trust and reputation management in distributed systems
play

Trust and Reputation Management in Distributed Systems Mster en - PowerPoint PPT Presentation

Trust and Reputation Management in Distributed Systems Mster en Investigacin en Informtica Facultad de Informtica Universidad Complutense de Madrid Flix Gmez Mrmol NEC Laboratories Europe, Alemania (felix.gomez-marmol@neclab.eu)


  1. Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol NEC Laboratories Europe, Alemania (felix.gomez-marmol@neclab.eu) Madrid 29 de abril de 2013

  2. Trust and Reputation Management in Distributed Systems Agenda ▐ Introduction & General Overview ▐ Application Scenarios ▐ Generic Steps ▐ Security Threats ▐ Models Comparison ▐ TRMSim-WSN ▐ Conclusions NEC Laboratories Europe Page 2

  3. Trust and Reputation Management in Distributed Systems INTRODUCTION & GENERAL OVERVIEW NEC Laboratories Europe Page 3

  4. Trust and Reputation Management in Distributed Systems Introduction & General Overview ▐ Internet and WWW have changed our lives ▐ Despite their several advantages, there are also many security risks ▐ Traditional security solutions are very effective but not always applicable ▐ Trust and reputation management has been proposed as an accurate alternative ▐ Oneself can make his/her own opinion about how trustworthy or reputable another member of the community is ▐ Increases the probability of a successful transaction while reducing the opportunities of being defrauded NEC Laboratories Europe Page 4

  5. Trust and Reputation Management in Distributed Systems APPLICATION SCENARIOS NEC Laboratories Europe Page 5

  6. Trust and Reputation Management in Distributed Systems Application Scenarios (I) ▐ ▐ Wireless sensor networks (WSN) P2P networks   Measuring temperature Searching a generic service   Measuring humidity Sharing a file  …  Measuring pressure  Detecting presence  … ▐ Identity Management Systems ▐ Vehicular Ad-hoc Networks (VANETs)  Emergency messages transmission  Sharing users’ attributes  Traffic conditions  Identity federation management  Weather conditions  …  Advertisements  … NEC Laboratories Europe Page 6

  7. Trust and Reputation Management in Distributed Systems Application Scenarios (II) ▐ ▐ Collaborative Intrusion Detection Networks (CIDN) Cloud Computing  Trust level on generated alarms  Most trustworthy service selection  Bootstrapping reputation for newcomers  Trust-based cloud services orchestration  …  Tenants trustworthiness  … ▐ Application Stores ▐ Internet of Things (IoT)  Similar to wireless sensor networks  Trustworthy applications  Trustworthy information  Trustworthy developers  Trustworthy services  … …  NEC Laboratories Europe Page 7

  8. Trust and Reputation Management in Distributed Systems GENERIC STEPS NEC Laboratories Europe Page 8

  9. Trust and Reputation Management in Distributed Systems Generic Steps (I) ▐ Generic steps ▐ Generic interfaces  IETF Repute https://tools.ietf.org/wg/repute ▐ Generic Data Structures  OASIS Open Reputation Management Systems (ORMS) https://www.oasis-open.org/committees/orms NEC Laboratories Europe Page 9

  10. Trust and Reputation Management in Distributed Systems Generic Steps (II) ▐ 10 design advices 1) Anonymous recommendations 2) Higher weight to more recent transactions 3) Recommendations subjectivity 4) Redemption of past malicious entities 5) Opportunity to participate for benevolent newcomers 6) Avoid abuse of a high achieved reputation 7) Benevolent nodes should have more opportunities than newcomers 8) Different trust/reputation scores for different services 9) Take into account bandwidth, energy consumption, scalability... 10) Consider the importance or associated risk of a transaction NEC Laboratories Europe Page 10

  11. Trust and Reputation Management in Distributed Systems SECURITY THREATS NEC Laboratories Europe Page 11

  12. Trust and Reputation Management in Distributed Systems Security Threats (I) ▐ Individual malicious nodes ▐ Malicious collectives  Malicious nodes always provide a bad service  Malicious nodes always provide a bad service  Malicious nodes collude to unfairly provide high  Their reputation decreases and hence are not ratings about each other selected  Their reputation decreases and hence are not selected  Recommendations reliability should be handled ▐ Malicious spies ▐ Malicious collectives with camouflage  Malicious nodes always provide a bad service  Malicious nodes provide a bad service p% of the times  Malicious nodes collude to unfairly provide high ratings about  Malicious nodes collude to unfairly provide high ratings about each other each other  Malicious spies provide good services but positive  Their reputation decreases and hence are not selected recommendations about malicious nodes too  Recommendations reliability should be handled  Their reputation decreases and hence are not selected  Store transactions history  Recommendations reliability should be handled  Not always considered as a threat  Depends on behavioral pattern NEC Laboratories Europe Page 12

  13. Trust and Reputation Management in Distributed Systems Security Threats (II) ▐ ▐ Driving down benevolent nodes reputation Sybil attack  Malicious nodes always provide a bad service  Attacker creates a disproportionate number of malicious nodes  Malicious nodes collude to unfairly provide high ratings about  Malicious nodes always provide a bad service each other  When reputation decreases, node leaves and enters again the  They also provide bad recommendations about benevolent network with a different identity nodes  Associate some cost to new identities generation  Recommendations reliability should be handled ▐ Malicious pre-trusted nodes ▐ Partially malicious collusion  Malicious nodes always provide a bad service  Malicious nodes always provide a bad service  Pre-trusted nodes provide positive  A node can be malicious for a given service but, benevolent for a different one recommendations about malicious nodes and  Malicious nodes collude and rate positively each negative ones about benevolent nodes other  Dynamic selection of pre-trusted nodes  Different reputation values for different services NEC Laboratories Europe Page 13

  14. Trust and Reputation Management in Distributed Systems Security Threats (III) ▐ Security threats taxonomy  Attack intent  Targets  Required knowledge  Cost  Algorithm dependence  Detectability NEC Laboratories Europe Page 14

  15. Trust and Reputation Management in Distributed Systems MODELS COMPARISON NEC Laboratories Europe Page 15

  16. Trust and Reputation Management in Distributed Systems Models Comparison (I) ▐ Lack of mature bio-inspired and fuzzy approaches ▐ Lack of standard APIs and data structures ▐ Lack of security threats analysis ▐ Lack of generic testing tools NEC Laboratories Europe Page 16

  17. Trust and Reputation Management in Distributed Systems Models Comparison (II) NEC Laboratories Europe Page 17

  18. Trust and Reputation Management in Distributed Systems TRMSIM-WSN NEC Laboratories Europe Page 18

  19. Trust and Reputation Management in Distributed Systems TRMSim-WSN NEC Laboratories Europe Page 19

  20. Trust and Reputation Management in Distributed Systems DYNAMICALLY ADAPTABLE REPUTATION SYSTEMS NEC Laboratories Europe Page 20

  21. Trust and Reputation Management in Distributed Systems Dynamically adaptable Reputation Systems (I) The perfect reputation model does not exist ▌ There is not a computation engine suitable for all conditions ▌ Performance also depends on the scenario The reputation model performance depends on the applied scenario and current system conditions ▌ System conditions can vary along the time NEC Laboratories Europe Page 21

  22. Trust and Reputation Management in Distributed Systems Dynamically adaptable Reputation Systems (II) Dynamic & Smart Reputation Engine Selector (I) ▌ Method to dynamically and smartly select the most appropriate reputation computation engine  According to the current system conditions and the expected performance measurements The system selects the most suitable reputation engine at each moment NEC Laboratories Europe Page 22

  23. Trust and Reputation Management in Distributed Systems Dynamically adaptable Reputation Systems (III) Dynamic & Smart Reputation Engine Selector (II) ▌ Instead of developing one single parametrizable model, several models are developed ▌ Each model has the best performance under certain well defined circumstances or conditions ▌ The system administrator indicates which performance metrics are more relevant at each moment The dynamic & smart reputation  Model accuracy engine selector chooses at each  Scalability moment the reputation engine that better satisfies the performance  Robustness metrics indicated by the system  Resilience against attacks administrator, taking into account at the same time, the current system conditions (CPU usage, storage usage, etc) NEC Laboratories Europe Page 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend