Reputation Management Algorithms & Testing. Andrew G. West November 3, 2008

Similar documents
QUANTITATIVE TRUST MANAGEMENT: QuanTM, Reputation, and PreSTA. Andrew G. West PRECISE Meeting 11/18/2009

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

New Metrics for Reputation Management in P2P Networks

An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System

Reputation Management in P2P Networks: The EigenTrust Algorithm

Personalized Reputation Management in P2P Networks

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

5. Binary objects labeling

Practical Guide to the Simplex Method of Linear Programming

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems

Trust and Reputation Management in Distributed Systems

Lecture 2 Introduction to Data Flow Analysis

Expanding the CASEsim Framework to Facilitate Load Balancing of Social Network Simulations

Users Collaboration as a Driver for Reputation System Effectiveness: a Simulation Study

Linear Programming I

Compact Representations and Approximations for Compuation in Games

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

CS 3719 (Theory of Computation and Algorithms) Lecture 4

Factoring Algorithms

DATA ANALYSIS II. Matrix Algorithms

Analysis report examination with CUBE

ONLINE REPUTATION SYSTEMS

A Plan for the Continued Development of the DNS Statistics Collector

Decentralized Utility-based Sensor Network Design

GSAND C. Demonstrating Improved Application Performance Using Dynamic Monitoring and Task Mapping

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

Social Media Mining. Network Measures

ProM 6 Exercises. J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl. August 2010

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

PERFORMANCE MODELS FOR APACHE ACCUMULO:

Hedaquin: A reputation-based health data quality indicator

EMERGING FRONTIERS AND FUTURE DIRECTIONS FOR PREDICTIVE ANALYTICS, VERSION 4.0

Improving proposal evaluation process with the help of vendor performance feedback and stochastic optimal control

THE ANALYTIC HIERARCHY PROCESS (AHP)

Simulating a File-Sharing P2P Network

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems

Practical Graph Mining with R. 5. Link Analysis

Chapter 15: Dynamic Programming

1 Uncertainty and Preferences

A Simultaneous Solution for General Linear Equations on a Ring or Hierarchical Cluster

Towards Trusted Semantic Service Computing

Six Degrees of Separation in Online Society

A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks

Introduction to computer science

TORA : Temporally Ordered Routing Algorithm

Content Delivery Network (CDN) and P2P Model

Cloud Computing is NP-Complete

Travis Goodwin & Sanda Harabagiu

at which branching takes place, a "middleman," if you will. See the transship model panel. ABSTRACT

SGL: Stata graph library for network analysis

Load Balancing and Switch Scheduling

DECENTRALIZED LOAD BALANCING IN HETEROGENEOUS SYSTEMS USING DIFFUSION APPROACH

APPROACHES TO SOFTWARE TESTING PROGRAM VERIFICATION AND VALIDATION

the points are called control points approximating curve

Analysis of Uncertain Data: Tools for Representation and Processing

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data

Load Balancing in Peer-to-Peer Data Networks

Economic Ordering Quantities: A Practical Cost Reduction Strategy for Inventory Management

PeerMon: A Peer-to-Peer Network Monitoring System

Hidden Markov Models in Bioinformatics. By Máthé Zoltán Kőrösi Zoltán 2006

Multi-digit Multiplication: Teaching methods and student mistakes

To give it a definition, an implicit function of x and y is simply any relationship that takes the form:

[Refer Slide Time: 05:10]

Chapter 13: Binary and Mixed-Integer Programming

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

Bits Superposition Quantum Parallelism

Data Visualization in Julia

Visualization methods for patent data

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture

Mathematics of Sudoku I

Kenken For Teachers. Tom Davis June 27, Abstract

Trust and Reputation Management

Practical Time Series Analysis Using SAS

Big Data, Fast Data, Complex Data. Jans Aasman Franz Inc

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

o-minimality and Uniformity in n 1 Graphs

Managing large sound databases using Mpeg7

MapReduce and the New Software Stack

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks

A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs

CPIT-285 Computer Graphics

Load balancing in a heterogeneous computer system by self-organizing Kohonen network

Product Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle

Graph Processing and Social Networks

International Journal of Advanced Research in Computer Science and Software Engineering

Linear Codes. Chapter Basics

The Entity-Relationship Model

The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults

Do You See What I See (DYSWIS)

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

Enumerating possible Sudoku grids

Maximum Likelihood Estimation of Peers Performance in P2P Networks

A Tool for Evaluation and Optimization of Web Application Performance

Intelligent Agents Serving Based On The Society Information

(Refer Slide Time: 01:52)

CSC384 Intro to Artificial Intelligence

Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture

Transcription:

Reputation Management Algorithms & Testing Andrew G. West November 3, 2008

EigenTrust EigenTrust (Hector Garcia-molina, et. al) A normalized vector-matrix multiply based method to aggregate trust such that there is a globally convergent view Imagine past feedback between users as a matrix. The matrix should be interpreted vector-wise. That is, column 1 is representative of user 1's experience with the other 2 users in the NW. 2

EigenTrust (2) At each position calculate the feedback integer as: fback_int := pos-neg; if(fback_int < 0) fback_int := 0 Then, normalize the matrix vector-wise. Realize that this normalization means that our end results will only have relative interpretations, not absolute ones 3

EigenTrust (3) Next, initialize pre-trust vector p, which encodes a-priori notions of trust. If there are no pre-trusted users, as in this case, each entry should simply be 1/n (n = # peers). Finally, we multiply using the equations at left. We compute t_k for sufficiently high k (usually k=7-10) such that t converges. The resultant t is the 'global trust vector' a relative ranking of trust between nodes. Note: The coefficients on the multiplication allow one to fine tune how much 'extra' influence pre-trusted users should have. Note: Additional steps needed to distribute and secure this computation. 4

