An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System
|
|
|
- Elfrieda Hardy
- 10 years ago
- Views:
Transcription
1 An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System Takuya Nishikawa and Satoshi Fujita Department of Information Engineering, Hiroshima University Kagamiyama 1-4-1, Higashi-Hiroshima, Japan {taku42, Abstract Peer-to-Peer (P2P) systems have attracted considerable attention in recent years, as a key technology to realize scalable, dependable network services. However, because of its high anonymity, P2P systems involve several flaws such as the weakness against malicious attacks by anonymous peers. In this paper, we propose a method to evaluate the trustfulness of each peer by explicitly taking into account the reliability of mutual evaluations. The proposed method is an improvement of the EigenTrust algorithm proposed by Kamvar et al. which calculates a global trust vector consistent with the observed local trust vectors under the weighted sum in a linear space. The performance of the proposed method is evaluated by simulation. The result of simulations indicates that the proposed method identifies a large subset of reliable peers with sufficiently small number of message transmissions compared with previous schemes including the original EigenTrust. I. INTRODUCTION Trust management is a key issue in realizing dependable computer systems in an open environment such as the Internet. Thus far, many trust management schemes have been proposed in the literature [2], [5], [6], [7]. The main objective of trust management is to make assessments and decisions regarding the dependability of potential transactions involving risk, and to allow users and the system owners to increase and correctly represent the reliability of themselves and their systems [1]. In particular, the goal of a trust management in distributed environments is to identify potential risk of operations conducted by malicious users and to certify the dependability of distributed systems using several sources of information, such as the access log of each user, stochastic behavior of the users, and the reputation about the reliability of the other users. Among them, the reputation of users is considered to be a rich source of dependability information for many online applications, to assess the reliability of each user in a distributed environment. In fact, many online auction systems such as ebay 1, ebid 2, and OZtion 3 try to increase their dependability by allowing customers to make an assessment of their past counterparty, and by disclosing the result of such assessments to all users. By referring to those assessments, each user can identify malicious users who involve potential risks, such as the possibility of the download of contaminated files, a long delay of transactions, and a sudden cancellation of ongoing transactions. A critical problem in such a reputation-based trust management is that the reputation given by a malicious user may not be reliable. Although it would be possible to omit all reputations given by suspicious users, we cannot identify sufficient number of reliable users under such a pessimistic approach. We need to carefully take into account the reputation of every user (including suspicious ones) to identify as large number of reliable users as possible. In this paper, we propose a systematic way to realize such an assessment. As a basic infrastructure, we focus on the EigenTrust trust management system [2] proposed by Kamvar et al. As will be described later, the main idea of the EigenTrust is to deal with the transitivity of the trust of users in a linear space; i.e., under the model adopted in the EigenTrust, if a evaluates the reliability of b as 0.5, and b evaluates the reliability of c as 0.5, then a (indirectly) evaluates the reliability of c as = Such an approach would work well if every user can make an assessment accurately, but in actual situations, the assessment conducted by unreliable users may not be accurate, and such an inaccuracy increases the risk of overlooking malicious users in identifying a set of reliable users. In the proposed reputation management scheme, we take into account such an inaccurate evaluation by ex
2 plicitly providing low priority to those evaluations. More concretely, we propose two different ways of selecting reliable neighbors during the calculation of the trust values under the EigenTrust algorithm. The accuracy and the efficiency of the proposed scheme are evaluated by simulation. The result of simulations indicates that the proposed scheme can improve the accuracy of the original EigenTrust, and simultaneously, can significantly reduce the amount of message transmissions. The remainder of this paper is organized as follows. Section II describes the EigenTrust algorithm and its variants. Section III describes the proposed method. The result of simulations is summarized in Section IV. Finally, Section V concludes the paper with future works. II. EIGENTRUST Consider a P2P system consisting of a number of homogeneous peers. Each peer i is assigned a real number t(i) [0, 1] called trust value, where each peer is regarded as being reliable if it is assigned a trust value close to one. The trust value of a peer can not be directly referred by the other peers, while we assume that the trust value of peer j can be evaluated by any peer