Deniability an Alibi for Users in P2P Networks

Slides:



Advertisements
Similar presentations
Retrieval of Information from Distributed Databases By Ananth Anandhakrishnan.
Advertisements

Digital Library Service – An overview Introduction System Architecture Components and their functionalities Experimental Results.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Embedded Web Hyung-min Koo. 2 Table of Contents Introduction of Embedded Web Introduction of Embedded Web Advantages of Embedded Web Advantages of Embedded.
1 Oct 30, 2006 LogicSQL-based Enterprise Archive and Search System How to organize the information and make it accessible and useful ? Li-Yan Yuan.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Peer-to-peer Multimedia Streaming and Caching Service Jie WEI, Zhen MA May. 29.
1 Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy Author : Radu Sion Bogdan Carbunar Presentered by Chia Jui Hsu.
Introducing: Cooperative Library Presented August 19, 2002.
IT skills: IT concepts: Web client (browser), Web server, network connection, URL, mobile client, peer-to- peer application This work is licensed under.
Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah.
Akbar Rahman Juan Carlos Zúñiga IETF 78, July An Additional Survey of In-Network Storage.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
Implementing Application Protocols. Overview An application protocol facilitates communication between applications. For example, an client uses.
Proxy servers By Akshit Y10. What is a proxy server O A proxy server is a computer that offers a computer network service to allow clients to make indirect.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
Configuration Management and Server Administration Mohan Bang Endeca Server.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Experimenting Lucene Index on HBase in an HPC Environment Xiaoming Gao Vaibhav Nachankar Judy Qiu.
Master Thesis Defense Jan Fiedler 04/17/98
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
Efficient Semantic Based Content Search in P2P Network Heng Tao Shen, Yan Feng Shu, and Bei Yu.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Networking Components 10/2/07. Parts of a Network Clients –Computers that request or order information from a server –Usually desktop computers with their.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Freenet: Anonymous Storage and Retrieval of Information
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
ANONYMOUS STORAGE AND RETRIEVAL OF INFORMATION Olufemi Odegbile.
SIP6 Platform Updates Based on CNGI-CERNET2 Network Research Center Tsinghua University.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
Swarming Secrets Shlomi Dolev (BGU), Juan Garay (AT&T Labs), Niv Gilboa (BGU) Vladimir Kolesnikov (Bell Labs) Allerton 2009.
1 Efficient Crawling Through URL Ordering Junghoo Cho Hector Garcia-Molina Lawrence Page Stanford InfoLab.
Information Storage and Retrieval Fall Lecture 1: Introduction and History.
Software Architecture in Practice
Instructor: Ahmed Jafer
DNS-sly: Avoiding Censorship through Network Complexity
Web Development Web Servers.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Chapter 7: Introduction to Data Communications and Networking
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Processes The most important processes used in Web-based systems and their internal organization.
TYPES OF SERVER. TYPES OF SERVER What is a server.
Chapter 1: Exploring the Network
Web Information retrieval
Exchange OST Recovery Freeware Tool. Index Introduction What is OST File? Reasons for OST file corruption Possible ways to fix OST file corruption issue.
File Transfer Protocol
Module 2: Understanding Local Area Networks
Comparison of LAN, MAN, WAN
DIGITAL LIBRARY.
Fault Tolerance Distributed Web-based Systems
Tiers vs. Layers.
UNIT R001: Understanding Computer Systems
An Introduction to Cloud Computing
Communications & Computer Networks Resource Notes - Introduction
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Botnet Detection by Monitoring Group Activities in DNS Traffic
Gizem MISIRLI Gülden OLGUN
Assoc. Prof. Hussam Elbehiery
Presentation transcript:

Deniability an Alibi for Users in P2P Networks Information Systems Engineering Ben-Gurion University Deniability an Alibi for Users in P2P Networks Ofer Hermoni, Eyal Felstaine, Niv Gilboa and Sharon Shitrit January 1, 2019 ©

Outline Introduction Deniability Conclusion Architecture & Shares Operations Performance Mathematics Conclusion

P2P Network Client-Server model: e.g. web-surfing, email… P2P Network: e.g. File-sharing, instant messaging, VoIP…

The Problem – Anonymity in P2P Reader anonymity Server anonymity 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Deniability Deniability Deniability

Categories All documents are distinguished to two categories: Non-controversial Censored

Architecture 5 1 6 2 7 3 8 4

Publishing Non-Controversial Content 1 2 4 3 f 8553 22 872 455 9953 6663 Pool of shares

Publishing Censored Content 1 2 5 8 6 5 f f 7 8553 22 872 455 9953 6663 Pool of shares

Retrieval Censored Content Needed: “Lord of the Rings” Query the Index Retrieving: “Mars Car” + “Baby” 1 2 5 6 4 3 8 7 Server Share Doc name A, C 1 Mars Car B 2 D, F 3 G 4 A, B 5 Baby 6 C 7 D, G 8 Lord of the Rings

Deniability The reader maintains “Reader Deniability” - why? The reader retrieves only non-controversial documents The server maintains “Server Deniability” - why? Every served share is associated with a non-controversial document Indexing

Performance t - threshold = 2 |d| - Doc. size 4|d| bits 2|d| bits Including Indexing deniability Without Indexing deniability Censored Non-controversial 4|d| bits 2|d| bits 3|d| bits Communication Insert Communication Retrieve |d| bits Storage O(|d|) Computation (Insert / Retrieve) t - threshold = 2 |d| - Doc. size

Shamir’s Secret Sharing (1979) f(x) = 2 degree polynomial f(x) f(2) f(3) f(4) f(1) secret f(5) x 1 2 3 4 5 Minimum 3 points needed to reconstruct f(x) formulas

Function f - Deniable Secret Sharing f(x) f(x) = 2 degree polynomial Without index deniability x 1 2 3 4 5 formulas

Conclusion Deniability – An elegant alternative to anonymity Reader, Server and index deniability Against any adversary Low overhead Storage: x2 at most (x4 including index deniability) Communication: x4 at most Can be a “plug-in” to ubiquitous P2P networks

The End Thank you!!!