OneSwarm: Privacy Preserving P2P

Slides:



Advertisements
Similar presentations
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Advertisements

Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
BitTorrent Join the swarm! BY: Joe Petruska. What is BitTorrent? a peer-to-peer file sharing protocol used for distributing large amounts of data.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
1 Networks and Internet Objectives Understand basic concepts in Networking Network Types Understand basic concepts in Internet Internet Services Become.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Object Naming & Content based Object Search 2/3/2003.
Wide-area cooperative storage with CFS
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
GNUTELLA PEER-TO-PEER NETWORKING. GNUTELLA n What is Gnutella n Relation to the World Wide Web n How it Works n Sites / Links / Information.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Presented by: Sanketh Beerabbi University of Central Florida.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
E a s y S h a r e Jung Son Ky Le. Operational Concepts Recent years, huge number of growth in Internet users and broadband usage File-sharing become extremely.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Malugo – a scalable peer-to-peer storage system..
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
November 19, 2016 Guide:- Mrs. Kale J. S. Presented By:- Hamand Amol Sambhaji. Hamand Amol Sambhaji. Pardeshi Dhananjay Rajendra. Pardeshi Dhananjay Rajendra.
Advanced Computer Networks: Part 1
An example of peer-to-peer application
Peer-to-peer systems and
The Hidden Locality in Swarms
Data Management on Opportunistic Grids
Copyright notice © 2008 Raul Jimenez - -
Introduction to BitTorrent
Zueyong Zhu† and J. William Atwood‡
I know what you are Sharing
Peer-to-peer networking
CHAPTER 3 Architectures for Distributed Systems
Introduction to Cloud Computing
Internet Networking recitation #12
Comparison of LAN, MAN, WAN
An Introduction to Computer Networking
Distributed P2P File System
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
SCHOOL OF ELECTRICAL ENGINEERING AND TELECOMMUNICATIONS
Distributed Ledger Technology (DLT) and Blockchain
The BitTorrent Protocol
PEER-TO-PEER SYSTEMS.
Designing IIS Security (IIS – Internet Information Service)
#02 Peer to Peer Networking
SPINE: Surveillance protection in the network Elements
Presentation transcript:

OneSwarm: Privacy Preserving P2P Roberto Alberdeston CAP 6135 Spring 2012 Reference: Privacy-preserving P2P data sharing with OneSwarm http://oneswarm.cs.washington.edu 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 http://www.OneSwarm.org 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm Terms P2P - a computer network in which each computer in the network can act as a client or server, allowing shared access to resources without central server. Swarm - is the collective behavior of decentralized, self-organized systems. 11/14/2018 Alberdeston - CAP6135 Spring 2012

OneSwarm Characteristics Privacy Focused P2P Network User Defined Access Control Data is transferred using trusted and untrusted nodes. (transfer dependent) 11/14/2018 Alberdeston - CAP6135 Spring 2012

OneSwarm Characteristics (cont) Multi Path Packet Transfer Congestion Aware Network Bit Torrent Capable Client 11/14/2018 Alberdeston - CAP6135 Spring 2012

Issues with Current P2P Systems Bit Torrent Great performance but poor privacy Freenet Anonymous but lacks access control TOR Nodes participate in questionable traffic 11/14/2018 Alberdeston - CAP6135 Spring 2012

OneSwarm Key Focus Areas User Based Privacy Performance 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm Benefits Better Performance/Privacy Runs most file formats natively Bit Torrent Compatible 11/14/2018 Alberdeston - CAP6135 Spring 2012

OneSwarm Benefits (cont) Multiple Permission Settings Persistent Identities Multi Path Packet Delivery Cost Reduction for Content Distribution (ex: YouTube) 11/14/2018 Alberdeston - CAP6135 Spring 2012

OneSwarm Data Transfers Mesh of trusted/untrusted nodes Three Types of Transfers Public No Attribution (Anonymous) With Permission (friend-2-friend) 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm Data Sharing 11/14/2018 Alberdeston - CAP6135 Spring 2012

OneSwarm: Finding Data Public/No Attribution Search Based Private Advertising 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm Components Client/Node Trusted Untrusted Replicas Community Servers Key Management + Transfer Groups/Subscriptions 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm Node Privacy Each Client/Node ID using public (RSA) key per node List of Nodes List kept in DHT (distributed hash table) DHT has 20 copies (fault tolerance) Data/Files Named with 160-bit SHA-1 hash 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 Growing the Swarm Gtalk User List Import Gtalk Connection Local Area Network Automatically shared keys with LAN Manual Key Exchange (Friends) Most Popular Method 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm: Fairness New Users start with default “contribution” value. If the upload/download ratio > 1, user is given access to more nodes in transfer. Promotes fairness and ensures performance 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm Security Protocol Security Components Prevent Timing + Collusion Attacks Components Randomization of Nodes Force Delays User Control Forwarding Probability 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm Testing Real World LonePlanet Computers 100k User Provided Statistics Simulation Last.fm Social Graph 11/14/2018 Alberdeston - CAP6135 Spring 2012

OneSwarm Testing (cont) Data Analysis Session Times Geographic Distribution Usage Patterns Upload Capacity Download Capacity 11/14/2018 Alberdeston - CAP6135 Spring 2012

OneSwarm Testing (cont) Results of Testing Most permission based relationship were friend-to-friend Transfers over the multipath P2P network FASTER than point-point Temporarily overloaded clients NOT common Transfer Speed >> TOR 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm Conclusion P2P Network Privacy Performance User Based Permissions Mesh of Trusted and Untrusted Nodes 11/14/2018 Alberdeston - CAP6135 Spring 2012

OneSwarm Conclusion (cont) Three Data Sharing Models Public Anonymous Private Inherent Security Components Best PRIVACY/PERFORMANCE 11/14/2018 Alberdeston - CAP6135 Spring 2012

Alberdeston - CAP6135 Spring 2012 OneSwarm Conclusion Questions? 11/14/2018 Alberdeston - CAP6135 Spring 2012