in the system by conducting a transaction with j, and will say that peer i trusts j if i evaluates that j is reliable. A. Algorithm EigenTrust [2] is a reputation management algorithm based on the notion of transitive trust, in a sense that if peer i trusts peer j, then peer i would also trust peers trusted by j. Let c ij denote the local trust value of j which is locally calculated by i through transactions with j such as a file download and a query processing. More concretely, it is calculated by the number of satisfactory or unsatisfactory transactions conducted between i and j, and is normalized to a real number in [0, 1] (if there were no transactions between them, c ij is calculated to be 0). Given such a set of local trust values, peer i can estimate the trust value of peer k, in the following manner: t ik = j c ij c jk, (1) that is, the estimated trust value t ik is calculated by collecting all local trust values for peer k, and by taking a weighted sum of those values, where the weight of value c jk is the local trust value of j calculated by i. Let c i denote the local trust vector calculated by i, and t i denote a vector of estimated trust values calculated by using Equation (1). Then, by using matrix C of local trust values, this equation can be restated as follows: t i = C T c i. (2) The reader should note that in the above equation, t i reflects the local trust values calculated by the immediate neighbors of i, whereas c i merely reflects the local trust values of i. This indicates that, by multiplying C T to t i from the left, we can obtain a refined trust vector reflecting the local trust values of the peers within distance two from i. By repeating similar operation, we will have a stationary vector t such that t = (C T ) x c i (3) for some x 1, since if C is aperiodic and strongly connected, then powers of matrix C converges to a stable value at some point. Such a vector t is known as the left principal eigenvector of the matrix C, and since it is independent of the selection of peer i, it can be regarded as a global trust vector in the system, in a sense that the j th element in t represents the global trust value of peer j. It would be worth noting here that the resulting vector t may not coincide with the actual trust vector, since the above observation merely claims that the vector consistently explains the local trust values under the weighted sum represented in Equation (1). The calculation of such a stationary vector t can be conducted in a straightforward and approximated manner. More concretely, by assuming that each peer knows the whole matrix C, it may repeat a multiplication of C T to the current vector from the left, until the difference to the previous vector becomes smaller than a predetermined threshold. B. Variants In the literature, several variants of the EigenTrust have been proposed. Abrams et al. [3] introduced the notion of cyclic partitioning to the EigenTrust, to prevent selfish peers from maliciously increasing their trust values by manipulating the local trust values of the colluding peers. In this method, the set of peers are evenly partitioned into m subsets (i.e., colors), and those colors are arranged into a directed cycle. Each color has n m or n m peers, where n denotes the number of peers in the P2P system. Each peer in color c can send a query and receive a service merely from a peer in its successor color succ(c) in the directed cycle, but cannot directly evaluate the peers in succ(c). More concretely, the outgoing links from color c are set to be uniform over succ(c), and then during the calculation of the global trust vector t, peer i should
3 replace element c ij in the matrix C by m/n for any j. By this modification, we can realize a situation in which the local trust values provided by each peer in color c does not directly affect the calculation of the global trust vector of the peers in color c, and it effectively removes an incentive to give a wrong reputation to itself or the colluding peers. Donato et al. [4] assume the existence of two different types of malicious peers, and proposed several extensions of the EigenTrust. The first type is a peer which always uploads inauthentic files to the other peers. Peers of the second type, called spies, return authentic files only to popular queries, and return inauthentic files to the other queries. Both types of peers assign positive local trust values only to malicious peers. In order to eliminate the effect of such malicious peers, Donato et al. introduced a logical network called positive opinion network in which a directed link is inserted from peer i to peer j only when i downloads authentic files from j, where each link is weighted by the number of authentic files downloaded from j. Inverse EigenTrust is a reputation management scheme which applies the EigenTrust to the transpose of a positive opinion network called an inverse network. By definition, any good peer cannot reach a malicious peer through a directed path in an inverse network. Therefore, under the Inverse EigenTrust, a good peer can always calculate the score of malicious peers to be zero. Let I(i) be the trust value of i calculated under the Inverse EigenTrust, and E(i) be the trust value calculated by applying the original EigenTrust to the positive opinion network. In the Donato et al. s scheme, in order to