SlideShare une entreprise Scribd logo
1  sur  26
PEER-TO-PEER FILE SHARING WITH INCENTIVES


  Instructor: Dr.Saleh Yosefi
  Student: Amir Maboudi
  maboudi.amir@yahoo.com
  Urmia university
  course: Performance Evaluation




PEER-TO-PEER FILE SHARING
WITH INCENTIVES - 22slides
PEER-TO-PEER FILE SHARING WITH INCENTIVES




  Discussion: Security issues
  Incentives for cooperation when uploading




PEER-TO-PEER FILE SHARING
WITH INCENTIVES - 22slides
Security issues




 •    Security expert Bruce Schneider is often quoted as claiming that “Security is a
      process.”
 •    Centralized or decentralized security administration .
 •    There is a significant overload for performance in p2p.




      Decentralized : Very hard to manage.         Centralized : single point of failure.

 PEER-TO-PEER FILE SHARING
                                             22                                             1
 WITH INCENTIVES - 22slides
Security issues

 • P2P applies at the several levels:

        Network level:
           try to break routing system
               Block access to information by impeding queries
               Partitioning the network

        Application Level:
           Attempt to corrupt or delete data stored in the system or in transit

        User Level:
               The users themselves can be the subject of attacks




 PEER-TO-PEER FILE SHARING
                                              22                                   2
 WITH INCENTIVES - 22slides
Security issues

 • The querying process
        Misforwarding queries (or responses)
        Phony queries


 • The downloading process
          Content pollution (Malwares, Spam)
          Worm spread through P2P file-sharing systems
          Erroneous information
          Discarding queries (or responses)




 PEER-TO-PEER FILE SHARING
                                         22               3
 WITH INCENTIVES - 22slides
Incentives for cooperation when uploading



 • Monetary systems based on a global currency.
 • Systems based on cumulative reputations and trust groups
 • Rule-based systems with memoryless "tit-for-tat" transactions
       – Typically involve chunk swapping rather than single-chunk (i.e., client-server)
         transfers.
       – The peer arrival rate has exponential growth .
       – Dealing with free riders is important .
       – The rule is “ tit – for - tat” .




 PEER-TO-PEER FILE SHARING
                                             22                                            4
 WITH INCENTIVES - 22slides
Cumulative reputation system

• Avoid interactions with nodes that do not behave.
• Information about an actor that can aid in the prediction of future
  behavior .
• As transactions occur, these reputation states will change.


 •    It serves two complementary purposes:
        Guide a decision maker’s choice in selecting transaction partners
        It can act as an incentive for good behavior for those who fear acquiring bad
         reputations.

 •    Consequences
        Bad reputation : punishment or reduced privileges and isolation.
        Good reputation : motivating factor for good behavior.



PEER-TO-PEER FILE SHARING
                                             22                                          5
WITH INCENTIVES - 22slides
Cumulative reputation system
• Definitions
• π j > 0 is the propensity to cooperate of peer j.

•    Rij is the reputation of j from i’s point of view.

•    All reputations are normalized at each node.

•    Gj(π j , R̄ i) is the probability that j responds positively to i’s query.

• The response function has the following properties:
       G is nondecreasing in both arguments
       G(π, R̄) = 0 and π > 0 imply R̄ = 0
       G(π,R̄) ≤ π j for all R̄ ∈ [0, 1].


PEER-TO-PEER FILE SHARING
                                        22                                        6
WITH INCENTIVES - 22slides
Cumulative reputation system

   • Mean value of Ri :




PEER-TO-PEER FILE SHARING
                             22   7
WITH INCENTIVES - 22slides
Cumulative reputation system (Simulation)


                                     D

                                                      C


                                             B
                                 A                        H


                             E           F        G




PEER-TO-PEER FILE SHARING
                                             22               8
WITH INCENTIVES - 22slides
Cumulative reputation system




PEER-TO-PEER FILE SHARING
                             22   9
WITH INCENTIVES - 22slides
Cumulative reputation system (Theorem)




PEER-TO-PEER FILE SHARING
                             22          10
WITH INCENTIVES - 22slides
Cumulative reputation system (Simulation)




PEER-TO-PEER FILE SHARING
                             22             11
WITH INCENTIVES - 22slides
Cumulative reputation system (Simulation)



 Reputation of a specific
Mean reputation of a
node j from i’s
specific node jpoint of view

β = 0.15
β= 0.95
     0.95

N= 100 Nodes




  PEER-TO-PEER FILE SHARING
                               22             12
  WITH INCENTIVES - 22slides
Cumulative reputation system (Simulation)

  Individual increases indicate successful transaction for which
   j was provider.

  Reduction in sample path occur upon successful transaction
   for which node j was not involved.

  As expected, reputation converge to the nodes’ propensity
  to cooperate.




PEER-TO-PEER FILE SHARING
                                       22                           13
WITH INCENTIVES - 22slides
Cumulative reputation system

    • Sybil Attack
    • It is named after the subject of
      the book Sybil
    • a fictional case study of a woman
      with multiple personality disorder.
    • The name was suggested in or
      before 2002 by Brian Zill at
      Microsoft Research.




PEER-TO-PEER FILE SHARING
                                      22    14
WITH INCENTIVES - 22slides
Cumulative reputation system


• Sybil Attack

       Also known as pseudospoofing,

       An attacker acquires multiple identifiers in the system to undermine
        some function of the system.

       if a single faulty entity can present multiple identities it can control a
        substantial fraction of the system.




PEER-TO-PEER FILE SHARING
                                          22                                         15
WITH INCENTIVES - 22slides
Cumulative reputation system (Sybil Attack)




                 A and B select the broadcasts advertisementmalicious node C to
                  Malicious node C non-existent positions of messages of invented
                   Nodes A and B want to send their data towards the Sink.
                 forward their messages. Node C (yellow nodes)
                  non-existent position of nodes overhear s them.


PEER-TO-PEER FILE SHARING
                                             22                                     16
WITH INCENTIVES - 22slides
Cumulative reputation system (Sybil Attack)




                             Another example for Sybil attack




PEER-TO-PEER FILE SHARING
                                            22                  17
WITH INCENTIVES - 22slides
Cumulative reputation system (Sybil Attack)


   • Preventing “Sybil attacks” :

          One approach is to have a trusted agency certify
          identities.

          The system must ensure that distinct identities refer to
          distinct entities.




PEER-TO-PEER FILE SHARING
                                     22                               18
WITH INCENTIVES - 22slides
Trust groups


• Based on trust groups

• Lightweight message authentication
       In the presence of both lying and spoofing of reputation
          referrals.
• Peer registration mechanisms




PEER-TO-PEER FILE SHARING
                                  22                               19
WITH INCENTIVES - 22slides
Trust groups (Simulation)




PEER-TO-PEER FILE SHARING
                             22   20
WITH INCENTIVES - 22slides
Trust groups

•One group’s reputation from the
 point of view of another.
•Intra-group transactions were more
 frequent than inter-groups.
•group reputation sample path
 appears smoother and has a
 shorter transient phase than the
•Depicts an reputation node’s path.
 individual individual sample
 mean reputation (within group)
•Decreases in the sample path occur
 less frequently than in non-hierarchical
 system counterpart because inter-group
 transactions had no effect (i.e., a lower
 transaction rate).

      Reputations fluctuate about their expected mean cooperation value as in the
      non-hierarchical experiments.
   PEER-TO-PEER FILE SHARING
                                             22                                     21
   WITH INCENTIVES - 22slides
Game-theoretic models of P2P systems


• Involve end users that behave in a rationally selfish
  manner.
• Peers may modify their own "default" cooperation
  level.
• Achieve a desired utility from the system .

