Peer-to-Peer Reputations

Slides:



Advertisements
Similar presentations
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Advertisements

Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Toolbox Mirror -Overview Effective Distributed Learning.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
EMule behind the scenes. Overview Extends the eDonkey protocol File sharing network Several hundreds of eMule servers Millions of eMule clients Each server.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Center for Autonomic Computing Intel Portland, April 30, 2010 Autonomic Virtual Networks and Applications in Cloud and Collaborative Computing Environments.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Lecture 11: Strong Passwords
The EigenTrust Algorithm for Reputation Management in P2P Networks
Secure Credential Manager Claes Nilsson - Sony Ericsson
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
An analysis of Skype protocol Presented by: Abdul Haleem.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
CS1001 Lecture 7. Overview Computer Networks Computer Networks The Internet The Internet Internet Services Internet Services Markup Languages Markup Languages.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Skype.
Key management issues in PGP
Chapter 7: Using Windows Servers
Presented by Edith Ngai MPhil Term 3 Presentation
An example of peer-to-peer application
Computer Communication & Networks
Secure Sockets Layer (SSL)
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Radius, LDAP, Radius used in Authenticating Users
Keys Campbell R. Harvey Duke University, NBER and
Nessus Vulnerability Scanning
Distributed Peer-to-peer Name Resolution
Goals Introduce the Windows Server 2003 family of operating systems
Starting TCP Connection – A High Level View
X-Road as a Platform to Exchange MyData
Internet Protocols IP: Internet Protocol
KERBEROS.
Advanced Computer Networks
Computer Networks Presentation
COEN 351 Authentication.
Computer Networks Protocols
Presentation transcript:

Peer-to-Peer Reputations Prashant Dewan Advisor: Dr. Partha Dasgupta 1 January 2019 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Goals To facilitate ‘secure’ transactions among peers in a completely decentralized system Secure implies Peers can be authenticated The chance that a peer gets cheated in a transaction is low A peer is either forced or motivated against cheating 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Possible Techniques Micropayments Expensive Waste resources A peer with large volume of resources can break it Other Distributed Security Systems SDSI, Dynamic Trust Management, Groove,Publius All of them use a central component All of them are dependent on some form of ‘Authority’ 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations What is a reputation? The general estimation in which a person is held by the public – Oxford Dictionary A Recommendation is the ‘certificate of satisfaction’ given by one entity (requestor) to the other (provider) after a transaction ( eg. A File Download) The Reputation of a person ( or an entity) is the sum of the ‘recommendations’ received by the person (or an entity) from others (people or entities) with whom it has transacted in the past. 1/1/2019 Peer-to-Peer Reputations

Calculation of Reputation Recommendations B  A = 5 C  A = 3 D  A = 4 Alice’s Reputation 5+3+4 = 12 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Challenges 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Benefits 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Self-Certification Certificate Authority User does not have to trust a third party certificate provider which might be a vulnerability User can separate transactions by having multiple identities 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Liar Farms 5 10 Certificate Authority 2 5 4 8 4 2 4 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations IP Based Safeguard d Rep 1 29 2 12.5 3 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations IP Based Safeguard Most peers are interested in relative ranks of other peers Adjustment of ranks has a ‘small’ effect on the relative ranks Network Size=1000 peers Mean Rank Difference= 13.246±0.81 (95% confidence) 1/1/2019 Peer-to-Peer Reputations

Elicitation-Storage Protocol The “requestor” selects the highest-reputation provider from a list of possible providers The requestor verifies the recommendations of the provider Checks if the signature on the recommendations match the identity certificate sent along with the recommendation Once verified, the “provider” provides the content The requestors issues the recommendation to the provider The provider stores the recommendation and the identity of the requestor 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Application Areas eBay, Amazon, Monster… School Friends, Family… CORE, CONFIDANT & SPRITE… SMTP, Web Services… Gnutella, Kazaa & Morpheus… 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations P2P & NAT Port Session Initiation Protocol Needs Servers TCP Splicing Very complicated UDP Solutions Waste of Bandwidth UPnP – A standard being developed by Microsoft and allies. 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Name Service Server: Domain1: superpeer1 Domain2: superpeer2 Bob ASU: David is Superpeer 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Name Service .. Alice Logs in in New York Connects to the Domain of NYU Informs ASU super peer of current location Bob contacts ASU superpeer and gets the address of Alice 1/1/2019 Peer-to-Peer Reputations

Peer-to-Peer Reputations Name Service .. David Logs out Asks all domain members for the next superpeer Carol becomes the superpeer David Transfers current locations to Carol and Logs out Carol Informs the public server Bob tries to reach David and Fails and gets to Carol via public server 1/1/2019 Peer-to-Peer Reputations