disregard the opinion of spies, the trust value of peer i is calculated to be 0 if I(i) = 0, and E(i) otherwise. Note that the first condition can be relaxed to I(i) < θ for some threshold θ, in order to eliminate cases in which malicious peers assign positive trust values to a small percentage of good peers, since peers can reach malicious peers on an inverse network in such a situation and I(i) of malicious peers cannot be 0. A. Overview III. MAIN RESULTS In this paper, we extend the reputation management conducted under the EigenTrust with the following three directions. In the first direction, we will introduce the notion of certainty of local trust values calculated by each participating peer. Recall that in the original Eigen- Trust, such a certainty was partially took into account as a weight of the peer while conducting a summation of TABLE I DIFFERENCE OF THE PROPOSED SCHEME proposed scheme EigenTrust Certainty of trust values Blurred according Not blurred to trust value Collection of trust values Within fixed TTL Whole network Spreading of trust values Do Not do Pre-trusted peers Not exist Exist the elements contained in the current vector t i, and it is based on an assumption that if peer j is evaluated to be unreliable by a peer, then it would also be evaluated to be unreliable by the other peers. However, such a simple method does not exclude the effect of a malicious behavior of unreliable peers such that j bahaves honestly during transactions with i but it behaves unhonestly during transactions with i. In the following, we model such an uncertainty by using a probabilistic approach, and extend the EigenTrust to take into account such malicious behaviors of unreliable peers. The second direction is a reduction of the number of message transmissions during the calculation of a global trust vector in a distributed environment. As was described earlier, the EigenTrust assumes that every peer knows the whole matrix C before starting the calculation, but it requires a large amount of message transmissions proportional to the square of the number of peers to exchange all local trust values among all peers. Thus, if we could effectively skip the communication to a number of (unreliable) peers, it could significantly reduce the traffic of the scheme. The third direction is to avoid sacrifycing the quality of the solution. If we skip the communication to several peers, the amount of local trust values we can collect will decrease and the accuracy of caluculation of global trust vectors may become low. In order to overcome such an inaccuracy of calculation, we introduce a method which enables us to collect local trust values from enough number of peers without significantly increasing the amount of message transmissions. The modifications to the EigenTrust are summerized in Table I. The details of the modifications are described in the following sections. B. Model of Unreliable Peers In the proposed method, we assume that an evaluation conducted by a reliable peer is accurate, but an evaluation conducted by an unreliable peer may not be accurate. In order to formalize such an uncertainty, we introduce a range-based approximation model described
4 below (in what follows, we call this model RBA); when i evaluates j, the local trust value c ij is randomly selected from the following range with uniform probability: [max{0, t(j) + t(i) 1}, min{1, t(j) t(i) + 1}]. By definition, the resulting value c ij coincides with the actual trust value t(j) of j if t(i) = 1, and the value will be blurred as decreasing the value of t(i); e.g., if t(i) = 0.8, such a blur increases to 0.2 (= 1 t(i)), and the value of c ij becomes a random real number in [max{0, t(j) 0.2}, min{1, t(j) + 0.2}]. In addition to the above assumption, in the following, we will assume that there are no absolutely reliable peers whose existence is known to all peers. Such peers are called pre-trusted peers in [2]. Pre-trusted peers play an important role to improve the efficiency in the original EigenTrust algorithm, although in practice, it is hard to assume the existence of such peers. C. Problem In this paper, we consider a problem of identifying reliable peers from a collection of local trust values, which is informally stated as follows: Given a set of local trust values distributed over a network, identify a set of reliable peers as accurate as possible with as small number of message transmissions as possible. Here, we should notice that in many practical situations, the risk of mis-identifying unreliable peers as a reliable peer is much higher than the risk of mis-identifying reliable peers as an unreliable peer. In other words, a concrete goal of the above abstract problem should be to identify a large subset of reliable peers with as small number of message transmissions as possible. In the following, we call this problem MAX REL. Note that it is completely different from the reputation management problem considered in the EigenTrust. In fact, it is easy to see that the global trust vector calculated by the EigenTrust is not sufficient as a solution to the problem MAX REL under the RBA model. To see this in detail, let us consider an example consisting of three peers i, j, and k. Suppose t(i) = 1, c ij = 0.7 and c jk = 0.5. In the EigenTrust algorithm, peer i estimates the trust value of k through j as c ij c jk = = On the other hand, since t(i) = 1, c ij coincides with the actual trust value of j, i.e., t(j) = 0.7. Thus, the actual trust value of peer k is at least 0.2 (= ) and at most 0.8 (= ); i.e., there is a risk to believe that the trust value of k is 0.35 since there is a possibility that the actual trust value of the peer is 0.2. D. Algorithm Under the RBA model, the local trust value calculated by each unreliable peer is not accurate in a sense that the degree of inaccuracy is proportional to the actual trust value of the evaluator. This means that the calculation result of unreliable peers involves a risk of unexpected situation in which an unreliable peer is mis-identified to be reliable. In order to avoid such situations, in the proposed scheme, we will take an approach to selectively omit the local trust value calculated by unreliable peers. It is worth noting here that to realize such an omission in an effective manner, we have to make a decision on the reliability of particular peers before completing the calculation of their trust value. In addition, we should avoid to omit all suspicious values, since our objective is to identify as large subset of reliable peers as possible. 1) Selective Query Forwarding: The basic idea of the proposed scheme is as follows. Consider a directed graph G such that the vertex set is the set of peers, and for any pair of peers i and j, an edge is placed from i to j iff c ij > 0. Peer i tries to collect local trust values from peers in the graph by disseminating a query message along directed edges in G, in such a way that: 1) the query reaches peers which have high reliability, and 2) the query does not reach peer j if it is not connected with i through a path consisting of reliable peers. A query has a fixed TTL (Time To Live), and the range of the region to which the query reaches is restricted by the TTL. Each peer who received a query from an adjacent peer returns its local trust values to the source of the query message. More concretely, in the proposed method, we adopt the following two query forwarding rules: In the first rule, peer i forwards the received query to all neighbors j such that c ij θ i, where θ i is the average of local trust values calculated by i. In the second rule, peer i forwards the received query to its neighbors in a non-increasing order of their local trust value, until the sum of local trust values of the peer who have received the query exceeds a threshold θ i. The threshold θ i is determined as the percentage of the number of neighbors such that c ij θ i, where θ i is the threshold used in the first rule. In both rules, peer i does not forward a query if it is received from k such that c ik = max j {c ij }, in order to avoid unnecessary query forwarding to the peers with low trust values. We call a neighbor of i is reliable if it receives a query from i. Note that in each rule, each peer forwards a query only to its reliable neighbors.
5 Fig. 1. A situation forwarding of query should be stopped. To see the meaning of each rule in more detail, let us consider the following concrete example. Assume that peer i has five neighbors, 1, 2, 3, 4 and 5, and that i calculates its local trust vector c i as follows: ( ). Thresholds θ i and θ i are fixed to 0.20 and 0.60 (= 3/5), respectively. Suppose that i receives a query from peer 5, and will forward it to its neighbors. In the first rule, it sends the query to peers 1, 3 and 4, since their local trust values are at least θ i. In contrast, in the second rule, target peers are sequentially selected in a non-increasing order of the local trust values; i.e., it first selects peer 1 since its local trust value is the largest, and it proceeds to the selection of the second peer since the sum of local trust values is 0.35 θ i (= 0.60). Peer i selects peer 4 as the second target, and the procedure stops at this point since the sum of local trust values becomes = 0.65 > θ i. Figure 1 illustrates another example in which peer i does not forward a query received from peer 1 to its neighbors. In fact, i can not forward the received query, since it is received from a peer with the largest local trust value. 2) Spreading of Local Trust Values: In addition to the above query forwarding rules, in the proposed scheme, we adopt the following spreading scheme which will be used with the selective query forwarding scheme in a combined manner. The aim of the spreading scheme is to disseminate the local trust value of each peer to its neighbors beforehand, to reduce the cost of query forwarding. The spread of local trust values is controlled by a TTL. A local trust vector received from a neighbor is cached into its local storage, and is forwarded to other neighbors only if it comes from a reliable neighbor. Then, the overall query forwarding scheme is modified in such a way that each peer returns a collection of local trust values cached in its local storage (including its own local trust values) as a response to a query received from an adjacent peer. In summary, our proposed scheme could reduce the risk of unreliable reputation by adopting a selective query forwarding rule, and reduce the cost of query forwarding by adopting a (pre)spread of the local trust vectors to the neighbors. Local trust values which could not be acquired through the above schemes are simply assumed to be zero, and each peer locally