• At the end of each round, peers evaluate their
  success rate and adjust their uplink rate accordingly
  to maximize their net utility

PEER-TO-PEER FILE SHARING
                             22                           22
WITH INCENTIVES - 22slides
References


1. An introduction to communication network analysis ,
    George Kesidis, 2007 , Wiley.
2. Peer-to-Peer Security - Allan Friedman, Harvard University -
    L Jean Camp, Harvard University
3. The Sybil Attack , John R. Douceur , Microsoft Research ,
   johndo@microsoft.com
4. Cumulative Reputation Systems for Peer-to-Peer Content
   Distribution ,B. Mortazavi and G. Kesidis,CS&E and EE Depts,The
      Pennsylvania State University , University Park, PA, 16802 mortazav@cse.psu.edu
      and kesidis@engr.psu.edu also a member of technical staff at Verizon Wireless
5.    And some other Papers and websites like WikiPedia .


PEER-TO-PEER FILE SHARING
WITH INCENTIVES - 22slides
Questions


                  Thank you for your consideration




PEER-TO-PEER FILE SHARING
WITH INCENTIVES - 22slides

Contenu connexe

Similaire à Peer to-peer file sharing with incentives

Web Application Remediation - OWASP San Antonio March 2007
Web Application Remediation - OWASP San Antonio March 2007Web Application Remediation - OWASP San Antonio March 2007
Web Application Remediation - OWASP San Antonio March 2007Denim Group
 
Cnsm2011
Cnsm2011Cnsm2011
Cnsm2011j22fung
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)NAFCU Services Corporation
 
Site (Service) Reliability Engineering
Site (Service) Reliability EngineeringSite (Service) Reliability Engineering
Site (Service) Reliability EngineeringMark Underwood
 
Enable DevSecOps using JIRA Software
Enable DevSecOps using JIRA SoftwareEnable DevSecOps using JIRA Software
Enable DevSecOps using JIRA SoftwareAUGNYC
 
Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldDenim Group
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...IEEEGLOBALSOFTTECHNOLOGIES
 
Key recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedKey recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedjpstudcorner
 
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information SecurityRyan Elkins
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic SecurityDenim Group
 
ARM'08 - Keynote Talk
ARM'08 - Keynote TalkARM'08 - Keynote Talk
ARM'08 - Keynote TalkLicia Capra
 
Security best practices
Security best practicesSecurity best practices
Security best practicesAVEVA
 
Enable DevSecOps using Jira Software
 Enable DevSecOps using Jira Software Enable DevSecOps using Jira Software
Enable DevSecOps using Jira SoftwareAtlassian
 

Similaire à Peer to-peer file sharing with incentives (20)

Soc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvichSoc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvich
 
Web Application Remediation - OWASP San Antonio March 2007
Web Application Remediation - OWASP San Antonio March 2007Web Application Remediation - OWASP San Antonio March 2007
Web Application Remediation - OWASP San Antonio March 2007
 
Cnsm2011
Cnsm2011Cnsm2011
Cnsm2011
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Wilbert QTI Profile
Wilbert QTI ProfileWilbert QTI Profile
Wilbert QTI Profile
 
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
 
Site (Service) Reliability Engineering
Site (Service) Reliability EngineeringSite (Service) Reliability Engineering
Site (Service) Reliability Engineering
 
Enable DevSecOps using JIRA Software
Enable DevSecOps using JIRA SoftwareEnable DevSecOps using JIRA Software
Enable DevSecOps using JIRA Software
 
Vulnerability Management In An Application Security World
Vulnerability Management In An Application Security WorldVulnerability Management In An Application Security World
Vulnerability Management In An Application Security World
 
Paderborn
PaderbornPaderborn
Paderborn
 
MARS presentation
MARS presentationMARS presentation
MARS presentation
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
 
Key recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedKey recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyed
 
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
 
The Magic of Symbiotic Security
The Magic of Symbiotic SecurityThe Magic of Symbiotic Security
The Magic of Symbiotic Security
 
ARM'08 - Keynote Talk
ARM'08 - Keynote TalkARM'08 - Keynote Talk
ARM'08 - Keynote Talk
 
Security best practices
Security best practicesSecurity best practices
Security best practices
 
Enable DevSecOps using Jira Software
 Enable DevSecOps using Jira Software Enable DevSecOps using Jira Software
Enable DevSecOps using Jira Software
 

Dernier

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Peer to-peer file sharing with incentives

  • 1. PEER-TO-PEER FILE SHARING WITH INCENTIVES Instructor: Dr.Saleh Yosefi Student: Amir Maboudi maboudi.amir@yahoo.com Urmia university course: Performance Evaluation PEER-TO-PEER FILE SHARING WITH INCENTIVES - 22slides
  • 2. PEER-TO-PEER FILE SHARING WITH INCENTIVES Discussion: Security issues Incentives for cooperation when uploading PEER-TO-PEER FILE SHARING WITH INCENTIVES - 22slides
  • 3. Security issues • Security expert Bruce Schneider is often quoted as claiming that “Security is a process.” • Centralized or decentralized security administration . • There is a significant overload for performance in p2p. Decentralized : Very hard to manage. Centralized : single point of failure. PEER-TO-PEER FILE SHARING 22 1 WITH INCENTIVES - 22slides
  • 4. Security issues • P2P applies at the several levels:  Network level:  try to break routing system  Block access to information by impeding queries  Partitioning the network  Application Level:  Attempt to corrupt or delete data stored in the system or in transit  User Level:  The users themselves can be the subject of attacks PEER-TO-PEER FILE SHARING 22 2 WITH INCENTIVES - 22slides
  • 5. Security issues • The querying process  Misforwarding queries (or responses)  Phony queries • The downloading process  Content pollution (Malwares, Spam)  Worm spread through P2P file-sharing systems  Erroneous information  Discarding queries (or responses) PEER-TO-PEER FILE SHARING 22 3 WITH INCENTIVES - 22slides
  • 6. Incentives for cooperation when uploading • Monetary systems based on a global currency. • Systems based on cumulative reputations and trust groups • Rule-based systems with memoryless "tit-for-tat" transactions – Typically involve chunk swapping rather than single-chunk (i.e., client-server) transfers. – The peer arrival rate has exponential growth . – Dealing with free riders is important . – The rule is “ tit – for - tat” . PEER-TO-PEER FILE SHARING 22 4 WITH INCENTIVES - 22slides
  • 7. Cumulative reputation system • Avoid interactions with nodes that do not behave. • Information about an actor that can aid in the prediction of future behavior . • As transactions occur, these reputation states will change. • It serves two complementary purposes:  Guide a decision maker’s choice in selecting transaction partners  It can act as an incentive for good behavior for those who fear acquiring bad reputations. • Consequences  Bad reputation : punishment or reduced privileges and isolation.  Good reputation : motivating factor for good behavior. PEER-TO-PEER FILE SHARING 22 5 WITH INCENTIVES - 22slides
  • 8. Cumulative reputation system • Definitions • π j > 0 is the propensity to cooperate of peer j. • Rij is the reputation of j from i’s point of view. • All reputations are normalized at each node. • Gj(π j , R̄ i) is the probability that j responds positively to i’s query. • The response function has the following properties:  G is nondecreasing in both arguments  G(π, R̄) = 0 and π > 0 imply R̄ = 0  G(π,R̄) ≤ π j for all R̄ ∈ [0, 1]. PEER-TO-PEER FILE SHARING 22 6 WITH INCENTIVES - 22slides
  • 9. Cumulative reputation system • Mean value of Ri : PEER-TO-PEER FILE SHARING 22 7 WITH INCENTIVES - 22slides
  • 10. Cumulative reputation system (Simulation) D C B A H E F G PEER-TO-PEER FILE SHARING 22 8 WITH INCENTIVES - 22slides
  • 11. Cumulative reputation system PEER-TO-PEER FILE SHARING 22 9 WITH INCENTIVES - 22slides
  • 12. Cumulative reputation system (Theorem) PEER-TO-PEER FILE SHARING 22 10 WITH INCENTIVES - 22slides
  • 13. Cumulative reputation system (Simulation) PEER-TO-PEER FILE SHARING 22 11 WITH INCENTIVES - 22slides
  • 14. Cumulative reputation system (Simulation)  Reputation of a specific Mean reputation of a node j from i’s specific node jpoint of view β = 0.15 β= 0.95 0.95 N= 100 Nodes PEER-TO-PEER FILE SHARING 22 12 WITH INCENTIVES - 22slides
