is a significant overload for performance in p2p.




      Decentralized : Very hard to manage.         Centralized : single point of failure.

 PEER-TO-PEER FILE SHARING
                                             22                                             1
 WITH INCENTIVES - 22slides
Security issues

 • P2P applies at the several levels:

        Network level:
           try to break routing system
               Block access to information by impeding queries
               Partitioning the network

        Application Level:
           Attempt to corrupt or delete data stored in the system or in transit

        User Level:
               The users themselves can be the subject of attacks




 PEER-TO-PEER FILE SHARING
                                              22                                   2
 WITH INCENTIVES - 22slides
Security issues

 • The querying process
        Misforwarding queries (or responses)
        Phony queries


 • The downloading process
          Content pollution (Malwares, Spam)
          Worm spread through P2P file-sharing systems
          Erroneous information
          Discarding queries (or responses)




 PEER-TO-PEER FILE SHARING
                                         22               3
 WITH INCENTIVES - 22slides
Incentives for cooperation when uploading



 • Monetary systems based on a global currency.
 • Systems based on cumulative reputations and trust groups
 • Rule-based systems with memoryless "tit-for-tat" transactions
       – Typically involve chunk swapping rather than single-chunk (i.e., client-server)
         transfers.
       – The peer arrival rate has exponential growth .
       – Dealing with free riders is important .
       – The rule is “ tit – for - tat” .




 PEER-TO-PEER FILE SHARING
                                             22                                            4
 WITH INCENTIVES - 22slides
Cumulative reputation system

• Avoid interactions with nodes that do not behave.
• Information about an actor that can aid in the prediction of future
  behavior .
• As transactions occur, these reputation states will change.


 •    It serves two complementary purposes:
        Guide a decision maker’s choice in selecting transaction partners
        It can act as an incentive for good behavior for those who fear acquiring bad
         reputations.

 •    Consequences
        Bad reputation : punishment or reduced privileges and isolation.
        Good reputation : motivating factor for good behavior.



PEER-TO-PEER FILE SHARING
                                             22                                          5
WITH INCENTIVES - 22slides
Cumulative reputation system
• Definitions
• π j > 0 is the propensity to cooperate of peer j.

•    Rij is the reputation of j from i’s point of view.

•    All reputations are normalized at each node.

•    Gj(π j , R̄ i) is the probability that j responds positively to i’s query.

• The response function has the following properties:
       G is nondecreasing in both arguments
       G(π, R̄) = 0 and π > 0 imply R̄ = 0
       G(π,R̄) ≤ π j for all R̄ ∈ [0, 1].


PEER-TO-PEER FILE SHARING
                                        22                                        6
WITH INCENTIVES - 22slides
Cumulative reputation system

   • Mean value of Ri :




PEER-TO-PEER FILE SHARING
                             22   7
WITH INCENTIVES - 22slides
Cumulative reputation system (Simulation)


                                     D

                                                      C


                                             B
                                 A                        H


                             E           F        G




PEER-TO-PEER FILE SHARING
                                             22               8
WITH INCENTIVES - 22slides
Cumulative reputation system




PEER-TO-PEER FILE SHARING
                             22   9
WITH INCENTIVES - 22slides
Cumulative reputation system (Theorem)




PEER-TO-PEER FILE SHARING
                             22          10
WITH INCENTIVES - 22slides
Cumulative reputation system (Simulation)




PEER-TO-PEER FILE SHARING
                             22             11
WITH INCENTIVES - 22slides
Cumulative reputation system (Simulation)



 Reputation of a specific
Mean reputation of a
node j from i’s
specific node jpoint of view

β = 0.15
β= 0.95
     0.95

N= 100 Nodes




  PEER-TO-PEER FILE SHARING
                               22             12
  WITH INCENTIVES - 22slides
Cumulative reputation system (Simulation)

  Individual increases indicate successful transaction for which
   j was provider.

