DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Signalling Flows for the IP Multimedia Call Control in 3G Wireless Network Master’s Project By Sanjeev Kayath.
Copyright © 2001 Qusay H. Mahmoud RMI – Remote Method Invocation Introduction What is RMI? RMI System Architecture How does RMI work? Distributed Garbage.
Using DSVM to Implement a Distributed File System Ramon Lawrence Dept. of Computer Science
Network Layer and Transport Layer.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Computer Science Lecture 2, page 1 CS677: Distributed OS Last Class: Introduction Distributed Systems – A collection of independent computers that appears.
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
Brief Overview of.NET Remoting.NET Remoting is a Java RMI-like remote method invocation mechanism Infrastructure of.NET Remoting is highly customizable.
An Introduction to Internetworking. Why distributed systems - Share resources (devices & CPU) - Communicate people (by transmitting data)
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
P2P Project Mark Kurman Nir Zur Danny Avigdor. Introduction ► Motivation:  Firewalls may allow TCP or UDP connections on several specific ports and block.
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
Introduction to client/server architecture
Boyu Chen Yulin Xia Haoyu Xu Viterbi School of Engineering University of Southern California P2P file sharing system with a central server.
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
CH2 System models.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Networks QUME 185 Introduction to Computer Applications.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Web HTTP Hypertext Transfer Protocol. Web Terminology ◘Message: The basic unit of HTTP communication, consisting of structured sequence of octets matching.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
How computer’s are linked together.
Introduction to dCache Zhenping (Jane) Liu ATLAS Computing Facility, Physics Department Brookhaven National Lab 09/12 – 09/13, 2005 USATLAS Tier-1 & Tier-2.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
A Service Oriented Architecture for the Finance Case Study
1 Client-Server Interaction. 2 Functionality Transport layer and layers below –Basic communication –Reliability Application layer –Abstractions Files.
Application Development
Implementing ISA Server Caching
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
The Client-Server Model And the Socket API. Client-Server (1) The datagram service does not require cooperation between the peer applications but such.
Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Secure Sharding.
Socket Programming.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Communications & Networks National 4 & 5 Computing Science.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 SERVICE ORIENTED ARCHITECTURE ANTHONY GACHANGO D61/70547/2008 DIS 601.
Multimedia Retrieval Architecture Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia Retrieval Architecture.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Java Networking I IS Outline  Quiz #3  Network architecture  Protocols  Sockets  Server Sockets  Multi-threaded Servers.
Distributed Computing & Embedded Systems Chapter 4: Remote Method Invocation Dr. Umair Ali Khan.
Process-to-Process Delivery:
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
Topic 4: Distributed Objects Dr. Ayman Srour Faculty of Applied Engineering and Urban Planning University of Palestine.
Last Class: Introduction
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
Local MAC Address Protocol
#01 Client/Server Computing
File Transfer Protocol
Comparison of LAN, MAN, WAN
Architecture Competency Group
Network and the internet
InfoShare A Distributed P2P Information Storage & Retrieval System
Process-to-Process Delivery: UDP, TCP
Realizing a Peer-to-Peer System using a common API
#01 Client/Server Computing
Presentation transcript:

DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512

SYNOPSIS  Introduction  Abstract  Existing System  Proposed System  Architecture  Server  Client  Peer  Implementation

Introduction  DEMIGUISE Storage System  DEMIGUISE is a magical creature that makes itself invisible  Necessity for such System  Goal of the System  To ensure sender/receiver anonymity

EXISTING SYSTEM & PROPOSED SYSTEM Existing System:  The existing system focusses on anonymous communication  Achieved through various routing protocols  One such protocol is Onion Routing protocol  Used in peer to peer architecture Proposed System:  To achieve anonymous file storage in a network  Uses Client/Server architecture

ARCHITECTURE  Server/Client Architecture  Communication by Message passing

SERVER  Responsible for handling requests from Clients  Capable of connecting with multiple Clients  Uses Sockets for connection  Also responsible for load balancing in the network  Maintains a database

SERVER – DATABASE  Two Tables  File Store Table  Status Table  File Store Table  Origin, Destination, File Name of each file stored in the network  Both Origin & Destination are client ids.  Status Table  Contains information about the status of each client  Used for load balancing

CLIENT  Typically send requests to Server for service  Types of requests  Store a File  Retrieve a File  Delete a File  Maintains a database with list of files stored in the network

PEER  Peer is essentially each client in the network  Responsible for accepting requests from Server  Requests include  Store File  Retrieve File  Delete a File

Implementation  Request Reply Messages between Server/Client  Store a File – Client Requests  Request Server to Store a file  Send the File  Store a File – Server Actions  Request peer to store the file  Ask Client for File  Forward file to peer  Similar procedure to retrieve file

Socket Connections in Server  Two Sockets  Client connect  Peer Connect  Client Connect  Connects multiple clients  Used for communication with client – message passing  Peer Connect  Connects to the required peer to store/retrieve file  Used for communication with peer

Event Flow Diagram – Connected to Server

Event Flow – Store Request CLIENT  Client Sends “Request Store“  Receive Ack and if it is “Ok To Send” then send the file  Wait for Ack from Server SERVER  Receive “message”  Check if message is “Request Store” and reply with “Ok To Send”  Receive the File  Check from database which peer is available to store the file  Forward the file to peer  Insert File Name, Origin, Destination to File Store Table  Send “File Transfer Successful” to Client

Event Flow – Retrieve Request CLIENT  Client Sends “Retrieve Store along with Filename“  Wait for File from Server SERVER  Receive “message”  Check if message is “Retrieve Store”  Check from File Store Table the Destination  Forward the request to peer  Receive the file from peer  Send the file to client

Validation of Requests in Server  Validation of connection request done in Server  To ensure the identity of the Client  Uses a unique Client_Id while the client connects.

LOAD BALANCING  Server forwards the store request to the peer  Balanced load can be maintained in network  Server has information about load on each client  Uses this to decide which peer to forward the incoming file

FUTURE IMPROVEMENTS  Proxy Servers can be used to handle requests  Use of encryption/decryption mechanisms  Authentication based on users instead of client id  Replication of files in more than one system based for more robust system

Questions?

Thank You