Low-Cost and Reliable Mutual Anonymity Protocol in Peer-to- Peer Networks Li Xiao Zhichen Xu Xiaodong Zhang IEEE Transactions on parallel and distributed.

Slides:



Advertisements
Similar presentations
Digital Library Service – An overview Introduction System Architecture Components and their functionalities Experimental Results.
Advertisements

Scalable Content-Addressable Network Lintao Liu
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Rumor Riding, IEEE ICNP2006, Jinsong Han & Yunhao Liu, HKUST, Nov 12 1 Rumor Riding Anonymizing Unstructured Peer- to-Peer System Jinsong Han and Yunhao.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Freenet A Distributed Anonymous Information Storage and Retrieval System Ian Clarke Oskar Sandberg Brandon Wiley Theodore W.Hong.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
Peer-to-Peer Technology and Security Issues By Raul Rodriguez, Arash Zarrinbakhsh, Cynthia Roger and Phillip Shires College of Business Administration.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Chord and CFS Philip Skov Knudsen Niels Teglsbo Jensen Mads Lundemann
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
Object Naming & Content based Object Search 2/3/2003.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Wide-area cooperative storage with CFS
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Resilient P2P Anonymous Routing by Using Redundancy Yingwu Zhu.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Introduction to DFS. Distributed File Systems A file system whose clients, servers and storage devices are dispersed among the machines of a distributed.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Peer to Peer Network Design Discovery and Routing algorithms
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
A Social-Network-Aided Efficient Peer-to-Peer Live Streaming System IEEE/ACM TRANSACTIONS ON NETWORKING, JUNE 2015 Haiying Shen, Yuhua Lin Dept. of Electrical.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
CHAPTER 3 Architectures for Distributed Systems
SCOPE: Scalable Consistency in Structured P2P Systems
A Scalable content-addressable network
Chord and CFS Philip Skov Knudsen
InfoShare A Distributed P2P Information Storage & Retrieval System
Lin Xiao David A. Bryan Yingjie Gu Xuan Tai
Presentation transcript:

Low-Cost and Reliable Mutual Anonymity Protocol in Peer-to- Peer Networks Li Xiao Zhichen Xu Xiaodong Zhang IEEE Transactions on parallel and distributed systems Yu-Chao Lin

Outline Introduction Mutual Anonymity With Trusted Third Parties Mutual Anonymity In Pure P2P System Protocol Analysis Conclusion

Introduction (1/2) Peer  Publisher : Produce document  Provider : Deliver documents upon requests, also called responder  Requester : Request documents, also called initiator Type of P2P system  Pure P2P : Peers share data without a centralized coordination  Hybrid P2P : Some operations are intentionally centralized, such as indexing of peers’ files

Introduction (2/2) Mutual anonymity Peer1 Peer2 Peer3 Upload data Download data

Introduction Index Server : Keep the whereabouts of the contents that are stored in the peers Mutual anonymity protocol with trusted server  Mix-Based protocol  Center-Directing protocol  Label-Switching protocol Mutual anonymity protocol in pure P2P  Shortcut-responding protocol

Mutual Anonymity With Trusted Third Parties (1/2) I : represent the initator R : represent the responder S : represent the index server P i : represent a peer (i=1, 2, 3, ……) X -> Y : M : represent X sending a message M to Y K x : denote the RSA public key of X K : denote the DES key (RSA (M)K : represent encrypting the message M with the key K (RSA or DES)

Mutual Anonymity With Trusted Third Parties (2/2) Index server : record index of files that peers want to share with others peers, and has all public keys of peers

Mix-Based Protocol (1/2) I index server I → S : (file_ID)K s Find out that the file is possessed by R, it selects a list of peers p 0, p 1, p 2,..p k at random to generate mix path R S→R : ( (K)K R, (file_ID)K, (K)K I, (p 0, (p 1, (I, fakemix)Kp 1 )Kp 0 )K R ) p0p0 p1p1 R→p 0 : ( (f)K, (K)K I, (p 1, (I, fakemix)Kp 1 )Kp 0 ) p 0 →p 1 : ( (f)K, (K)K I, (I, fakemix)Kp 1 ) p 1 →I : ( (f)K, (K)K I, fakemix )

