Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Cashmere: Resilient Anonymous Routing CS290F March 7, 2005.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
1 Unstructured Routing : Gnutella and Freenet Presented By Matthew, Nicolai, Paul.
I NTERNET A NONYMITY By Esra Erdin. Introduction Types of Anonymity Systems TOR Overview Working Mechanism of TOR I2P Overview Working Mechanism of I2P.
Analysis of Onion Routing Presented in by Jayanthkumar Kannan On 10/8/03.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
The Anonymous File Transfer Network
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Anonymity on the Internet Presented by Randy Unger.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
The Intranet.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Freenet: Anonymous Storage and Retrieval of Information
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Securing Access to Data Using IPsec Josh Jones Cosc352.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
The Intranet.
Zueyong Zhu† and J. William Atwood‡
Deanonymization of Clients in Bitcoin P2P Network
OneSwarm: Privacy Preserving P2P
0x1A Great Papers in Computer Security
Unstructured Routing : Gnutella and Freenet
#02 Peer to Peer Networking
Presentation transcript:

Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Outline Overview Related Works Data Sharing with OneSwarm Protocol Design Security Analysis Evaluation

Overview P2P file sharing is efficient and common Most P2P application allow third parties to monitor users behaviour Privacy -the protection of information from unauthorized disclosure Attackers can get some privacy information by observing user behaviour ex: using BitTorrent to download security patch

Related Works BitTorrent A common P2P file sharing protocol with high efficiency but without privacy protection Tor Uses onion routing techniques to anonymize request via a set of relay nodes Freenet Uses an anonymous P2P publishing system

Data Sharing with OneSwarm An exmaple

Data Sharing with OneSwarm Public distribution Everyone in the network can download file freely All data need not be private Serves as a fully backwards compatible BitTorrent client

Data Sharing with OneSwarm With permission Only users with permission can download files Uses persistent identities to define per-file permission Allows all permitted users to recognize one another and engage in swarming downlod

Data Sharing with OneSwarm Without attribution Depends on obscuring attribution of source and/or destination Instead of directly advertise data, it uses privacy- preserving keyword search Data is relayed through unknown number of intermediaries Apprpriate for sensitive material

Protocol Design Two major tasks Defining and maintaining the overlay topology Locating and transferring data objects Topology Define overlay links by exchanging public keys Peers are either trusted or untrusted

Protocol Design Transport The mesh defined by the web of trust among users is ued to locate and transfer data Inspired by existing P2P swarming systems e.g., BitTorrent Restrics direct communication to a small number of persistent contacts Locates distant data source by flooding through the overlay Data transfers occur over the reverse search path Obscuring the identities of sender and receiver when sharing data without attribution

Protocol Design Linking Peers with Trust relationships 1024 bit RSA public/private key pair, public key serves as its identity (persistent) among its peers Key exchange Discover and exchange over local area network Piggy-back on existing social network e.g., Google Talk By invitations

Protocol Design Managing Groups and Trusted Peers Private Community Server Maintains a list of registered users Provides authorized subscibers with a current set of public keys Public Community Server Allows new users to easily obtain a set of untrusted peers

Protocol Design Identity and Connectivity Long-term identities are linked to transient IP and port number via DHT DHT entries are encrypted with public key ID->{IP, Port} Various key exchange + DHT => overlay mesh

Protocol Design Naming and Locating Data Between connected peers => exchange file list Naming 160 bit SHA-1 hash of name and content Low order 6 bit => file ID in search message Congestion Aware Search Tradeoff between overhead and performance Shortest path Management of propagation of searches

Protocol Design Naming and Locating Data Congestion Aware Search Search message don’t have time-to-live Maintaining a set of rotating Bloom filter and forward search message if the forwarder had idle cpacity and hasnot yet forwrded it Forward to untrusted peer probabilistically Delay 150ms before forwarding Terminate with search cancel message

Protocol Design Naming and Locating Data Path Setup Search message matched => search reply (delayed) Search identifier Path identifier

Protocol Design Swarming Data Transfer Keep alive message refresh path Tunnels BitTorrent traffic through overlay paths Dicover new path by periodically flooding search message Enhance load balance and efficiency

Protocol Design Incentives Client maintain tansfer statistics for each peer Retain tic-for-tac in BitTorrent Contention => weight decided by ratio of contribution and net consumption Forwarding is sum to 0

Security Analysis Goal Improve privacy by allowing users to control information disclosure Resistent to the disclosure of user behaviour to an attacker with control over a limited # of overlay nodes

Security Analysis Attacks and Defenses Persistent peering relationship limit monitoring power Heterogeneity of trust relationship foils timing attacks Lack of source routing limits correlation attacks Constrained reandomness frustrates statistical attacks Network dynamics limit value of historical data

Security Analysis Timming Attacks

Security Analysis Collusion Attacks

Evaluation Overlay structure

Evaluation Multiple-path Transfer

Evaluation Comparison with existing systems

Evaluation Overhead

Evaluation Utilization

Conclusion Strength Data collected from real world Weakness Not well organized