applies the EigenTrust algorithm to the collected partial information to calculate an approximated global trust vector. Each peer then determines the reliability of the other peers by referring to the calculated global trust values, e.g., it can output a subset of peers whose global trust value exceeds a threshold as a set of reliable peers. IV. EXPERIMENTS In order to evaluate the effectiveness of the proposed scheme, we conducted simulations. More concretely, we compare the effectiveness of the proposed scheme with the original EigenTrust with respect to the accuracy of estimation and the number of message transmissions. A. Metric Under the RBA model, the local trust value calculated by each peer involves an inaccuracy proportional to the reliability of the evaluator, and it takes a random value in a range determined by the inaccuracy. This implies that it is impossible to exactly estimate the actual trust value by any scheme under the model. In the following, we will evaluate the accuracy of reputation management schemes by the number of mis-identifications under the model. Recall that in each reputation management scheme considered in this paper, each peer i autonomously conducts a calculation of the global trust vector, and the resulting vector may differ for each i. Let X denote a list of peers which is arranged in a non-increasing order of the actual trust values. Let t i denote the global trust vector calculated by i, and let Y i denote a list of peers which is arranged in a nonincreasing order of the values in vector t i. For example, if the global trust vector t i is calculated as ( ) then the list Y i is determined as (3, 2, 4, 1)
6 TABLE II SIMULATION SETTINGS. # of peers 1000 average # of neighbors 6.0 minimum # of neighbors 3 trust value of high trust peers [0.8, 1.0] trust value of low trust peers [0.0, 0.2] TTL of query for collecting trust value 3 since value 0.9 for peer 4 is the largest, value 0.5 for peer 2 is the second largest, and so on. As was mentioned earlier, the risk of mis-identifying unreliable peers as a reliable peer is much higher than the risk of mis-identifying reliable peers as an unreliable peer. Thus in the following, we evaluate the risk of the resulting list Y i, by counting the number of peers in the bottom σ% of list X (i.e., peers whose actual trust value is low) which appear in the top σ% of list Y i (i.e., peers which were mis-identified to be reliable by the scheme). We will analyze the accuracy of the schemes by varying σ from 10% to 30%. The number of such misidentifications should be bounded as small as possible. In the following, for brevity, we call a peer with a low actual trust value a low trust peer, and a peer with a high actual trust value a high trust peer. B. Results Table II summarizes parameters fixed in the simulations. In the following, the other parameters such as LTP, TTL b, and σ are changed appropriately, where LTP denotes the percentage of unreliable peers in the network and TTL b denotes the TTL used in the spreading scheme. Figure 2 illustrates the simulation result. The horizontal axis of the figure is the LTP which varies from 10% to 90%, and the vertical axis is the percentage of mis-identifications, where other parameters are fixed as TTL b = 2 and σ = 30. Figure 2(a) shows the accuracy of the estimation calculated by a high trust peer, and Figure 2(b) shows that of a low trust peer. We can observe from the figures that for any value of the LTP, the proposed peer selection rules certainly exhibit a better performance than the EigenTrust algorithm. In Figure 2(b), however, when the percentage of low trust peers exceeds 30%, the number of mis-identifications increases rapidly. This is because low trust peers are likely to estimate neighbors inaccurately under the RBA model, and the behavior of peers such that a query is forwarded only to reliable neighbors does not work well. It should be noted here that although we could observe another increase of mis-identifications for small LTPs (a) Calculated by high trust peer. (b) Calculated by low trust peer. Fig. 2. The number of mis-identifications in the top 30% of Y i. such as 10% or 20%, it does not bother. In fact, when LTP=10%, the upper 20% of the bottom 30% of the list X should consist of high trust peers (recall that LTP=10% implies that 90% of the peers are high trust peers). Thus, even if all of such peers are estimated as a high trust peer, it does not cause a risk. Figure 3 illustrates the impact of the TTL b to the accuracy of the schemes. As shown in the figure, for small LTPs, the accuracy increases as increasing TTL b, since each peer can collect a large amount of local trust values from trustable peers. In addition, for large LTPs, the number of mis-identifications rapidly becomes low, particularly under the second rule for the query forwarding (however, this tendency becomes small as increasing TTL b ). This reason is mentioned below. In our modified schemes, each peer keeps its own matrix C, and an entry corresponding to peer j in the global trust vector calculated from the matrix by peer i takes value zero if i is not connected to j through