EigenTrust (4) What EigenTrust gives us A global average, with more weight given to pre-trusted peers Advantages of EigenTrust Mathematically elegant Scalable computation (global nature + some tricks) Trust doesn't weaken via transitivity (good for sparseness) Disadvantages of EigenTrust Normalization leads to relative interpretation No means of measuring negative trust Globally agreed upon trust vector might not be the best idea in the face of very malignant networks 5

TNA-SL Trust Network Analysis w/subjective Logic (Josang) Uses Subjective Logic operators to analyze network graphs Opinion: (b, d, u, a) Expected Value: b+u*a Trust is stored in Opinions, which are a 4-tuple (b, d, u, a): b = belief u = uncertainty d = disbelief a = a-priori trust where (b+d+u)=1.0 and a=[0...1] 'Trust' in an Opinion is equal to the expected value shown at left Table shows how to go from prior feedback -> Opinion. 6

Subjective Logic Two Subjective Logic operators are of note: 'Discount' for transitivity and 'consensus' for averaging 'Discount' encodes transitivity. Trust is weakened when a hop is taken. The discount is weaker if the intermediate node is highly trusted and vice versa. 'Consensus' let's us average opinions. Averaging decreases uncertainty, while averaging belief and disbelief. A B A B C C 7

DSPG We're given the graph below (with Opinions on edges) and want to determine the trust A has in E. How? A We could enumerate all paths, use discount to calculate trust of each path, then consensus them all together? But what about cycles? And this is a computational nightmare, especially for well connected graphs! B C Instead, we derive a Direct Series Parallel Graph (DSPG). A DSPG is a graph created using the two operations below. D Series Composition Parallel Composition A C A C E A B C A C 8

DSPG (2) Why do we want a DSPG? Notice the construction grammar can be represented precisely by the discount and consensus operators. Thus, if our trust dependency graph is a DSPG, a trust expression with SL-operators will be a terse canonical expression B A D C The graph at left cannot be constructed as a DSPG. So how do we go about getting one? 1. Enumerate all paths 2. Rank that set of paths by confidence 3. Add paths (or branches of paths) to the DSPG assuming their addition does not violate DSPG constraints, per the order determined in (2). 4. Once done, calculate trust via the canonical expression that can be derived for our DSPG. E The result? The DSPG that maximizes confidence (limits uncertainty), and therefore is the most accurate aggregation possible 9

TNA-SL What TNA-SL gives us A user-centric calculation with transitive discount Advantages of TNA-SLA Trust values have absolute interpretation on [0...1] (beta-pdf) Negative trust is representable via the 'disbelief' field User-centric views allow us to disregard malicious opinions Disadvantages of TNA-SL Lacks scalability. Connected? 2^N paths to enumerate! Plus these SL-ops are hefty operators. Transitivity weakens trust; could be bad in very sparse NW Good info several hops away could be discounted to oblivion 10

P2P-Sim Intro So how to test and compare and these systems? EigenTrust runs simulations, using a closed-source sim, and the TNA-SL paper is too theoretical to do anything of the sort. We propose (and have implemented) a trace-driven simulator built in the P2P-style (C & Java) New trust/reputation management algorithms can be included via a simple calling interface Traces can be-run using different TMs allowing comparison 11

Traces Traces contain 4 different data sets: 1. The header Contains command-line arguments like # users, # transactions, and other sizing parameters. 2. User initializations Triples (u, c, h), stating user u cleans up invalid files c% of the time, and provides honest feedback h% of the time. See Table 1 for user types. 3. Library initializations Triples (u, f, v), stating user u has file f in his/her initial lib with validity v (a Boolean). 4. Static transactions Pairs (u, f) stating user u wishes to obtain file f. 12

Simulator While there are more transactions: 1. Parse a file request from trace file. 2. If requester has available DL bandwidth, proceed... 3. Requester computes trust values for other NW peers 4. Requester publishes file query to NW 5. Using trust-values, requester source-selects from ULbandwidth available peers who answered query 6. Copy source file to requester library 7. Requestee provides feedback on source 13

Sanity Check In this example... Malicious providers keep invalid files, but they are completely honest about their malignancy, and that of others. This is a trivial system to manage. Really just a sanity check on implementation. Note: None is a control line demonstrating the lack of a trust system. 14

Malicious & Pre-Trust In this example... We see purely malicious users, they keep invalid files (try to get them), and consistently provide dishonest feedback. TNA-SL (with its user centric views) passes with flying colors on all accounts. EigenTrust requires the inclusion of pre-trusted users to get good performance 15

Very Sparse! In this example... So far we've been seeing graphs with LOTS of transactions; showing convergent behavior. Real P2P situations are much sparser. We see that here. With less data, both systems are reliant on the notion of pre-trust to attain good performance 16

Quick Convergence In this example... We see that because users generally (definitely, in the case of our simulator) behave consistently, trust values converge very quickly. We've used this fact to create speedup strategies so we can overcome complexity issues (and thus experiment with larger networks). 17

Conclusions Concerning the P2P-Simulator Solid useful tool. Implementation increased understanding. Simulator weaknesses: Closed world Users don't come and go. New files don't appear. Uniform distro Would be nice to fit distributions to actual P2P data Weaknesses? We wanted to minimalize parameterization, keep static Malicious model weaknesses: Does it make sense a NW with 75% bad users can still be managed? To test systems more effectively, malicious users need more power Foremost, bad users should act collectively, not just in isolation Trust/Reputation Systems There are bunches. We'll never say which is best but perhaps we can examine on a situation basis 18