120 likes | 137 Views
Security in P2P Systems. Presented by Hai Ren 10.12.2008. Agenda. Introduce to P2P System S ecurity I ssues Attacks to P2P Systems Existing Trust Models in P2P Systems Global Trust Model NICE Model EIGENTRUST Trust in Large-Scale P2P Systems
E N D
Security in P2P Systems Presented by Hai Ren 10.12.2008
Agenda • Introduce to P2P System Security Issues • Attacks to P2P Systems • Existing Trust Models in P2P Systems • Global Trust Model • NICE Model • EIGENTRUST • Trust in Large-Scale P2P Systems • A Reputation-based Trust Model for P2P eCommerce Communities • Comparison of Trust Models • Conclusion
Introduce to P2P System Security Issues • What is a P2P System? • No fixed clients, no fixed servers • Purpose: sharing files and communication • File Sharing • Distributed Processing • Instant Message • What problems? • Justify the validity of a resource • Verify the authenticity of a content
Attacks to P2P Systems • What attacks? • Poisoning attack • Viruses inserted • Indentity attack • Denial of Service • Malware • Spamming • Why attacks? • No centralized node acting as authority • Absence of a defensible border: friend or foe • At network level: break routing system • At application level: Corrupt or delete data stored
Existing Trust Models in P2P System (1/5) • Global Trust Model • Based on binary trust • Transactions performed by agents • Trust information bound in distribution • Malicious behaviour can be logged
Existing Trust Models in P2P System (2/5) • NICE Model • Determine good peers, cooperate with other peers • Creating cookies • Signed cookies are exchanged among peers • Successful transaction: positive cookie • Failed transaction: negative cookie
Existing Trust Models in P2P System (3/5) • ENGENTRUST • Designed for reputation management of P2P Systems • The global reputation of each peer is marked by the local trust values assigened by the other peers
Existing Trust Models in P2P System (4/5) • Trust in Large-Scale P2P Systems • One major challenge • How to build up trust between different peers without third parties • Aim to a distributed reputationmechanism for P2P systems • Acquaintances in each peer and their neighbours • Trustworthy rating generation, discovery and aggregation
Existing Trust Models in P2P System (5/5) • A reputation-based trust Model for P2P eCommerce Communities • Dynamically Communications • Five import factors for evaluatingtrustworthiness • Feedback in terms of amount of satisfaction • Feedback scope • Credibitlity factor for feedback source • Transaction context • Community context
Conclusion • P2P security is not as good as expected • Users gaining their own trust • Trust models can be used for providing safety mechanism, they can provide a way for protection of unreliable, infected or ugly peers • Biometrics might be involved in the future