SlideShare a Scribd company logo
1 of 23
Improving PGP Web of Trust through
the Expansion of Trusted Neighborhood

Guibing Guo, Jie Zhang, Julita Vassileva*


 School of Computer Engineering, Nanyang Technological University,
  Singapore

* Department of Computer Science, University of Saskatchewan,
   Canada

25/8/2011
Agenda

• Motivation
• Related Work
• Proposed Methodology
  – Majority Rule
  – Confidence Measurement
• Result Diagrams
• Q&A
Motivation

• PGP Web of Trust
  – Mechanism to make cryptography freely
    • Publish certificate
    • Sign on other certificate
    • Keep a list of trusted users
  – Often used to secure emails and files
    transmitted on the Internet
Limitations

• Limited apps due to
   – Positive feedback only
      • No one is able to state clearly opposite
        opinions
   – Direct trust only
      • Do not take into account trust transitivity
• Our work relaxes these constrains
Related Work

• Guha et al. report trust can be propagated
  – Proposed 4 types of trust propagation
     • Direct : A->B, B->C => A->C
     • Co-citation: A1->B/C, A2->B => A2->C
     • Transpose: B->C, A->C => A->B
     • Coupling: B/C->D, A->B =>A->C

     Ours: A->B, B~C => A->C
Related Work

• Huang and Nicol have applied the direct trust
  propagation method on PGP web of trust

• Assumption: That A is highly similar to B
  implies that A can trust B’s taste for
  recommendations
Model the problem

• Feedback: S={1}
• Directed neighbors:

                1      if p is completely trusted
                
      Be ( p)   1 / 2 if p is marginally trusted
                0 if p is untrusted or unknown
                
• Trusted neighborhood:
      TNe  { p  P : Be ( p)  1 / 2}
Model the problem

• For a target certificate t 0

                   1            if cc  1 or mc  2
                   
        re (t0 )  1 / 2 if cc  0 and 0  mc  2
                   0          if cc  0 and mc  0
                   
  Certificate is authentic if
         re (t0 )  1
Modification (MPGP)

• Add negative feedback: S={1, -1}
• Evaluation metric
                            w1  w1
                re (t 0 ) 
                            w1  w1
  where

     w1 |  Be ( p) * s p |,   w1 |  Be ( p' ) * s p ' |
Extension (EPGP)

• Trust Propagation
   – Maximum length: m= 4
   – For i-th chain of trust:
                           m 1
           CTi  Be ( p2 )  B p j ( p j  1)
                            j 2

   – Aggregation
                    1 n
           Be ( p)  i 1 CTi
                    n
Extension (EPGP)

• New Trusted Neighborhood:

    TNe '  TNe  { p  P : p TNe , Be ( p)   }
  Where t  1 / 2 in this paper
Further expansion (EPGP+)

• Merging the directed trust neighbors into a
  single agent, Fe
   – Majority rule:
                    1    if w1  w1
           f (t )  
                      1 otherwise
  – Confidence on the feedback:
                           1        x w1 (1  x) w1
          c( w1 , w1 )   |   1
                                                           1 | dx
                                   x w1 (1  x) w1 dx
                           0
                                0

          c( w1 , w1 )   c
EPGP+

• Search for new neighbors:
  – Compute Cosine Similarity

                                
                                 k
                                        f e (t ) f u (t )
     Sim ( Fe, Fu )            i 1


                         i1 f e (t )        i1
                            k            2         k
                                                   f u (t ) 2

  – New neighbor if
     Sim( Fe, Fu )                : similarity threshold
Experiments

• Simulation set-up
  – 500 users, each creates a certificate; a
    certain % of them are inauthentic
  – 3 groups of users in terms of honest
     • Honest (Trustfully sign 80-100%)
     • dishonest (40-60%), neutral, (0-20%)
  – 3 groups of users in terms of experience
     • Experienced (Sign 15-20% certificates)
     • Medium (8-13%) and Newbies (0-5%)
Experiments

• Simulation set-up
  – 3 groups of users in terms of correctness
     • TOW make heavy mistakes (sign wrongly)
        –80-100%
     • TOW make neutral mistakes
        –40-60%
     • TOW make few mistakes
        –0-20%
Scenarios

• Vary the percentages of
  – Honest, dishonest, neutral
  – Experienced, medium, newbie

• Performance
  – Accuracy:
  – Coverage
Choose Proper parameters

• Fix   0.8 and vary  c
Choose Proper parameters

• Fix  c  0.7 and vary 
Choose Proper parameters

• Fix  c  0.2 and vary 
Scenarios

•   Uniform Scenario
•   Ideal Scenario
•   Sparse Scenario
•   Sufficient Information
•   Many Mistake
•   Highly Malicious
Conclusions

• Negative feedback is allowed
• Trust propagation is applied
• Further expansion of trusted neighborhood by
  merging feedbacks and finding nearest nodes
• Experimental simulations are performed
Q & A?
Thank you!

