Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.

Slides:



Advertisements
Similar presentations
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
Advertisements

Scalable Content-Addressable Network Lintao Liu
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker Presented by Greg Nims.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Freenet A Distributed Anonymous Information Storage and Retrieval System Ian Clarke Oskar Sandberg Brandon Wiley Theodore W.Hong.
Small-world Overlay P2P Network
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
FreeNet: A Distributed Anonymous Information Storage and Retrieval System Ian Clark, Oskar Sandberg, Brandon Wiley and Theodore Hong.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
1 Unstructured Routing : Gnutella and Freenet Presented By Matthew, Nicolai, Paul.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
F REENET UDAYA S PISIPATI 02/26/08. C ONTENTS  Introduction  Design goals  Architecture  Basic model  Keys in searching  Retrieving data  Storing.
1 A scalable Content- Addressable Network Sylvia Rathnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker Pirammanayagam Manickavasagam.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Grid vs. Peer-to-Peer Yin Chen 25 June 2003.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Survey of Peer to Peer Technologies Authors: Bratislav Milić, Jelena Krunić, Veljko Milutinović,
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
1 1.Freenet Architecture a)Goals b)Properties 2.Searching a network a)Searching/Routing algorithm b)Adaptive behaviour c)Differences with other algorithms.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Ian Clarke, Oskar Sandberg, Brandon Wiley,Theodore W. Hong Presented by Zhengxiang.
Freenet File sharing for a political world. Freenet: A Distributed Anonymous Information Storage and Retrieval System I. Clarke, O. Sandberg, B. Wiley,
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Josh Colvin CIS 590, Fall 2011.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Freenet Ubiquitous Computing - Assignment Guided By: Prof. Niloy Ganguly Department of Computer Science and Engineering Submitted By: o Parin Deepak Cheda.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Freenet: Anonymous Storage and Retrieval of Information
Company LOGO Freenet By Yogesh Kalyani. OUTLINE  Introducing P2P  Overview of Freenet  Key’s  Protocol  Security Analysis  Improvement  Strength.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Freenet A Distributed Anonymous Information System and Retrieval System I. Clarke, O. Sandberg, B. Wiley, W. Hong ECE 6102 Presented By: Kaushik Chowdhury.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
CS791Aravind Elango Maintenance-Free Global Data Storage Sean Rhea, Chris Wells, Patrick Eaten, Dennis Geels, Ben Zhao, Hakim Weatherspoon and John Kubiatowicz.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Data Management on Opportunistic Grids
CS 268: Lecture 22 (Peer-to-Peer Networks)
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Unstructured Routing : Gnutella and Freenet
Freenet.
Presentation transcript:

Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003

Agenda What is Freenet? Freenet Architecture GUID key Routing Network Evolution Managing Storage Performance Analysis Conclusion and Discussion

What is Freenet? Peer-to-peer file storage application Allow publication, and retrieval of information without censorship Each node Contribute storage Cooperate in routing Computer Node Routing Traffic Storing Files

What is Freenet? Five design goals: Anonymity for both readers and authors Deniability for storers Resistance to attempts by third parties to deny access Efficient dynamic storage and routing Decentralization Emphasize on privacy, availability, true freedom of speech Respond adaptively to usage patterns No guarantee on permanent file storage

GUID Keys Each file is assigned with a location- independent globally unique identifier (GUID), i.e. file key Content-hash keys (CHK) Analogous to inodes File key generated by hashing the content Files are encrypted by a randomly-generated key Required in retrieving

GUID Keys Signed-subspace keys (SSK) Analogous to filenames A public-private key pair is randomly-generated A short descriptive string, e.g. “ mcl/research/paper ” Sets up a personal namespace Sign the file to provide integrity check Required in retrieving

Routing Messages travel via node-to-node paths, NOT directly from sender to recipient Each node Knows only about its immediate neighbors Maintains a routing table that lists the addresses of other nodes and the GUID it think they hold Node e ’ s routing table

Retrieval Routing Depth-first Search with backtracking Forward requests according to routing table Request message contains File key Time-to-live (TTL) limit When receive request Check itself Otherwise, forwards to the node with the closest key Expand c first

Retrieval Routing If fail, try using next-closest key If reach a node that is already in the path, bounced back Until TTL expires, or find the file Expand e then Request Bounced back Find the file

Retrieval Routing If success, file together with a note specifying the holder will be passed back To conceal data holder Any node in the reply path can change holder to itself or any arbitrary node Requests will still locate the data, as this node retains the true holder ’ s identity Update routing table File might be cached at all nodes along the reply path Improved availability, fault-tolerance

Insertion Routing Inserting File Route similarly with requesting file Forward message according to the closeness in key if no key collision Fail if key collision occurs Success if TTL expires without collision Insert file along the path Update routing table Any Node along the path can change holder to itself or any arbitrary node

Anonymity in Routing Requesting file Don ’ t know who are requesting Send the file, holder is x Update routing table, but the true holder may or may not be x Inserting file, holder (inserter) is x Store the file, update routing table, but the true holder may or may not be x Retrieval: Insertion:

Training routes Nodes ’ routing tables should specialize in handling clusters of similar keys Node should specialize in storing clusters of files with similar keys The twin effects of clustering should improve the effectiveness of future queries Key clustering GUID keys are derived from hashes Closeness of keys in storing is unrelated to corresponding files ’ content

Adding Nodes New node first generates a public-private key pair Identify the node Use for future trust mechanism Sends an announcement message including the public key and physical address to an existing node, located through some out-of-band means New node Chosen randomly Propagate until TTL expires Assign random GUID in the key-space using shared random number generation

Managing Storage In each node Storage is managed by LRU (Least Recently Used) Cache Frequency of requests per file Routing mechanism Creates more copies in an area of network where a file is requested Files that go un-requested in another part of the network will be deleted Number and location adjust to demand

Degree Distribution Simulation of 10,000 nodes  Degree distribution among Freenet nodes  Close fit to a power-law distribution Max routing table size

Fault-tolerance 10,000 nodes trained network  Remove nodes randomly  TTL = 500  10 trials Median path length below 20 even 30% of nodes fail Robust against quite large failures Power-law gives high degree of fault tolerance

Fault-tolerance 10,000 nodes trained network  Remove randomly nodes  Remove well-connected nodes first Transition to disconnected fragments

Scalability 20 nodes initially connected in ring topology  Insert & request files to random nodes (TTL = 20)  Create a new node after every 5 inserts and requests, announce randomly to a existing node  Measure after every 100 inserts and requests  End till 200,000 nodes  10 trials Median path length in network scales as N 0.28

Conclusion Freenet is P2P application that designed from a different perspective – free flow of information Using Freenet Can ’ t identify who is requesting a document Can ’ t identify who is inserting a document Can ’ t identify where a document resides

Discussion Replicated File is stored as a whole Fragmentation and erasure correction coding No in-build searching function How to search content in Freenet Cost is high, as message need to travel along the whole path How to provide anonymity efficiently Pornographic/offensive content, terrorism humanity should not be deprived of their freedom to communicate Use for good or bad

References I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley, “ Protecting Freedom of Information Online with Freenet, ” IEEE Internet Computing, vol6(1), Jan-Feb, 2002, pp I. Clarke, T. W. Hong, O. Sandberg, and B. Wiley, “ Freenet: A distributed anonymous information storage and retrieval system, ” Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA,