reputations based on transitive trust

45
Reputations Based On Transitive Trust Slides by Josh Albrecht

Upload: xanthus-adkins

Post on 31-Dec-2015

26 views

Category:

Documents


0 download

DESCRIPTION

Reputations Based On Transitive Trust. Slides by Josh Albrecht. Overview. Transitive Trust Examples Problem Background and Definition Example Algorithms Sybil Attacks More Definitions Two Theorems on Impossibility of Defense Against Sybil Attacks [Friedman et al, 2007] - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Reputations Based On Transitive Trust

Reputations Based On Transitive Trust

Slides by

Josh Albrecht

Page 2: Reputations Based On Transitive Trust

Overview

• Transitive Trust Examples• Problem Background and Definition• Example Algorithms• Sybil Attacks• More Definitions• Two Theorems on Impossibility of Defense Against Sybil

Attacks [Friedman et al, 2007]

• Solution—Two More Theorems• Practical Implications• Related Theorems [Altman & Tennenholtz, 2007]

Page 3: Reputations Based On Transitive Trust

Transitive Trust-Based Reputations

• Problem: Want to decide how much to trust some entity in the presence of subjective feedback

• Solution: Use transitive trust—an entity’s reputation determines how much we trust a piece of feedback from that entity. – ie, if A trusts B, and B trusts C, then A trusts C more

than unknown node D

– Basically, we start with a set of trusted nodes, and expand the notion of trust recursively from there

Page 4: Reputations Based On Transitive Trust

Real Life Examples

Page 5: Reputations Based On Transitive Trust

Transitive Trust-Based Reputations

0.1

0.35

0.4

0.4

0.45

0.9

0.05

0.5

0.25

0.02

0.02

Page 6: Reputations Based On Transitive Trust

Example Trust Mechanisms

• Pathrank

• Max Flow

• PageRank

Page 7: Reputations Based On Transitive Trust

Definitions

• Trust Graph:• Set of players (vertices):• Set of edges:• Trust values:• Reputation function:• Reputation of • is symmetric iff commutes with

permutation of the node names

),,( tEVG VE

}0{\: Et||: VGF

Vv )(GFv

F F

Page 8: Reputations Based On Transitive Trust

Example Trust Mechanisms

• Pathrank

• Max Flow

• PageRank

Evv

vv vvtGFGF),(

),()()1()(

)(/1),( vOutwvt

),()( 0 vvthShortestPaGFv

),()( 0 vvMaxFlowGFv

Page 9: Reputations Based On Transitive Trust

PathRank Example

0.1

0.35

0.4

0.4

0.45

0.9

0.05

0.5

0.25

0.02

0.02

Page 10: Reputations Based On Transitive Trust

Max Flow Example

0.1

0.35

0.4

0.4

0.45

0.9

0.05

0.5

0.25

0.02

0.02

Page 11: Reputations Based On Transitive Trust

PageRank

• Initial algorithm behind Google’s ranking of webpages

• Each page has a PageRank score• Outgoing links give 1/PageRank score to their

targets• Simplified Algorithm: [Wikipedia, 2008]

– Simulate surfer that starts at a random page and randomly clicks links, with a 15% chance of going to a completely random page.

– Resulting rankings are approximately equal to the chance that such a surfer will be on that page at any given time

Page 12: Reputations Based On Transitive Trust

PageRank Example

0.33

0.33

0.25

1

1

0.25

1

0.25

1

0.5

0.5

0.25

0.33

Page 13: Reputations Based On Transitive Trust

Problems With Transitive Trust• We will be assuming the network and all data is known• Players have no incentive to provide trust values• There may be strong incentive to provide incorrect

trust values• Ideally we want a reputation system that is rank-

strategyproof: v cannot improve his rank ordering by strategic choices of t values.

• …unfortunately, any nontrivial, monotonic, symmetric reputation system cannot be rank-strategyproof.– This is easy to see. Any time another node that you have

interacted with is higher ranked than you, just drop your outgoing edge to them to bring them down

:, VvG

Page 14: Reputations Based On Transitive Trust

Sybil Attacks

• A single agent creates many other fake players (sybils) with the goal of improving the agent’s reputation

• The malicious agent can make any structure of links and trust between sybils and himself

• Incoming trust links can be redirected from the original malicious agent to any of the sybils in a way that preserves the overall amount of incoming trust

Page 15: Reputations Based On Transitive Trust

Sybil Attack Example

Page 16: Reputations Based On Transitive Trust

More Definitions: Sybil Strategy

Given graph and user v we say that and subset is a sybil strategy for v in G if and collapsing into a single node v in yields G.

