ostra leveraging trust to thwart unwanted communication
play

Ostra: Leveraging trust to thwart unwanted communication Alan - PowerPoint PPT Presentation

Ostra: Leveraging trust to thwart unwanted communication Alan Mislove Ansley Post Peter Druschel Krishna Gummadi MPI-SWS Rice University NSDI 2008 Digital communication Electronic systems provide low-cost


  1. Ostra: Leveraging trust to thwart unwanted communication Alan Mislove †‡ Ansley Post †‡ Peter Druschel † Krishna Gummadi † † MPI-SWS ‡ Rice University NSDI 2008

  2. Digital communication Electronic systems provide low-cost communication Email VoIP Blogs IM Content-sharing Democratized content publication Can make content available to (millions of) users 16.04.2008 NSDI’08 Alan Mislove 2

  3. Unwanted communication Low cost abused to send unwanted communication Spam Unwanted Skype invitations Affecting content-sharing sites Mislabeled content on YouTube Users are not accountable Banned users can create new identity 16.04.2008 NSDI’08 Alan Mislove 3

  4. Previous approaches Filter based on content VIAGRA Hard for rich media (videos, photos) 16.04.2008 NSDI’08 Alan Mislove 4

  5. Previous approaches Filter based on content VIAGRA Hard for rich media (videos, photos) Charge money to send Requires micropayment infrastructure 16.04.2008 NSDI’08 Alan Mislove 4

  6. Previous approaches Filter based on content VIAGRA Hard for rich media (videos, photos) Charge money to send Requires micropayment infrastructure Introduce strong identities Resisted by users 16.04.2008 NSDI’08 Alan Mislove 4

  7. Ostra New approach to preventing unwanted communication Leverages an (existing) social network Works in conjunction with existing communication system No content filtering No additional monetary cost No strong identities Key idea: Exploit cost of maintaining social relationships Inspired by trust in offline world 16.04.2008 NSDI’08 Alan Mislove 5

  8. Outline Inspiration: Hawala Ostra in detail Evaluation Related work Conclusion 16.04.2008 NSDI’08 Alan Mislove 6

  9. Inspiration: Hawala

  10. Hawala System for transferring money Originated in India, centuries old Give money to a hawala dealer Often someone you know already Transfered via hawala dealer social network $ Hawala dealers only exchange notes Settle up in the future India Comparable to debt between banks But trust is only pairwise 16.04.2008 NSDI’08 Alan Mislove 8

  11. Hawala System for transferring money Originated in India, centuries old Give money to a hawala dealer Often someone you know already Transfered via hawala dealer social network $ Hawala dealers Hawala dealers only exchange notes Settle up in the future India Comparable to debt between banks But trust is only pairwise 16.04.2008 NSDI’08 Alan Mislove 8

  12. Hawala System for transferring money Originated in India, centuries old Give money to a hawala dealer Often someone you know already Transfered via hawala dealer social network $ Hawala dealers Hawala dealers only exchange notes Settle up in the future India Comparable to debt between banks But trust is only pairwise 16.04.2008 NSDI’08 Alan Mislove 8

  13. Hawala System for transferring money Originated in India, centuries old Give money to a hawala dealer Often someone you know already Transfered via hawala dealer social network $ Hawala dealers Hawala dealers only exchange notes Settle up in the future India Comparable to debt between banks But trust is only pairwise 16.04.2008 NSDI’08 Alan Mislove 8

  14. Why does hawala work? 16.04.2008 NSDI’08 Alan Mislove 9

  15. Why does hawala work? Links take effort to form/maintain Can’t get new links easily 16.04.2008 NSDI’08 Alan Mislove 9

  16. Why does hawala work? Links take effort to form/maintain Can’t get new links easily Misbehavior results in being ostracized Short-term gain vs. long-term loss 16.04.2008 NSDI’08 Alan Mislove 9

  17. Why does hawala work? Links take effort to form/maintain Can’t get new links easily Misbehavior results in being ostracized Short-term gain vs. long-term loss Result: Social network used to transfer money 16.04.2008 NSDI’08 Alan Mislove 9

  18. Ostra

  19. Ostra Uses social network to prevent unwanted communication Same mechanism as hawala Ostra does not need a high level of trust Cost of failure in hawala is high → high level of trust needed Far less at stake in Ostra Can be applied to Messaging (email, IM, VoIP) Group communication (mailing lists) Content sharing (YouTube, Flickr) 16.04.2008 NSDI’08 Alan Mislove 11

  20. Ostra’s social network Most communication systems embed social network Email contacts IM buddies Social network friends Can be explicit or implicit Assumptions Links take some effort to form and maintain Trusted site maintains social network 16.04.2008 NSDI’08 Alan Mislove 12

  21. High-level overview Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  22. High-level overview Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  23. High-level overview Destination Source Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  24. High-level overview Destination Source Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  25. High-level overview Destination Source Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  26. High-level overview Destination x Source Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  27. High-level overview Destination Source Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  28. High-level overview Destination Source Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  29. High-level overview Destination Source Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  30. High-level overview Destination Source Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  31. High-level overview Destination x Source Recipients classify messages Can be implicit (e.g., deleting or responding to a message) Messages are sent directly 16.04.2008 NSDI’08 Alan Mislove 13

  32. Link accounting B 0 16.04.2008 NSDI’08 Alan Mislove 14

  33. Link accounting B 0 Each link has a credit balance B How much one user is “in debt” with the other 16.04.2008 NSDI’08 Alan Mislove 14

  34. Link accounting B 0 L U Each link has a credit balance B How much one user is “in debt” with the other Link also has credit bounds [L,U] Maximal debt each user is willing to accept (L ≤ B ≤ U) 16.04.2008 NSDI’08 Alan Mislove 14

  35. Link accounting -1 0 -5 +5 Each link has a credit balance B How much one user is “in debt” with the other Link also has credit bounds [L,U] Maximal debt each user is willing to accept (L ≤ B ≤ U) 16.04.2008 NSDI’08 Alan Mislove 14

  36. Sending a message 0 When message is sent, lower bound is temporarily adjusted Reset once message classified If adjustment cannot be made, message is delayed If recipient marks message unwanted, balance is adjusted 16.04.2008 NSDI’08 Alan Mislove 15

  37. Sending a message 0 When message is sent, lower bound is temporarily adjusted Reset once message classified If adjustment cannot be made, message is delayed If recipient marks message unwanted, balance is adjusted 16.04.2008 NSDI’08 Alan Mislove 15

  38. Sending a message 0 When message is sent, lower bound is temporarily adjusted Reset once message classified If adjustment cannot be made, message is delayed If recipient marks message unwanted, balance is adjusted 16.04.2008 NSDI’08 Alan Mislove 15

  39. Sending a message 0  When message is sent, lower bound is temporarily adjusted Reset once message classified If adjustment cannot be made, message is delayed If recipient marks message unwanted, balance is adjusted 16.04.2008 NSDI’08 Alan Mislove 15

  40. Sending a message 0  When message is sent, lower bound is temporarily adjusted Reset once message classified If adjustment cannot be made, message is delayed If recipient marks message unwanted, balance is adjusted 16.04.2008 NSDI’08 Alan Mislove 15

  41. Sending to non-friends Process iterates for sending to non-friends Find any path from source to destination Intermediate users indifferent to outcome In either case, total credit is the same 16.04.2008 NSDI’08 Alan Mislove 16

  42. Sending to non-friends Process iterates for sending to non-friends Find any path from source to destination Intermediate users indifferent to outcome In either case, total credit is the same 16.04.2008 NSDI’08 Alan Mislove 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend