Title: Trust and Reputation System
1Trust and Reputation System
S. Felix Wu University of California,
Davis wu_at_cs.ucdavis.edu http//www.cs.ucdavis.edu
/wu/
2OCC, TSO, 2PL
- T1 r X
- T1 r Y
- T1 w X
- T1 r Z
- T1 w Y
3Trust in P2P
- The Service Provider provides a management system
for trust and reputation - Googles PageRank
- Antivirus system
- eBays seller reputation system
- PKI
- P2P -- everything hopefully to be P2P
- Decentralized model for trust
4Cheating Incentives
- Selfish users in Gnutella and Bittorrent
- eBay flaw seller ranking
- Google page rank
- Selfishness or Reputation boost
5P2P Trust Model
- Less vulnerable?
- Harder to implement? In a decentralized setting?
6Problem
- Problem
- Reduce inauthentic files distributed by malicious
peers on a P2P network. - Motivation
Major record labels have launched an aggressive
new guerrilla assault on the underground music
networks, flooding online swapping services with
bogus copies of popular songs. -Silicon Valley
Weekly
7Problem
- Goal To identify sources of inauthentic files
and bias peers against downloading from them. - Method Give each peer a trust value based on its
previous behavior.
8Some approaches
- Past History
- Friends of Friends
- EigenTrust
- PeerTrust
- TrustDavis
9Terminology
Peer 3
- Local trust value cij. The opinion that peer i
has of peer j, based on past experience. - Global trust value ti. The trust that the
entire system places in peer i.
Peer 1
Peer 2
Peer 4
10Local Trust Values
- Each time peer i downloads an authentic file from
peer j, cij increases. - Each time peer i downloads an inauthentic file
from peer j, cij decreases.
Cij
Peer i
Peer j
11Normalizing Local Trust Values
- All cij non-negative
- ci1 ci2 . . . cin 1
12Local Trust Vector
- Local trust vector ci contains all local trust
values cij that peer i has of other peers j.
13Past history
- Each peer biases its choice of downloads using
its own opinion vector ci. - If it has had good past experience with peer j,
it will be more likely to download from that
peer. - Problem Each peer has limited past experience.
Knows few other peers.
14Friends of Friends
- Ask for the opinions of the people who you trust.
15Friends of Friends
- Weight their opinions by your trust in them.
16The Math
17Problem with Friends
- Either you know a lot of friends, in which case,
you have to compute and store many values. - Or, you have few friends, in which case you wont
know many peers, even after asking your friends.
18Dual Goal
- We want each peer to
- Know all peers.
- Perform minimal computation (and storage).
19Knowing All Peers
- Ask your friends tCTci.
- Ask their friends t(CT)2ci.
- Keep asking until the cows come home t(CT)nci.
20Minimal Computation
- Luckily, the trust vector t, if computed in this
manner, converges to the same thing for every
peer! - Therefore, each peer doesnt have to store and
compute its own trust vector. The whole network
can cooperate to store and compute t.
21Non-distributed Algorithm
- Initialize
- Repeat until convergence
22Distributed Algorithm
- No central authority to store and compute t.
- Each peer i holds its own opinions ci.
- For now, lets ignore questions of lying, and let
each peer store and compute its own trust value.
23Distributed Algorithm
For each peer i -First, ask peers who know
you for their opinions of you. -Repeat until
convergence -Compute current trust value
ti(k1) c1j t1(k) cnj tn(k) -Send your
opinion cij and trust value ti(k) to your
acquaintances. -Wait for the peers who know you
to send you their trust values and opinions.
24Probabilistic Interpretation
25Malicious Collectives
26Pre-trusted Peers
- Battling Malicious Collectives
- Inactive Peers
- Incorporating heuristic notions of trust
- Convergence Rate
27Pre-trusted Peers
- Battling Malicious Collectives
- Inactive Peers
- Incorporating heuristic notions of trust
- Convergence Rate
28Secure Score Management
- Two basic ideas
- Instead of having a peer compute and store its
own score, have another peer compute and store
its score. - Have multiple score managers who vote on a peers
score.
Score Manager
Distributed Hash Table
Score Managers
29PeerTrust System Architecture
30How to use the trust values ti
- When you get responses from multiple peers
- Deterministic Choose the one with highest trust
value. - Probabilistic Choose a peer with probability
proportional to its trust value.
31Load Distribution
Deterministic Download Choice
Probabilistic Download Choice
32Threat Scenarios
- Malicious Individuals
- Always provide inauthentic files.
- Malicious Collective
- Always provide inauthentic files.
- Know each other. Give each other good opinions,
and give other peers bad opinions.
33More Threat Scenarios
- Camouflaged Collective
- Provide authentic files some of the time to trick
good peers into giving them good opinions. - Malicious Spies
- Some members of the collective give good files
all the time, but give good opinions to malicious
peers.
34Malicious Individuals
35Malicious Collective
36Camouflaged Collective
37P2P Electronic Communities
38Motivation
39Motivation
- Should we buy?
- How do we decide?
40Motivation
41Motivation
- Should we buy?
- How do we decide?
- What we want
- accurately estimate risk of default
- minimize the risk of default
- minimize losses due to pseudonym change
- avoid trusting a centralized authority
- How do we achieve these goals?