  • 15. Cumulative reputation system (Simulation) Individual increases indicate successful transaction for which j was provider. Reduction in sample path occur upon successful transaction for which node j was not involved. As expected, reputation converge to the nodes’ propensity to cooperate. PEER-TO-PEER FILE SHARING 22 13 WITH INCENTIVES - 22slides
  • 16. Cumulative reputation system • Sybil Attack • It is named after the subject of the book Sybil • a fictional case study of a woman with multiple personality disorder. • The name was suggested in or before 2002 by Brian Zill at Microsoft Research. PEER-TO-PEER FILE SHARING 22 14 WITH INCENTIVES - 22slides
  • 17. Cumulative reputation system • Sybil Attack  Also known as pseudospoofing,  An attacker acquires multiple identifiers in the system to undermine some function of the system.  if a single faulty entity can present multiple identities it can control a substantial fraction of the system. PEER-TO-PEER FILE SHARING 22 15 WITH INCENTIVES - 22slides
  • 18. Cumulative reputation system (Sybil Attack) A and B select the broadcasts advertisementmalicious node C to Malicious node C non-existent positions of messages of invented Nodes A and B want to send their data towards the Sink. forward their messages. Node C (yellow nodes) non-existent position of nodes overhear s them. PEER-TO-PEER FILE SHARING 22 16 WITH INCENTIVES - 22slides
  • 19. Cumulative reputation system (Sybil Attack) Another example for Sybil attack PEER-TO-PEER FILE SHARING 22 17 WITH INCENTIVES - 22slides
  • 20. Cumulative reputation system (Sybil Attack) • Preventing “Sybil attacks” : One approach is to have a trusted agency certify identities. The system must ensure that distinct identities refer to distinct entities. PEER-TO-PEER FILE SHARING 22 18 WITH INCENTIVES - 22slides
  • 21. Trust groups • Based on trust groups • Lightweight message authentication  In the presence of both lying and spoofing of reputation referrals. • Peer registration mechanisms PEER-TO-PEER FILE SHARING 22 19 WITH INCENTIVES - 22slides
  • 22. Trust groups (Simulation) PEER-TO-PEER FILE SHARING 22 20 WITH INCENTIVES - 22slides
  • 23. Trust groups •One group’s reputation from the point of view of another. •Intra-group transactions were more frequent than inter-groups. •group reputation sample path appears smoother and has a shorter transient phase than the •Depicts an reputation node’s path. individual individual sample mean reputation (within group) •Decreases in the sample path occur less frequently than in non-hierarchical system counterpart because inter-group transactions had no effect (i.e., a lower transaction rate). Reputations fluctuate about their expected mean cooperation value as in the non-hierarchical experiments. PEER-TO-PEER FILE SHARING 22 21 WITH INCENTIVES - 22slides
  • 24. Game-theoretic models of P2P systems • Involve end users that behave in a rationally selfish manner. • Peers may modify their own "default" cooperation level. • Achieve a desired utility from the system . • At the end of each round, peers evaluate their success rate and adjust their uplink rate accordingly to maximize their net utility PEER-TO-PEER FILE SHARING 22 22 WITH INCENTIVES - 22slides
  • 25. References 1. An introduction to communication network analysis , George Kesidis, 2007 , Wiley. 2. Peer-to-Peer Security - Allan Friedman, Harvard University - L Jean Camp, Harvard University 3. The Sybil Attack , John R. Douceur , Microsoft Research , johndo@microsoft.com 4. Cumulative Reputation Systems for Peer-to-Peer Content Distribution ,B. Mortazavi and G. Kesidis,CS&E and EE Depts,The Pennsylvania State University , University Park, PA, 16802 mortazav@cse.psu.edu and kesidis@engr.psu.edu also a member of technical staff at Verizon Wireless 5. And some other Papers and websites like WikiPedia . PEER-TO-PEER FILE SHARING WITH INCENTIVES - 22slides
  • 26. Questions Thank you for your consideration PEER-TO-PEER FILE SHARING WITH INCENTIVES - 22slides