7 (a) Under the first rule. Fig. 4. The number of non-zero entries. (b) Under the second rule. Fig. 3. The impact of T T L b. a directed path consisting of reliable peers. Such an invisibility of unreliable peers would be a key point in the proposed scheme to reduce the risk of unreliable reputations. Thus, in order to verify the above conjecture, we counted the number of peers whose trust values are non-zero in the global trust vector calculated by a peer. Figure 4 illustrates the result. This figure indicates that for large LTPs, a query issued by a peer certainly reaches a very restricted region of the network, so that the amount of non-zero entries becomes very low. For example, if LTP=70%, the percentage of non-zero entries is 85% under the first rule, and it is only 20% under the second rule. This is why the number of misidentifications sharply becomes low under the second rule in Figure 3(b). Comparing these two query forwarding rules, the first rule shows relatively better performance for small LTPs and the second rule shows that for large LTPs. We can observe the advantage of the first rule about non-zero Fig. 5. The number of message transmissions. entry. Under the second rule, the number of non-zero entry is very small and we may not estimate the global trust value of many peers when LTP is large. On the other hand, under the first rule, the number of non-zero entry is relatively large for any value of the LTPs. Finally, we evaluate the number of message transmissions under the schemes. In the evaluation, we accumulated messages issued for spreading local trust values and queries for collecting local trust values. Figure 5 illustrates the result. We can observe from the figure that the proposed schemes significantly reduce the amount of transmitted messages, although it gradually increases as increasing the TTL used in the spreading scheme. In summary, we can conclude that the proposed schemes can improve the accuracy of the original Eigen- Trust, and simultaneously, can significantly reduce the amount of message transmissions.
8 V. CONCLUDING REMARKS In this paper, we proposed a model of the reputation of peers which reflects the inaccuracy of evaluation conducted by unreliable peers. We then proposed an improvement of the EigenTrust algorithm which increase the accuracy of estimation while reducing the traffic of the underlying P2P overlay. The performance of the proposed schemes is evaluated by simulations. An interesting direction for further research is to compare the performance of the proposed scheme with other trust models and schemes. REFERENCES [1] W. M. Grudzewski, I. K. Hejduk, A. Sankowska and M. Watuchowicz, Trust Management in Virtual Work Environments: A Human Factors Perspective. CRC Press Taylor & Francis Group, 2008, p.38. [2] S. D. Kamvar, M. T. Shlosser and H. Garcia-Molina, The Eigen- Trust Algorithm for Reputation Management in P2P Networks, in Proc. of the 12th International Conference on World Wide Web, 2003, pp [3] Z. Abrams, R. McGrew and S. Plotkin, A Non-manipurable Trust System Based on EigenTrust, SIGecom Exchange, vol.5, no.4, pp.21-30, July [4] D. Donato, M. Paniccia, M. Selis, C. Castillo, G. Cortese and S. Leonardi, New Metrics for Reputation Management in P2P Networks, in International Workshop on Adversarial Information Retrieval on the Web, 2007, pp [5] Y. Ito and H. Kawano, Evaluation of P2P Contents Distribution System with Cryptographic Trust Chains, DBSJ Letters, vol.6, no.1, pp.21-24, June [6] Y. Jin, Y. Zhang, W. Qu, Y. Liu and K. Li, A Trust Model Based on Similarity Evaluation in P2P Networks, in Proc. of International Symposium on Parallel and Distributed Procesing with Applications, 2008, pp [7] Y. Wang and J. Vassileva, Trust and Reputation Model in Peerto-Peer Networks, Proc. of Third International Conference on Peer-to-Peer Computing, 2003, pp
Reputation Management in P2P Networks: The EigenTrust Algorithm
Reputation Management in P2P Networks: The EigenTrust Algorithm by Adrian Alexa supervised by Anja Theobald 1 Introduction Peer-to-Peer networks is a fast developing branch of Computer Science and many
A Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
Trust and Reputation Management
Trust and Reputation Management Omer Rana School of Computer Science and Welsh escience Centre, Cardiff University, UK Omer Rana (CS, Cardiff, UK) CM0356/CMT606 1 / 28 Outline 1 Context Defining Trust
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems
A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba University of Waterloo, Waterloo, Canada {lmekouar, iraqi, rboutaba}@bbcr.uwaterloo.ca
Reputation Management Algorithms & Testing. Andrew G. West November 3, 2008
Reputation Management Algorithms & Testing Andrew G. West November 3, 2008 EigenTrust EigenTrust (Hector Garcia-molina, et. al) A normalized vector-matrix multiply based method to aggregate trust such
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
Solution of Linear Systems
Chapter 3 Solution of Linear Systems In this chapter we study algorithms for possibly the most commonly occurring problem in scientific computing, the solution of linear systems of equations. We start
Maximum Likelihood Estimation of Peers Performance in P2P Networks
Maximum Likelihood Estimation of Peers Performance in P2P Networks Zoran Despotovic, Karl Aberer EPFL - Swiss Federal Institute of Technology Lausanne, Switzerland email:{zoran.despotovic, karl.aberer}@epfl.ch
1 o Semestre 2007/2008
Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008 Outline 1 2 3 4 5 Outline 1 2 3 4 5 Exploiting Text How is text exploited? Two main directions Extraction Extraction
Social Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
Experiments on the local load balancing algorithms; part 1
Experiments on the local load balancing algorithms; part 1 Ştefan Măruşter Institute e-austria Timisoara West University of Timişoara, Romania [email protected] Abstract. In this paper the influence
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs Ashish Tapdiya and Errin W. Fulp Department of Computer Science Wake Forest University Winston Salem, NC, USA nsg.cs.wfu.edu Email:
ONLINE REPUTATION SYSTEMS
ONLINE REPUTATION SYSTEMS YUYE WANG 1 CPSC 557: Sensitive Information in a Wired World Professor: Joan Feigenbaum Date: 12 Nov, 2013 Identity Reput ation Trust 2 TRUST SYSTEM Trust system, guide people
Least-Squares Intersection of Lines
Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
Trust and Reputation Management in Distributed Systems
Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania ([email protected])
Task Similarity-Based Task Allocation Approach in Multi-Agent Engineering Software Systems
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING Task Similarity-Based Task Allocation Approach in Multi-Agent Engineering Software Systems YIFENG ZHOU 1, CHAO FEI, WANYUAN WANG 1 Research Center for Learning
Using Generalized Forecasts for Online Currency Conversion
Using Generalized Forecasts for Online Currency Conversion Kazuo Iwama and Kouki Yonezawa School of Informatics Kyoto University Kyoto 606-8501, Japan {iwama,yonezawa}@kuis.kyoto-u.ac.jp Abstract. El-Yaniv
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department
Truthful and Non-Monetary Mechanism for Direct Data Exchange
Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {ihou, yupinhsu, spalex}@tamu.edu
Fast Sequential Summation Algorithms Using Augmented Data Structures
Fast Sequential Summation Algorithms Using Augmented Data Structures Vadim Stadnik [email protected] Abstract This paper provides an introduction to the design of augmented data structures that offer
7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
ASecure Hybrid Reputation Management System for Super-Peer Networks
ASecure Hybrid Reputation Management System for Super-Peer Networks Ghassan Karame Department of Computer Science ETH Zürich 892 Zürich, Switzerland karameg@infethzch Ioannis T Christou Athens Information
Modeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
On Correlating Performance Metrics
On Correlating Performance Metrics Yiping Ding and Chris Thornley BMC Software, Inc. Kenneth Newman BMC Software, Inc. University of Massachusetts, Boston Performance metrics and their measurements are
Vector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
Metric Spaces. Chapter 7. 7.1. Metrics
Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some
On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2
On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS
ABSTRACT KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS In many real applications, RDF (Resource Description Framework) has been widely used as a W3C standard to describe data in the Semantic Web. In practice,
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
Solving Geometric Problems with the Rotating Calipers *
Solving Geometric Problems with the Rotating Calipers * Godfried Toussaint School of Computer Science McGill University Montreal, Quebec, Canada ABSTRACT Shamos [1] recently showed that the diameter of
Sybilproof Reputation Mechanisms
Sybilproof Reputation Mechanisms Alice Cheng Center for Applied Mathematics Cornell University, Ithaca, NY 14853 [email protected] Eric Friedman School of Operations Research and Industrial Engineering
Characterization and Modeling of Packet Loss of a VoIP Communication
Characterization and Modeling of Packet Loss of a VoIP Communication L. Estrada, D. Torres, H. Toral Abstract In this work, a characterization and modeling of packet loss of a Voice over Internet Protocol
The Trip Scheduling Problem
The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
A Brief Introduction to Property Testing
A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
Dynamic Reputation Based Trust Management Using Neural Network Approach
www.ijcsi.org 161 Dynamic Reputation Based Trust Management Using Neural Network Approach Reza Azmi 1 Mahdieh Hakimi 2, and Zahra Bahmani 3 1 College of Engineering, Alzahra University 2 College of Engineering,
Performance Analysis of a Telephone System with both Patient and Impatient Customers
Performance Analysis of a Telephone System with both Patient and Impatient Customers Yiqiang Quennel Zhao Department of Mathematics and Statistics University of Winnipeg Winnipeg, Manitoba Canada R3B 2E9
Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi
Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 9 Basic Scheduling with A-O-A Networks Today we are going to be talking
Research Article AuthenticPeer: A Reputation Management System for Peer-to-Peer Wireless Sensor Networks
International Journal of Distributed Sensor Networks Volume 215, Article ID 637831, 11 pages http://dx.doi.org/1.1155/215/637831 Research Article : A Reputation Management System for Peer-to-Peer Wireless
Load balancing in a heterogeneous computer system by self-organizing Kohonen network
Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.