More Related Content

Viewers also liked

Viewers also liked (14)

Το κίνημα του ρομαντισμού
Το κίνημα του ρομαντισμούΤο κίνημα του ρομαντισμού
Το κίνημα του ρομαντισμού
 
SSE SE Practices Introduction
SSE SE Practices IntroductionSSE SE Practices Introduction
SSE SE Practices Introduction
 
110215_bratech岩崎_九工大講演
110215_bratech岩崎_九工大講演110215_bratech岩崎_九工大講演
110215_bratech岩崎_九工大講演
 
B sesión salud 3
B sesión salud 3B sesión salud 3
B sesión salud 3
 
Cvs élus 2011
Cvs élus 2011Cvs élus 2011
Cvs élus 2011
 
1
11
1
 
Top ten of the last ten
Top ten of the last tenTop ten of the last ten
Top ten of the last ten
 
Consulta general
Consulta generalConsulta general
Consulta general
 
Entrepreneurship Succeeds Everywhere - Said Rahmani Speech at Avatech Meetup ...
Entrepreneurship Succeeds Everywhere - Said Rahmani Speech at Avatech Meetup ...Entrepreneurship Succeeds Everywhere - Said Rahmani Speech at Avatech Meetup ...
Entrepreneurship Succeeds Everywhere - Said Rahmani Speech at Avatech Meetup ...
 
2011 12 15 informe ciss tme
2011 12 15 informe ciss tme2011 12 15 informe ciss tme
2011 12 15 informe ciss tme
 
CS Unitec Electric Drills and Drive Units: EAW 16/2 R/L
CS Unitec Electric Drills and Drive Units: EAW 16/2 R/LCS Unitec Electric Drills and Drive Units: EAW 16/2 R/L
CS Unitec Electric Drills and Drive Units: EAW 16/2 R/L
 
auto.pdf
auto.pdfauto.pdf
auto.pdf
 
Dorian By Paul Smith_Cobranding & Licensing
Dorian By Paul Smith_Cobranding & LicensingDorian By Paul Smith_Cobranding & Licensing
Dorian By Paul Smith_Cobranding & Licensing
 
EMC Ltd _
EMC Ltd _EMC Ltd _
EMC Ltd _
 

Similar to Improving pgp web of trust through the expansion of trusted neighborhood@2011 8-25

Scalable membership management
Scalable membership management Scalable membership management
Scalable membership management Vinay Setty
 
2014 EUGM - Blinded Adaptations, Permutations Tests and T Tests
2014 EUGM - Blinded Adaptations, Permutations Tests and T Tests2014 EUGM - Blinded Adaptations, Permutations Tests and T Tests
2014 EUGM - Blinded Adaptations, Permutations Tests and T TestsCytel USA
 
Effect of global market on indian market
Effect of global market on indian marketEffect of global market on indian market
Effect of global market on indian marketArpit Jain
 
Statisticsforbiologists colstons
Statisticsforbiologists colstonsStatisticsforbiologists colstons
Statisticsforbiologists colstonsandymartin
 
NumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.pptNumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.pptIshwariKhanal
 
Admission in India
Admission in IndiaAdmission in India
Admission in IndiaEdhole.com
 
Large N: lattice results and perspectives
Large N: lattice results and perspectivesLarge N: lattice results and perspectives
Large N: lattice results and perspectivesBiagio Lucini
 

Similar to Improving pgp web of trust through the expansion of trusted neighborhood@2011 8-25 (7)

Scalable membership management
Scalable membership management Scalable membership management
Scalable membership management
 
2014 EUGM - Blinded Adaptations, Permutations Tests and T Tests
2014 EUGM - Blinded Adaptations, Permutations Tests and T Tests2014 EUGM - Blinded Adaptations, Permutations Tests and T Tests
2014 EUGM - Blinded Adaptations, Permutations Tests and T Tests
 
Effect of global market on indian market
Effect of global market on indian marketEffect of global market on indian market
Effect of global market on indian market
 
Statisticsforbiologists colstons
Statisticsforbiologists colstonsStatisticsforbiologists colstons
Statisticsforbiologists colstons
 
NumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.pptNumberTheory explanations in the easiest way.ppt
NumberTheory explanations in the easiest way.ppt
 
Admission in India
Admission in IndiaAdmission in India
Admission in India
 
Large N: lattice results and perspectives
Large N: lattice results and perspectivesLarge N: lattice results and perspectives
Large N: lattice results and perspectives
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Improving pgp web of trust through the expansion of trusted neighborhood@2011 8-25

  • 1. Improving PGP Web of Trust through the Expansion of Trusted Neighborhood Guibing Guo, Jie Zhang, Julita Vassileva* School of Computer Engineering, Nanyang Technological University, Singapore * Department of Computer Science, University of Saskatchewan, Canada 25/8/2011
  • 2. Agenda • Motivation • Related Work • Proposed Methodology – Majority Rule – Confidence Measurement • Result Diagrams • Q&A
  • 3. Motivation • PGP Web of Trust – Mechanism to make cryptography freely • Publish certificate • Sign on other certificate • Keep a list of trusted users – Often used to secure emails and files transmitted on the Internet
  • 4. Limitations • Limited apps due to – Positive feedback only • No one is able to state clearly opposite opinions – Direct trust only • Do not take into account trust transitivity • Our work relaxes these constrains
  • 5. Related Work • Guha et al. report trust can be propagated – Proposed 4 types of trust propagation • Direct : A->B, B->C => A->C • Co-citation: A1->B/C, A2->B => A2->C • Transpose: B->C, A->C => A->B • Coupling: B/C->D, A->B =>A->C Ours: A->B, B~C => A->C
  • 6. Related Work • Huang and Nicol have applied the direct trust propagation method on PGP web of trust • Assumption: That A is highly similar to B implies that A can trust B’s taste for recommendations
  • 7. Model the problem • Feedback: S={1} • Directed neighbors: 1 if p is completely trusted  Be ( p)   1 / 2 if p is marginally trusted 0 if p is untrusted or unknown  • Trusted neighborhood: TNe  { p  P : Be ( p)  1 / 2}
  • 8. Model the problem • For a target certificate t 0 1 if cc  1 or mc  2  re (t0 )  1 / 2 if cc  0 and 0  mc  2 0 if cc  0 and mc  0  Certificate is authentic if re (t0 )  1
  • 9. Modification (MPGP) • Add negative feedback: S={1, -1} • Evaluation metric w1  w1 re (t 0 )  w1  w1 where w1 |  Be ( p) * s p |, w1 |  Be ( p' ) * s p ' |
  • 10. Extension (EPGP) • Trust Propagation – Maximum length: m= 4 – For i-th chain of trust: m 1 CTi  Be ( p2 )  B p j ( p j  1) j 2 – Aggregation 1 n Be ( p)  i 1 CTi n
  • 11. Extension (EPGP) • New Trusted Neighborhood: TNe '  TNe  { p  P : p TNe , Be ( p)   } Where t  1 / 2 in this paper
  • 12. Further expansion (EPGP+) • Merging the directed trust neighbors into a single agent, Fe – Majority rule: 1 if w1  w1 f (t )     1 otherwise – Confidence on the feedback: 1 x w1 (1  x) w1 c( w1 , w1 )   | 1  1 | dx  x w1 (1  x) w1 dx 0 0 c( w1 , w1 )   c
  • 13. EPGP+ • Search for new neighbors: – Compute Cosine Similarity  k f e (t ) f u (t ) Sim ( Fe, Fu )  i 1 i1 f e (t ) i1 k 2 k f u (t ) 2 – New neighbor if Sim( Fe, Fu )    : similarity threshold
  • 14. Experiments • Simulation set-up – 500 users, each creates a certificate; a certain % of them are inauthentic – 3 groups of users in terms of honest • Honest (Trustfully sign 80-100%) • dishonest (40-60%), neutral, (0-20%) – 3 groups of users in terms of experience • Experienced (Sign 15-20% certificates) • Medium (8-13%) and Newbies (0-5%)
  • 15. Experiments • Simulation set-up – 3 groups of users in terms of correctness • TOW make heavy mistakes (sign wrongly) –80-100% • TOW make neutral mistakes –40-60% • TOW make few mistakes –0-20%
  • 16. Scenarios • Vary the percentages of – Honest, dishonest, neutral – Experienced, medium, newbie • Performance – Accuracy: – Coverage
  • 17. Choose Proper parameters • Fix   0.8 and vary  c
  • 18. Choose Proper parameters • Fix  c  0.7 and vary 
  • 19. Choose Proper parameters • Fix  c  0.2 and vary 
  • 20. Scenarios • Uniform Scenario • Ideal Scenario • Sparse Scenario • Sufficient Information • Many Mistake • Highly Malicious
  • 21.
  • 22. Conclusions • Negative feedback is allowed • Trust propagation is applied • Further expansion of trusted neighborhood by merging feedbacks and finding nearest nodes • Experimental simulations are performed
  • 23. Q & A? Thank you!