Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School.

Slides:



Advertisements
Similar presentations
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Rumor Riding, IEEE ICNP2006, Jinsong Han & Yunhao Liu, HKUST, Nov 12 1 Rumor Riding Anonymizing Unstructured Peer- to-Peer System Jinsong Han and Yunhao.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Anonymity and Security in Public Internet Forums Ho-fung LEUNG Senior Member, IEEE Dept. of Computer Science & Engineering The Chinese University of Hong.
1 Representing Identity CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 19, 2004.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
MuON: Epidemic Based Mutual Anonymity Neelesh Bansod, Ashish Malgi, Byung Choi and Jean Mayo.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
PART THREE E-commerce in Action Norton University E-commerce in Action.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Wireless and Security CSCI 5857: Encoding and Encryption.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Secure Socket Layer (SSL)
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Lecture 11: Strong Passwords
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Cryptography CSS 329 Lecture 13:SSL.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School of Chinese Academy of Sciences Jinsong Han, Yunhao Liu, Lionel M. Ni Dept. of Computer Science and Engineering, Hong Kong University of Science and Technology Jinpeng Huai School of Computer Science, State Key Lab of Software Developing Environment, Beihang University

Authentication To make one person trust another one. Who is talking to whom must be as valid as whom he or she claimed. Is he/she the valid person who is searching a public database? Is he/she the valid person who provide you a movie without virus? Is the collaborating company legal? Is a cheater who send you an ?

However… Your machine may be accessed by a hacker. You may receive fraudulent. advertisement via . The goal of authentication: A host will communicate with a server while he can determine its identity.

Anonymity or Privacy the right to be let alone: one of the rights most cherished by people. Who is talking to whom should be confidential or private in the Internet. Who is searching a public database? Which movie are you downloading? Which companies are collaborating? Who are you talking to via ?

However… Your machine’s IP uniquely identifies you across web sites. Nothing illegal about cross-referencing. The goal of Internet anonymity: A host can communicate with a server while nobody can determine its identity

Previous approaches: Authentication Authentication in P2P is used to help evaluating reputations of peers. To know Who want to download or searching from Whom. Indeed, current P2P trust designs are identity-based, where one peer does not trust another before knowing its identity. Not trying to protect the identity’s anonymity of peers.

Previous approaches: Anonymity Anonymity is the state of being indistinguishable from other members of some group. Don’t know Who is Searching or Downloading What from Whom. Main goal is to hide initiator’s and responder’s real identities, such as IP address, post address, etc. Not trying to authenticate the validity of peers.

IP D C IP C B Anonymity Examples: Mix & Onion ABCD IP D IP C IP B IP D M IP C IP D M D C B M D C IP C M D ABCDABCD Public keys IP

Anonymity Example: APFS Server Client However, APFS is just for file delivery, without identity authentication.

Tradeoff Authentication is Identity-based –Leaking the real identity of peer, such as IP address, post address… Anonymity is to hide the identity. –Vulnerable to many active attacks, especially impersonation and man-in-middle- attack.

Basic goal: A New Mutual Anonymity Authentication for P2P Non ID-based authentication No need to know real identity of peer before authentication. Pseudonym-based authentication. Invulnerable to many active attacks. Impersonation Man-in-Middle-Attack Replay… Lightweight: efficient pseudonym generation and authentication.

Query and Downloading in Unstructured P2P Systems Flooding based query Reversed path based response Direct downloading Initiator Query Responder Response Downloading

Pseudonym generation We use cryptographic hash function to generate pseudonym PI: Where moduli, andare two big primes. These two primes are kept as peer’s secrets. Due to the one-way and collision-resistant properties of hash function, a malicious peer cannot impersonate other peer’s pseudonym.

Our Design: Pseudo Trust Initiator I Tail node Responder R Onion PathFlooding Query q Query Sending

Response Initiator I Responder R Query q Response; prove your pseudonym. TCP Link Onion Path between R and Tail node Onion Path between I and

Mutual authentication Initiator I Tail node Responder R Onion Path between R and Tail node Onion Path between I and Authentication request Challenge messageRequest verification Proof generation Proof verification TCP Link Responder authenticates initiator. Similar procedure for Initiator authenticating responder

Remarks on mutual authentication The zero-knowledge identification protocol is used to implement pseudonym-base authentication. Session key exchange is embedded in the mutual authentication. After authentication, initiator and responder can use the session key to protect file confidentiality and integrity. For example, using symmetric-key encryption and massage authentication code.

Several important issues Security Anonymity degree Impersonation Man-in-Middle-attack Overhead Traffic overhead Cryptographic overhead Response time of queries

Security Analysis Completely anonymity Resistant to impersonation and replay. Man-in-Middle attacker gets nothing from authentication Resistant to inner attacks Tail nodes are attackers. Initiator or responder is attack.

Trace Driven Simulation Physic network: Gnutella Overlay network: DSS Clip2 trace In a variety of network sizes ranging from hundreds to thousands. For each simulation, we take the average result from 1,000 runs.

The response time of APFS is approximately 3 times that of overt Gnutella, while PT is around 7 times that of overt Gnutella. The time consumed in anonymous paths of PT constitutes a major part of the whole latency. The time consumption of authentication is indeed trivial. Response Time

Traffic Overhead The figure above plots the extra traffic cost brought about by authentication procedures. Traffic stretch is defined as the traffic cost ratio between PT plus Gnutella, and Gnutella only

Prototype Implementation We implemented a prototype in our labs at the Chinese Academy of Sciences, the campus of Beihang University and Hong Kong University of Science and Technology. We test: The extra computation overhead caused by PT. Overall latency of pseudo identity authentication procedures in the Internet environment

Pseudonym certificate generation Computational Overhead Proof generation Verification

Time Consumption in Message Transmission CAN testMAN test WAN test

Li Lu, Lei Hu State Key Lab of Information Security, Graduate School of Chinese Academy of Sciences Jinsong Han, Yunhao Liu, Lionel M. Ni Dept. of Computer Science and Engineering, Hong Kong University of Science and Technology Jinpeng Huai School of Computer Science, State Key Lab of Software Developing Environment, Beihang University