  Reduction in sample path occur upon successful transaction
   for which node j was not involved.

  As expected, reputation converge to the nodes’ propensity
  to cooperate.




PEER-TO-PEER FILE SHARING
                                       22                           13
WITH INCENTIVES - 22slides
Cumulative reputation system

    • Sybil Attack
    • It is named after the subject of
      the book Sybil
    • a fictional case study of a woman
      with multiple personality disorder.
    • The name was suggested in or
      before 2002 by Brian Zill at
      Microsoft Research.




PEER-TO-PEER FILE SHARING
                                      22    14
WITH INCENTIVES - 22slides
Cumulative reputation system


• Sybil Attack

       Also known as pseudospoofing,

       An attacker acquires multiple identifiers in the system to undermine
        some function of the system.

       if a single faulty entity can present multiple identities it can control a
        substantial fraction of the system.




PEER-TO-PEER FILE SHARING
                                          22                                         15
WITH INCENTIVES - 22slides
Cumulative reputation system (Sybil Attack)




                 A and B select the broadcasts advertisementmalicious node C to
                  Malicious node C non-existent positions of messages of invented
                   Nodes A and B want to send their data towards the Sink.
                 forward their messages. Node C (yellow nodes)
                  non-existent position of nodes overhear s them.


PEER-TO-PEER FILE SHARING
                                             22                                     16
WITH INCENTIVES - 22slides
Cumulative reputation system (Sybil Attack)




                             Another example for Sybil attack




PEER-TO-PEER FILE SHARING
                                            22                  17
WITH INCENTIVES - 22slides
Cumulative reputation system (Sybil Attack)


   • Preventing “Sybil attacks” :

          One approach is to have a trusted agency certify
          identities.

          The system must ensure that distinct identities refer to
          distinct entities.




PEER-TO-PEER FILE SHARING
                                     22                               18
WITH INCENTIVES - 22slides
Trust groups


• Based on trust groups

• Lightweight message authentication
       In the presence of both lying and spoofing of reputation
          referrals.
• Peer registration mechanisms




PEER-TO-PEER FILE SHARING
                                  22                               19
WITH INCENTIVES - 22slides
Trust groups (Simulation)




PEER-TO-PEER FILE SHARING
                             22   20
WITH INCENTIVES - 22slides
Trust groups

•One group’s reputation from the
 point of view of another.
•Intra-group transactions were more
 frequent than inter-groups.
•group reputation sample path
 appears smoother and has a
 shorter transient phase than the
•Depicts an reputation node’s path.
 individual individual sample
 mean reputation (within group)
•Decreases in the sample path occur
 less frequently than in non-hierarchical
 system counterpart because inter-group
 transactions had no effect (i.e., a lower
 transaction rate).

      Reputations fluctuate about their expected mean cooperation value as in the
      non-hierarchical experiments.
   PEER-TO-PEER FILE SHARING
                                             22                                     21
   WITH INCENTIVES - 22slides
Game-theoretic models of P2P systems


• Involve end users that behave in a rationally selfish
  manner.
• Peers may modify their own "default" cooperation
  level.
• Achieve a desired utility from the system .

• At the end of each round, peers evaluate their
  success rate and adjust their uplink rate accordingly
  to maximize their net utility

PEER-TO-PEER FILE SHARING
                             22                           22
WITH INCENTIVES - 22slides
References


1. An introduction to communication network analysis ,
    George Kesidis, 2007 , Wiley.
2. Peer-to-Peer Security - Allan Friedman, Harvard University -
    L Jean Camp, Harvard University
3. The Sybil Attack , John R. Douceur , Microsoft Research ,
   johndo@microsoft.com
4. Cumulative Reputation Systems for Peer-to-Peer Content
   Distribution ,B. Mortazavi and G. Kesidis,CS&E and EE Depts,The
      Pennsylvania State University , University Park, PA, 16802 mortazav@cse.psu.edu
      and kesidis@engr.psu.edu also a member of technical staff at Verizon Wireless
5.    And some other Papers and websites like WikiPedia .


