6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Peer-to-Peer and Social Networks An overview of Gnutella.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Secure Sockets Layer. SSL SSL is a communications protocol layer which can be placed between TCP/IP and HTTP It intercepts web traffic and provides security.
Network Layer and Transport Layer.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Leveraging Social Networks for Increased BitTorrent Robustness Wojciech Galuba, Karl Aberer EPFL, Switzerland Zoran Despotovic, Wolfgang Kellerer Docomo.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.

BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Lecturer: Ghadah Aldehim
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Chapter 2: Application layer
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
Network Security – Special Topic on Skype Security.
Consider a network in which for any two nodes directly connected with a link, a message either reaches its destination within T time or gets lost. (a)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
UNIT 2 LESSON 8 CS PRINCIPLES. UNIT 2 LESSON 8 OBJECTIVES Students will be able to: Describe how routers develop routing tables to determine how to send.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
P2P Storage/Bandwidth Sharing: Fairness and Security.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
An example of peer-to-peer application
Peer-to-Peer and Social Networks
Anonymity (Privacy) Suppose you are surfing the Web.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes

The problem ● Most P2P networks are insecure ● Thus they are susceptible to lawsuits

Napster ● Centralized servers ● Easily taken down

Gnutella ● Decentralized ● Still possible to glean IP addresses of the individual nodes

KaZaA ● Much more efficient ● Uses supernodes to route traffic ● Hundred of users have been sued

Direct Connect ● Uses hubs and has large minimum share sizes

Bittorrent ● Each file must be hosted by a tracker and then is forwarded though a chain of downloaders/uploaders

Bittorrent ● If the tracker goes down, the other nodes have no way of finding each other ● The IP address of the tracker is easily traced

WASTE ● A truly secure network with rings of encryption

WASTE ● The problem is that these two networks cannot communicate with each other

WASTE ● The reason why other P2P networks are so popular is because you can share files with people you don't personally know

A New Network ● What is needed is a network that will allow you to share files with people you don't know, without revealing your identity to them.

A little history ● In 1967 Stanly Milgrim published an article entitled “The Small World Phenomenon” in Psychology Today

A little history ● In 1967 Stanly Milgrim published an article entitled “The Small World Phenomenon” in Psychology Today ● He concluded that most people in the world were connected to each other by a chain of six friends

A little history ● In 1967 Stanly Milgrim published an article entitled “The Small World Phenomenon” in Psychology Today ● He concluded that most people in the world were connected to each other by a chain of six friends ● It was from this and later studies that the popular idea of Six Degrees of separation came from

A little history ● There has been some debate about whether the average of six connections between any two people holds true throughout the world, but physiologists agree that are a lot of subnetworks with people being connected by an average of six or even fewer friends

Six Degrees ● It may be possible to create a secure anonymous network on this principle

Six Degrees ● Instead of sharing files with anyone who asks for them you will only reveal what files you are sharing to your trusted friends

Six Degrees ● In turn they will let others know about these files, but not reveal your IP address

So How does this Work? ● The base of the network is similar to WASTE, and the entire protocol depends on Public Key Cryptography

Public Key Cryptography ● Each connection in this darknet represents an exchange of public keys B A Here is my public Key

Public Key Cryptography ● If Bob put Alice's public key in his list of trusted users (Bob has decided to trust Alice), Alice will be able to download files from Bob B A Bob: I'll trust this key

Public Key Cryptography ● All the files Bob send to Alice will be encrypted with Alice's public key, and no one will be able to read them but Alice. B A I can't read this! E

Public Key Cryptography ● Assuming that Alice is kind enough to return the favor and trust Bob, they will both be able to access each other's files, and Eve will not be able to eavesdrop at all. B A I still can't read this! E

Public Key Cryptography ● Supposing that Carol has a file that Alice wants. B A E C

Public Key Cryptography ● Alice does not trust Carol, more importantly Carol does not trust Alice, so there is no way for Alice to know that Carol has the file B A E C

Public Key Cryptography ● If Carol trusts Bob, she will tell him what files she has, and in turn, Bob can tell Alice B A E C

Public Key Cryptography ● Alice will then request the file from Bob, and Bob will request the file from Carol B A E C

Public Key Cryptography ● Bob will act as proxy between Carol and Alice, so that Carol does not have to reveal her IP address to Alice B A E C

Public Key Cryptography ● All the while, Eve who had been trying to eavesdrop on this transfer, can read none of the file. B A E C

Six Degrees ● This method can scale to many users each who only trust a few people, yet can access the entire network G B E F H A I C D

Six Degrees ● Of course the more people you trust (more correctly the more people you can convince to trust you) the faster your downloads will be. G B E F H A I C D

G B E F H A I C D

Problems ● If Bob is the only link between a lot of people, file transfers between them will be very slow G B E F H A I C D

Problems ● Bob can help solve this problem by convincing more of his friends to trust each other G B E F H A I C D

G B E F H A I C D