Thus a sybil strategy is denoted , and we refer to as the sybils of v.

),,( tEVG ),,( tEVG VU

Uv

U

GU

),( UG

Page 17: Reputations Based On Transitive Trust

G

V

Page 18: Reputations Based On Transitive Trust

G

V

Page 19: Reputations Based On Transitive Trust

U

V

Page 20: Reputations Based On Transitive Trust

More Definitions: Value-Sybilproof

A reputation function F is value-sybilproof if for all graphs, there is no sybil strategy of node v that can cause v to have a higher reputation value than in the original graph.

Page 21: Reputations Based On Transitive Trust

More Definitions: Rank-Sybilproof

A reputation function F is rank-sybilproof if for all graphs, there is no sybil strategy that can cause node v to outrank a node w if v did not outrank w in the original graph.

Page 22: Reputations Based On Transitive Trust

Theorem 27.5

Theorem: There is no nontrivial symmetric rank-sybilproof reputation function.

Informal Proof: Given a graph with rank(v) > rank(w), let the sybils of v be a duplicate of the entire graph

Then by symmetry, there is some node u in the sybil set such that rank rank(u) = rank(w)

Thus, F is not rank-sybilproof. QED

Page 23: Reputations Based On Transitive Trust

Theorem 27.5

v

w

u

v

w

Original Graph (G)

New Graph (G1)

Page 24: Reputations Based On Transitive Trust

Theorem 27.5

Theorem: There is no nontrivial symmetric rank-sybilproof reputation function.

Proof: Given and reputation fn F

Let

Consider where

By symmetry

Thus, F is not rank-sybilproof. QED

),( EVG )()(:, GFGFVwv vw

UGG vGU )()(: GFGFUu wu

Page 25: Reputations Based On Transitive Trust

Last Definition: K-Rank-Sybilproof

Reputation function F is K-rank-sybilproof iff it is rank-sybilproof for all sybil strategies with ),( UG 1 KU

Page 26: Reputations Based On Transitive Trust

Theorem 27.7

Theorem: There is no symmetric nontrivial K-rank-sybilproof for K > 0

Informal Proof:Consider the setup from the previous proofThere is some node w that outranks v in the original

graph and is equal to u in the final graphConsider the process of slowly constructing the

duplicate graphAt some point, adding a single node will cause the

rank(u) >= rank(w)Then adding that single node is a successful sybil

strategy for u in that particular graphThus F is not rank-1 sybilproof on all graphs

Page 27: Reputations Based On Transitive Trust

Theorem 27.7

w

w

Original Graph (G)

New Graph (G1)

Page 28: Reputations Based On Transitive Trust

Theorem 27.7

w

w

Original Graph (G)

New Graph (G1)

Page 29: Reputations Based On Transitive Trust

Theorem 27.7

w

v w

Original Graph (G)

New Graph (G1)

Page 30: Reputations Based On Transitive Trust

Implications

• All symmetric reputation functions are vulnerable to this attack– Ex: PageRank, SEO, and spam websites

• Solution?– Use asymmetric approaches (seed set, real-world

solution)

• Next theorems prove sybilproofness for max flow and shortest path reputation functions

Page 31: Reputations Based On Transitive Trust

Theorem 27.8

Theorem: The max-flow based ranking mechanism is value-sybilproof

Proof: Max Flow = Min Cut

All sybils of v must be on the same side of the cut as v, thus not on the same side as the source s

Thus, no sybil can have a higher value than the min cut, which is equal to , QED)(GFv

Page 32: Reputations Based On Transitive Trust

Max Flow Example

Page 33: Reputations Based On Transitive Trust

Theorem 27.9

Theorem: The Pathrank reputation mechanism is value and rank-sybilproof

Proof: Sybils cannot decrease the length of the shortest path, thus it is value-sybilproof

For rank-sybilproofness, note that a node v can only affect another node w’s ranking if v is on the shortest path to w.

But if that is true, then . QED)()( GFGF wv

Page 34: Reputations Based On Transitive Trust

Practical Implications

• SybilGuard [Yu et. al., 2006]

– Some researchers at Intel have done an empirical study of defense against Sybil attacks

– They use path distance (asymmetric measure) to get around these symmetry problems

• SEO– The internet works at all because there is a set of sites that we

know have good reputations, so PageRank worked (at least in the past)

– Also, creating sybils in this domain (web page reputation) is expensive and difficult

• P2P– Some researchers have looked at how these principles apply in the

P2P setting, where users want to know which other nodes will give them valid copies of the file, and have good performance

Page 35: Reputations Based On Transitive Trust

Other Properties of Reputation Ranking Mechanisms

• Weak Positive Response: adding an edge from u to v will not decrease the rank of v

• Strong Positive Response: if w and v have equal ranks, adding an edge from u to v will increase the rank of v

Page 36: Reputations Based On Transitive Trust

Other Properties of Reputation Ranking Mechanisms

• Minimal Fairness: when there are no edges, all players have the same rank

• Weak Monotonicity: if the set of vertices with edges going to v is a superset of the set of edges with vertices going to u, then v does not have a lower rank than u

• Strong Monotonicity: if the set of vertices with edges going to v is a strict superset of the set of edges with vertices going to u, then v has a higher rank than u

Page 37: Reputations Based On Transitive Trust

Other Properties of Reputation Ranking Mechanisms

• Weak Union Condition: If v is ranked <= u in G, then v is ranked <= u in a new graph consisting of G and some other arbitrary graph H.

• Strong Union Condition: If v is ranked <= u in G, then v is ranked <= u in a new graph consisting of G and some other arbitrary graph H even if edges are allowed between G and H in the new graph.

Old graph New graph

Page 38: Reputations Based On Transitive Trust

Approval Voting Ranking

Definition: v is ranked <= u iff the number of incoming edges of v is <= the number incoming edges of u.

Fact: The Approval Voting ranking mechanims satisfies minimal fairness, strong monotonicity, strong positive response, the strong union condition, and infinite non-triviality.

Page 39: Reputations Based On Transitive Trust

Incentive Compatibility

• Incentive Compatible: F is incentive compatible if the expected utility from its ranking is not affected by manipulating its outgoing edges.

• Strongly Incentive Compatible: F is incentive compatible for all nondecreasing utility functions.

• Weakly Incentive Compatible: F is incentive compatible for all utility functions of the form a*k+b, where a and b are real numbers and k is the rank.

Page 40: Reputations Based On Transitive Trust

Incentive Compatibility Without Minimum Fairness

Proposition: There exists a ranking system F1 that satisfies strong incentive compatibility, strong positive response, infinite non-triviality, and the strong union condition.

Page 41: Reputations Based On Transitive Trust

Incentive Compatibility With Minimum Fairness

Theorem: There exist weakly incentive compatible, infinitely nontrivial, minimally fair ranking systems F2, F3, F4, that satisfy weak monotonicity; weak positive response; and the weak union condition respectively. However there is no weakly incentive compatible, nontrivial, minimally fair ranking mechanism that satisfies any two of those three properties.

Theorem: There is no weakly incentive compatible, nontrivial, minimally fair ranking system that satisfies either one of the four properties: strong monotonicity, strong positive response, the strong union condition, or strong incentive compatibility.

Page 42: Reputations Based On Transitive Trust

Conclusions

• We’ve seen a bunch of results about the possibility for various types of transitive trust reputation mechanisms

• It’s very hard/impossible to make such mechanisms fair (symmetric) and incentive compatible (immune to malicious behavior like sybil attacks)

• Asymmetry (treating certain nodes as more reliable than others) can solve these problems.

• There are real world problems directly connected to these theoretical results (PageRank, P2P systems)

Page 43: Reputations Based On Transitive Trust

Thanks!

Page 44: Reputations Based On Transitive Trust

Theorem 27.7Theorem: There is no symmetric nontrivial K-rank-

sybilproof for K > 0

Formal Proof: Consider the previous proof.

Let be the original vertex set

Let be the duplicate. Let

Let

},...,,{ 21 wvvvvV r

},...,,{ 21 ruuuU UVV GGuuVVGsubgraphG t

tt 01 },,...,{:)(

Page 45: Reputations Based On Transitive Trust

Theorem 27.7 Proof (continued)Then while

Thus

but

Let m be the node in that has the greatest reputation in

The either or

It follows that the addition of node ut+1 is a successful sybil strategy for m in Gt.

Thus F is not 1-rank-sybilproof on all graphs. QED.

)()( 00 GFGF vw )()( rw

ru GFGF

r)()(max: },...,,{ 1

tw

tiuuvi GFGFt

t

)()(max 11},...,,{ 1

t

wt

iuuvi GFGFt

},...,,{ 1 tuuv1tG

)()( 11 tw

tm GFGF )()( 11

1

tw

tu GFGF

t