PEER-TO-PEER FILE SHARING
WITH INCENTIVES - 22slides
Questions


                  Thank you for your consideration




PEER-TO-PEER FILE SHARING
WITH INCENTIVES - 22slides

Más contenido relacionado

Similar a Peer to-peer file sharing with incentives

Web Application Remediation - OWASP San Antonio March 2007
Web Application Remediation - OWASP San Antonio March 2007Web Application Remediation - OWASP San Antonio March 2007
Web Application Remediation - OWASP San Antonio March 2007Denim Group
 
Cnsm2011
Cnsm2011Cnsm2011
Cnsm2011j22fung
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)NAFCU Services Corporation
 
Site (Service) Reliability Engineering
Site (Service) Reliability EngineeringSite (Service) Reliability Engineering
Site (Service) Reliability EngineeringMark Underwood
 
Enable DevSecOps using JIRA Software
Enable DevSecOps using JIRA SoftwareEnable DevSecOps using JIRA Software
Enable DevSecOps using JIRA SoftwareAUGNYC
 
Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldDenim Group
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...IEEEGLOBALSOFTTECHNOLOGIES
 
Key recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedKey recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedjpstudcorner
 
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information SecurityRyan Elkins
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic SecurityDenim Group
 
ARM'08 - Keynote Talk
ARM'08 - Keynote TalkARM'08 - Keynote Talk
ARM'08 - Keynote TalkLicia Capra
 
Security best practices
Security best practicesSecurity best practices
Security best practicesAVEVA
 
Enable DevSecOps using Jira Software
 Enable DevSecOps using Jira Software Enable DevSecOps using Jira Software
Enable DevSecOps using Jira SoftwareAtlassian
 

Similar a Peer to-peer file sharing with incentives (20)

Soc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvichSoc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvich
 
Web Application Remediation - OWASP San Antonio March 2007
Web Application Remediation - OWASP San Antonio March 2007Web Application Remediation - OWASP San Antonio March 2007
Web Application Remediation - OWASP San Antonio March 2007
 
Cnsm2011
Cnsm2011Cnsm2011
Cnsm2011
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Wilbert QTI Profile
Wilbert QTI ProfileWilbert QTI Profile
Wilbert QTI Profile
 
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
 
Site (Service) Reliability Engineering
Site (Service) Reliability EngineeringSite (Service) Reliability Engineering
Site (Service) Reliability Engineering
 
Enable DevSecOps using JIRA Software
Enable DevSecOps using JIRA SoftwareEnable DevSecOps using JIRA Software
Enable DevSecOps using JIRA Software
 
Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security World
 
Paderborn
PaderbornPaderborn
Paderborn
 
MARS presentation
MARS presentationMARS presentation
MARS presentation
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
 
Key recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedKey recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyed
 
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic Security
 
ARM'08 - Keynote Talk
ARM'08 - Keynote TalkARM'08 - Keynote Talk
ARM'08 - Keynote Talk
 
Security best practices
Security best practicesSecurity best practices
Security best practices
 
Enable DevSecOps using Jira Software
 Enable DevSecOps using Jira Software Enable DevSecOps using Jira Software
Enable DevSecOps using Jira Software
 

Último

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Último (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Peer to-peer file sharing with incentives

  • 1. PEER-TO-PEER FILE SHARING WITH INCENTIVES Instructor: Dr.Saleh Yosefi Student: Amir Maboudi maboudi.amir@yahoo.com Urmia university course: Performance Evaluation PEER-TO-PEER FILE SHARING WITH INCENTIVES - 22slides
  • 2. PEER-TO-PEER FILE SHARING WITH INCENTIVES Discussion: Security issues Incentives for cooperation when uploading PEER-TO-PEER FILE SHARING WITH INCENTIVES - 22slides
  • 3. Security issues • Security expert Bruce Schneider is often quoted as claiming that “Security is a process.” • Centralized or decentralized security administration . • There is a significant overload for performance in p2p. Decentralized : Very hard to manage. Centralized : single point of failure. PEER-TO-PEER FILE SHARING 22 1 WITH INCENTIVES - 22slides
  • 4. Security issues • P2P applies at the several levels:  Network level:  try to break routing system  Block access to information by impeding queries  Partitioning the network  Application Level:  Attempt to corrupt or delete data stored in the system or in transit  User Level:  The users themselves can be the subject of attacks PEER-TO-PEER FILE SHARING 22 2 WITH INCENTIVES - 22slides
  • 5. Security issues • The querying process  Misforwarding queries (or responses)  Phony queries • The downloading process  Content pollution (Malwares, Spam)  Worm spread through P2P file-sharing systems  Erroneous information  Discarding queries (or responses) PEER-TO-PEER FILE SHARING 22 3 WITH INCENTIVES - 22slides
  • 6. Incentives for cooperation when uploading • Monetary systems based on a global currency. • Systems based on cumulative reputations and trust groups • Rule-based systems with memoryless "tit-for-tat" transactions – Typically involve chunk swapping rather than single-chunk (i.e., client-server) transfers. – The peer arrival rate has exponential growth . – Dealing with free riders is important . – The rule is “ tit – for - tat” . PEER-TO-PEER FILE SHARING 22 4 WITH INCENTIVES - 22slides
  • 7. Cumulative reputation system • Avoid interactions with nodes that do not behave. • Information about an actor that can aid in the prediction of future behavior . • As transactions occur, these reputation states will change. • It serves two complementary purposes:  Guide a decision maker’s choice in selecting transaction partners  It can act as an incentive for good behavior for those who fear acquiring bad reputations. • Consequences  Bad reputation : punishment or reduced privileges and isolation.  Good reputation : motivating factor for good behavior. PEER-TO-PEER FILE SHARING 22 5 WITH INCENTIVES - 22slides
  • 8. Cumulative reputation system • Definitions • π j > 0 is the propensity to cooperate of peer j. • Rij is the reputation of j from i’s point of view. • All reputations are normalized at each node. • Gj(π j , R̄ i) is the probability that j responds positively to i’s query. • The response function has the following properties:  G is nondecreasing in both arguments  G(π, R̄) = 0 and π > 0 imply R̄ = 0  G(π,R̄) ≤ π j for all R̄ ∈ [0, 1]. PEER-TO-PEER FILE SHARING 22 6 WITH INCENTIVES - 22slides
  • 9. Cumulative reputation system • Mean value of Ri : PEER-TO-PEER FILE SHARING 22 7 WITH INCENTIVES - 22slides
  • 10. Cumulative reputation system (Simulation) D C B A H E F G PEER-TO-PEER FILE SHARING 22 8 WITH INCENTIVES - 22slides
  • 11. Cumulative reputation system PEER-TO-PEER FILE SHARING 22 9 WITH INCENTIVES - 22slides
  • 12. Cumulative reputation system (Theorem) PEER-TO-PEER FILE SHARING 22 10 WITH INCENTIVES - 22slides
  • 13. Cumulative reputation system (Simulation) PEER-TO-PEER FILE SHARING 22 11 WITH INCENTIVES - 22slides
  • 14. Cumulative reputation system (Simulation)  Reputation of a specific Mean reputation of a node j from i’s specific node jpoint of view β = 0.15 β= 0.95 0.95 N= 100 Nodes PEER-TO-PEER FILE SHARING 22 12 WITH INCENTIVES - 22slides
  • 15. Cumulative reputation system (Simulation) Individual increases indicate successful transaction for which j was provider. Reduction in sample path occur upon successful transaction for which node j was not involved. As expected, reputation converge to the nodes’ propensity to cooperate. PEER-TO-PEER FILE SHARING 22 13 WITH INCENTIVES - 22slides
  • 16. Cumulative reputation system • Sybil Attack • It is named after the subject of the book Sybil • a fictional case study of a woman with multiple personality disorder. • The name was suggested in or before 2002 by Brian Zill at Microsoft Research. PEER-TO-PEER FILE SHARING 22 14 WITH INCENTIVES - 22slides
  • 17. Cumulative reputation system • Sybil Attack  Also known as pseudospoofing,  An attacker acquires multiple identifiers in the system to undermine some function of the system.  if a single faulty entity can present multiple identities it can control a substantial fraction of the system. PEER-TO-PEER FILE SHARING 22 15 WITH INCENTIVES - 22slides
  • 18. Cumulative reputation system (Sybil Attack) A and B select the broadcasts advertisementmalicious node C to Malicious node C non-existent positions of messages of invented Nodes A and B want to send their data towards the Sink. forward their messages. Node C (yellow nodes) non-existent position of nodes overhear s them. PEER-TO-PEER FILE SHARING 22 16 WITH INCENTIVES - 22slides
  • 19. Cumulative reputation system (Sybil Attack) Another example for Sybil attack PEER-TO-PEER FILE SHARING 22 17 WITH INCENTIVES - 22slides
  • 20. Cumulative reputation system (Sybil Attack) • Preventing “Sybil attacks” : One approach is to have a trusted agency certify identities. The system must ensure that distinct identities refer to distinct entities. PEER-TO-PEER FILE SHARING 22 18 WITH INCENTIVES - 22slides
  • 21. Trust groups • Based on trust groups • Lightweight message authentication  In the presence of both lying and spoofing of reputation referrals. • Peer registration mechanisms PEER-TO-PEER FILE SHARING 22 19 WITH INCENTIVES - 22slides
  • 22. Trust groups (Simulation) PEER-TO-PEER FILE SHARING 22 20 WITH INCENTIVES - 22slides
  • 23. Trust groups •One group’s reputation from the point of view of another. •Intra-group transactions were more frequent than inter-groups. •group reputation sample path appears smoother and has a shorter transient phase than the •Depicts an reputation node’s path. individual individual sample mean reputation (within group) •Decreases in the sample path occur less frequently than in non-hierarchical system counterpart because inter-group transactions had no effect (i.e., a lower transaction rate). Reputations fluctuate about their expected mean cooperation value as in the non-hierarchical experiments. PEER-TO-PEER FILE SHARING 22 21 WITH INCENTIVES - 22slides
  • 24. Game-theoretic models of P2P systems • Involve end users that behave in a rationally selfish manner. • Peers may modify their own "default" cooperation level. • Achieve a desired utility from the system . • At the end of each round, peers evaluate their success rate and adjust their uplink rate accordingly to maximize their net utility PEER-TO-PEER FILE SHARING 22 22 WITH INCENTIVES - 22slides
  • 25. References 1. An introduction to communication network analysis , George Kesidis, 2007 , Wiley. 2. Peer-to-Peer Security - Allan Friedman, Harvard University - L Jean Camp, Harvard University 3. The Sybil Attack , John R. Douceur , Microsoft Research , johndo@microsoft.com 4. Cumulative Reputation Systems for Peer-to-Peer Content Distribution ,B. Mortazavi and G. Kesidis,CS&E and EE Depts,The Pennsylvania State University , University Park, PA, 16802 mortazav@cse.psu.edu and kesidis@engr.psu.edu also a member of technical staff at Verizon Wireless 5. And some other Papers and websites like WikiPedia . PEER-TO-PEER FILE SHARING WITH INCENTIVES - 22slides
  • 26. Questions Thank you for your consideration PEER-TO-PEER FILE SHARING WITH INCENTIVES - 22slides