Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,

Slides:



Advertisements
Similar presentations
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Security Awareness: Applying Practical Security in Your World
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
Tarzan: A Peer-to-Peer Anonymizing Network Layer Michael J. Freedman, NYU Robert Morris, MIT ACM CCS 2002
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
The Anonymous File Transfer Network
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Application Layer – Peer-to-peer UIUC CS438: Communication Networks Summer 2014 Fred Douglas Slides: Fred, Kurose&Ross (sometimes edited)
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Lecturer: Ghadah Aldehim
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
An analysis of Skype protocol Presented by: Abdul Haleem.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
TCP Security Vulnerabilities Phil Cayton CSE
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
Security Issues.
The OSI Model and the TCP/IP Protocol Suite
Defending Against DDoS
CHAPTER 3 Architectures for Distributed Systems
The OSI Model and the TCP/IP Protocol Suite
Defending Against DDoS
0x1A Great Papers in Computer Security
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt, and M. D. Smith

Digital Rights Management One of the big reasons for pushing trusted computing is preventing piracy. Remote attestation: only play media on trusted player hardware/software. Sealed storage: prevent other programs from reading media. Secure memory: hide player memory from OS Secure output: create trusted path from computer to monitor, speakers, etc.

The Analog Hole Problem: video cameras, audio recorders. Trusted computing can’t secure sound waves, or the light coming from a computer screen. Upper bound: DRM can never make piracy harder than making an analog recording. – It’s not hard to make good-quality analog recordings, and the cost keeps falling.

Cost of piracy (to pirates) Two components of the cost: – One-time extraction cost e – Per-copy distribution cost d Cost per copy (for n copies total):

Costs depend on technology Before high-speed Internet: per-copy distribution costs dominated. Currently: per-copy costs almost 0, extraction cost very low. DRM raises extraction cost, with upper bound imposed by analog hole. Attacking file-sharing raises distribution costs, with no upper bound.

Attacks on P2P file-sharing Gather IP addresses and log their activity. Sue the top uploaders. (“The nuclear option”) Share fake files. Drown out signal with noise. Pretend to be other users, to mess up reputation mechanisms (e.g. share ratio) Denial of service attacks, e.g. – Flood network with search requests – Mess up network topology information.

Trusted clients only! Remote attestation to ensure trusted client/OS combination. Encrypt all connections with securely-stored session keys, and sign data with keyed hash. – Prevents snooping, spoofing. Use reputation system to prevent DoS attacks and sharing fake files.

How to stay anonymous? How can P2P networks protect against their uploaders getting sued? 1.Encrypt all data end-to-end. 2.Re-route traffic through intermediate nodes, like The Onion Router, to foil network analysis. 3.Keep as much of the routing data in secure memory as possible. This all works better with trusted clients.

Example: BitTorrent Malicious client connects to central tracker, gets list of peers. Then: 1.Connect to peers, request download of copyrighted files. 2.Store all information – filename, IP address, time, etc., in a database. 3.Do DNS WHOIS search, notify ISP and/or file lawsuits. To prevent: use relay nodes, and trusted client to prevent network topology discovery.

Relay nodes Don’t have Alice send a message to Bob. Instead: – Alice sends message to Tom, – Tom sends message to Ulysses, – Ulysses sends message to Veronica, – Veronica sends message to Bob. Encrypt the message so that nobody knows who’s sending what to whom except for Alice and Bob. (How?)

Untrusted clients: Onion routing Alice comes up with a sequence of node hops, She sends the first relay an “Onion” data structure: – Next node info – Onion for the rest of the relays Each relay knows only part of the path. Uses layered encryption

Trusted clients: known relay topology Route packets in a randomized way. Load balance dynamically, for speed. Don’t worry about keeping relays in the dark; they have curtained memory and trusted software! Increases resistance to traffic analysis. (Problem: adversaries who can break the TPM.)

Back to the economics Trusted computing raises e, to a point. It can also lower d, a lot, by making distribution easier and safer. Trusted Computing for DRM may backfire spectacularly!

Back to the economics Trusted computing raises e, to a point. It can also lower d, a lot, by making distribution easier and safer. Trusted Computing for DRM may backfire spectacularly! Questions?