Mix-Based Protocol (2/2) Mix path : (p 0, (p 1 …(I, fakemix)Kp k..)Kp 0 )K R Only the path is encrypted with an expensive public key encryption, and the content is encrypted with a less expensive DES key

Center-Directing Protocol (1/2) I index server R p0p0 p1p1 I → S : (file_ID)K s 1.Generate a unique label n for the request 2.Generate the first middle node p 0 3.Generate DES key K 4.Generate another node number p j0 randomly S →R : ( (K)K R, (n, file_ID, p 0, p j0 )K, (K)K I ) 1.Generate next middle node p 1 2.Generate another node number p j1 3.Convert the request label n to (n)Kp j0 1.Get K from (K)K R 2.Convert the request label n to (n)Kp j0 R →p 0 : ( (n)Kp j0, (f)K, (K)K I ) S →p 0 : ( (n)Kp j0, (p 1, p j1 )Kp 0 ) p0 →p1 : ( ((n)Kp j0 )Kp j1, (f)K, (K)K I ) S →p 1 : ( ((n)Kp j0 )Kp j1, (I, p j2 )Kp 1 ) p 1 →I : ( (((n)Kp j0 )Kp j1 )Kp j2, (f)K, (K)K I )

Center-Directing Protocol (2/2) The label uniquely identify a message Each pi keeps a hash table to synchronize between the message from the index server and the message from its previous hop Randomly generated node has no correlation with nodes in the covert path (p j0, p j1, p j2,……p jk ) This protocol take advantage of the fact that encryption cost is much lower than decryption cost in public key encryption ( encryption/decryption = 543/45.4 Kbps) The sizes of items that need to be encrypted by public key encryption are independent of the path length

Label-Switching Protocol (1/3) Index server produces a path table beforehand, and each peer p i, as a destination, is associated with several path option (p x -p y -..-p i ) Each peer has subtables that related to the path table

Label-Switching Protocol (2/3) Step 1: The initiator I sends a request to S I →S : (file_ID)K s Step 2: S randomly select a path for I (p 0 -p 1 -..p k -I), and path has a label L. S →R: ( (L, p 0 )K, (K)K R, (K)K I ) Step 3: R →p 0 : L, and a persistent connection will be established between R and p 0 Step 4: Similar method with step 3, so we can construct a persistent connection R-L →I : (f)K, (K)K I

Label-Switching Protocol (3/3) It does not need the synchronization associated with center-directing protocol It does not need much encryption and decryption operations But need the spaces for storing the path table and subtables and the time spending on table look-ups Index server will updating the path table periodically

Shortcut-Responding Protocol (1/2) The initiator I randomly select a list of peers r 0, r 1,.., r kr and build replyblock with I Replyblock : (r kr, (r kr-1..(r 0, (I, fakemix)K r0 )K r1 …)K rkr ) The responder a list of peers o 0, o 1, …,o k0 at random and build Onion Onion : (o 0, (o 1, …(o k0, (relay, fakemix)Ko k0 )Ko k0-1… )Ko0) R →relay →I : (r, (f)K I ) Ip0p0 p1p1 p2p2 p3p3 r0r0 r1r1 p4p4 p5p5 p6p6 R o0o0 o1o1 (r, replyblock, K I ) (r, relay:p3, K I ) Replyblock Onion Reply block Save request r

Shortcut-Responding Protocol (2/2) The response path can be shorter than the requesting path Eliminating the index maintenance overhead and the problem of inconsistency between index records and peer file contents

Protocol Analysis

The time spent on RSA for the mix-based protocol increase as the number of middle nodes increases. The time spent on DES and RSA for the center-directing and label- switching protocols are independent of the number of middle nodes

Conclusion Providing a reliable and efficient anonymity protection among peers is highly desirable in a scalable and secured P2P system If storage space is not a concern, the label-switching protocol is best choice The center-directing protocol could handle case that if a node in a covert path is down