NOTES ON LINEAR TRANSFORMATIONS
NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University
Labeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
OPRE 6201 : 2. Simplex Method
OPRE 6201 : 2. Simplex Method 1 The Graphical Method: An Example Consider the following linear program: Max 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2
SPECTRAL POLYNOMIAL ALGORITHMS FOR COMPUTING BI-DIAGONAL REPRESENTATIONS FOR PHASE TYPE DISTRIBUTIONS AND MATRIX-EXPONENTIAL DISTRIBUTIONS
Stochastic Models, 22:289 317, 2006 Copyright Taylor & Francis Group, LLC ISSN: 1532-6349 print/1532-4214 online DOI: 10.1080/15326340600649045 SPECTRAL POLYNOMIAL ALGORITHMS FOR COMPUTING BI-DIAGONAL
Costs and Benefits of Reputation Management Systems
Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy [email protected]
Notes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
Distributed file system in cloud based on load rebalancing algorithm
Distributed file system in cloud based on load rebalancing algorithm B.Mamatha(M.Tech) Computer Science & Engineering [email protected] K Sandeep(M.Tech) Assistant Professor PRRM Engineering College
Review Jeopardy. Blue vs. Orange. Review Jeopardy
Review Jeopardy Blue vs. Orange Review Jeopardy Jeopardy Round Lectures 0-3 Jeopardy Round $200 How could I measure how far apart (i.e. how different) two observations, y 1 and y 2, are from each other?
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Counteracting free riding in Peer-to-Peer networks q
Available online at www.sciencedirect.com Computer Networks 52 (2008) 675 694 www.elsevier.com/locate/comnet Counteracting free riding in Peer-to-Peer networks q Murat Karakaya *, _ Ibrahim Körpeoğlu,
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.
Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February
CSCI567 Machine Learning (Fall 2014)
CSCI567 Machine Learning (Fall 2014) Drs. Sha & Liu {feisha,yanliu.cs}@usc.edu September 22, 2014 Drs. Sha & Liu ({feisha,yanliu.cs}@usc.edu) CSCI567 Machine Learning (Fall 2014) September 22, 2014 1 /
How to assess the risk of a large portfolio? How to estimate a large covariance matrix?
Chapter 3 Sparse Portfolio Allocation This chapter touches some practical aspects of portfolio allocation and risk assessment from a large pool of financial assets (e.g. stocks) How to assess the risk
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM
A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1
Single machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7
(67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition
Polarization codes and the rate of polarization
Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,
Measurement with Ratios
Grade 6 Mathematics, Quarter 2, Unit 2.1 Measurement with Ratios Overview Number of instructional days: 15 (1 day = 45 minutes) Content to be learned Use ratio reasoning to solve real-world and mathematical
State of Stress at Point
State of Stress at Point Einstein Notation The basic idea of Einstein notation is that a covector and a vector can form a scalar: This is typically written as an explicit sum: According to this convention,
ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE
ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE YUAN TIAN This synopsis is designed merely for keep a record of the materials covered in lectures. Please refer to your own lecture notes for all proofs.
University of Lille I PC first year list of exercises n 7. Review
University of Lille I PC first year list of exercises n 7 Review Exercise Solve the following systems in 4 different ways (by substitution, by the Gauss method, by inverting the matrix of coefficients