42Motivation
- TrustDavis is a reputation system that realizes
these goals. - It recasts these goals as the following
properties
43Motivation
- Agents can accurately estimate risk
- Third parties provide accurate ratings
- Honest buyer/seller avoids risk (if possible)
- Insure transactions
- No advantage in obtaining multiple identities
- Agents can cope with pseudonym change
- No need to trust a centralized authority
- No centralized services needed
-
44Motivation
- Incentive Compatibility
- Each player should have incentives to perform
the actions that enable the system to achieve a
desired global outcome.
45Motivation
- Agents can accurately estimate risk
- Third parties provide accurate ratings
- Honest buyer/seller avoids risk (if possible)
- Insure transactions
- No advantage in obtaining multiple identities
- Agents can cope with pseudonym change
- No need to trust a centralized authority
- No centralized services needed
- Incentive Compatibility!
46Motivation
- A Reference is
- Acceptance of Limited Liability.
47Motivation
- Agents can accurately estimate risk
- Third parties provide accurate ratings
- Parties are liable for the references they
provide - Honest buyer/seller avoids risk (if possible)
- Insure transactions
- Buyers/sellers pay for references to insure their
transactions - No advantage in obtaining multiple identities
- Agents can cope with pseudonym change
- References are issued only to trusted identities
- No need to trust a centralized authority
- No centralized services needed
- Anyone can issue a reference
- Use References!
48Outline
- TrustDavis leverages social networks
- For now, examples assume No False Claims (NFC)
- The use of TrustDavis does NOT preclude trade
outside the system. -
49Paying for References
50Paying for References
- How much is vb willing to pay to insure the
transaction? (No riskless profitable arbitrage
criterion) - Example
- vb wants to buy three shirts.
- Shirts cost 100 each from a trustworthy seller
- Unknown seller offers shirts for 50 each (but
maybe they are only worth 25). - vb would risk 3 x 50 150 in the transaction
- vb can borrow and lend money at rate r1.25
through the period of the transaction - For 30, vb can insure herself!
-
51Paying for References
- To insure herself vb buys the shirts and a
hedging portfolio as follows - Instead of buying 3 shirts for 50 each she buys
only 2, saving 50. - The buyer, vb , adds 30 of her own money and
lends the resulting 80 at rate r 1.25.
52Paying for References
- On Success
- vb obtains 100 from the loan and buysthe 3rd
shirt - On failure
- vb sells the two shirts for 25 each
- gets 100 from the loan.
- She obtains a total of 150
- Thus, vb can insure herself for 30.
53Selling References
54Selling References
- Seen as an investment
- On Success the ROI is
- On failure the ROI is
- If repeated many times the insurer may go
bankrupt. Assume the insurer has W dollars
available to insure this transaction.
55Selling References
- Insurer maximizes the expected value of the
growth rate of capital (Kelly Criterion). - For given
- probability of failure p,
- a desired growth rate of capital R and,
- fraction of the total funds W being risked in a
transaction. - The insurer can obtain a lower bound on the
premium C.
56Selling References
Minimum Return/Risk Ration for Different Failure
Probabilities
Cost/Insured Value C/K
Insured Value as a fraction of total funds f
57A Non-Exploitable Strategy
- Two Scenarios
- No False Claims - NFC
- With False Claims - FC
- False claims only change the probability p.
- We can incorporate the cost of verification.
- Key Idea
- Save part of the money obtained in successful
transactions in excess of the opportunity cost.
58A Non-Exploitable Strategy
- Example.
- The buyer, vb, has 190 to spend on 1 of 3
options - Buying 3 shirts from an unknown seller for 50
each and insuring the transaction for 40. She
values each shirt at 100. - Buying 2 pairs of shoes from a reliable retailer
for 70 each. She thinks each pair is worth 90. - Buying 1 game console for 150, from a reliable
online shop. She values the console at 240.
59A Non-Exploitable Strategy
- vbs valuation for each of the 3 options is
- Shirts 100 x 3 0 (no cash leftover) 300
- Pairs of Shoes 90 x 2 50 (cash) 230
- Console 240 x 1 40 (cash) 280
- Gains in excess of the opportunity cost
are300-28020. - Part of these 20 should be saved to insure
future transactions.
60A Non-Exploitable Strategy
- The Strategy
- Initially only provide references to known agents
or those that leave a security deposit. - Insure all trade through references provided by
trusted agents. - Do not provide more insurance than you can
recover. Charge at least the lower bound for
providing a reference. - Save part of the money received in excess of the
opportunity cost.
61A Non-Exploitable Strategy
OK! 10 saved to provide future insurance
Failed! Payment made automatically by v1
62Outline
- Motivation
- The Model
- Buying references
- Selling references
- A Non-Exploitable Strategy
- Future Work
- Conclusion
- Key ideas
63Future Work
- Simulation
- sensitivity to estimates of p
- growth rate of capital
- dynamic behavior
- Price Negotiation
- should avoid double spending problem
- fair distribution among insurers of the premium
paid
64Outline
- Motivation
- The Model
- Buying references
- Selling references
- A Non-Exploitable Strategy
- Future Work
- Conclusion
- Key ideas
65Conclusion
- TrustDavis provides
- Accurate Ratings
- Non-exploitable strategy for honest agents
- Pseudonym change tolerance
- Decentralized infrastructure
- Through the use of References.
66Conclusion
- Key Ideas
- Incentive Compatibility
- Incentive to accurately rate
- Incentive to insure
- No incentive to change pseudonym
- Saving gains in excess of the opportunity cost to
insure future transactions.
67The End
- Questions?
- Thank you!
- defigueiredo,etbarr_at_ucdavis.edu