P2P: Unique Design Challenges in Accountability and Security

Slides:



Advertisements
Similar presentations
EuropeAid Introduction to the new Capacity4dev. EuropeAid What is capacity4dev? What is the utility of this tool? Capacity4dev is a tool that: can support.
Advertisements

Applications of Feather-Weight Virtual Machines (FVMs) Hadi Salimi Distributed Systems Lab, School of Computer Engineering, Iran University of Science.
Cloud Computing COMP 1631, Winter 2011 Yanggang Chen.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Chapter 2, slide: 1 CS 372 – introduction to computer networks* Monday June 28 Announcements: r Lab 1 is due today r Lab 2 is posted today and is due next.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
GridFTP Guy Warner, NeSC Training.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Communications & Networks National 4 & 5 Computing Science.
Cooperative Robotics and Sensor Networks Isaac Rieksts My web site
"Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University
Tshilidzi Tshiredo. Introduction Long time ago even before technologies, social networking platforms and mobile devices, Dewey, J.( ) stated that.
STORAGE ARCHITECTURE/ MASTER): Where IP and FC Storage Fit in Your Enterprise Randy Kerns Senior Partner The Evaluator Group.
IT vocabulary 3.3 Networks By: Flora Bertin.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
Unit 7: DHCP, APIPA and NTP. Static versus dynamic IP addressing Dynamic IP addresses can change each time you connect to the Internet, while static IP.
Chapter 7: Transport Layer
1.4 Wired and Wireless Networks
Wikis and The Classroom
© 2003, Cisco Systems, Inc. All rights reserved.
Packets and Making a Reliable Internet
Using a Computer Network
Server Concepts Dr. Charles W. Kann.
EEC 688/788 Secure and Dependable Computing
A Replica Location Service
FICEER 2017 Docker as a Solution for Data Confidentiality Issues in Learning Management System.
Client-Server Interaction
Internet Protocol Mr. Paulk.
Chapter 2 Introduction Application Requirements VS. Transport Services
Status and Future Steps
File Transfer Protocol
Comparison of LAN, MAN, WAN
Standards for the Internet of Things
Meeting, training & teaching in the interactive iWorld
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
CLUSTER COMPUTING.
EEC 688/788 Secure and Dependable Computing
Distributed computing deals with hardware
King Saud University- College OF Applied Studies
Unit 11- Computer Networks
The Elements of Art 1st grade introduction.
Unit# 5: Internet and Worldwide Web
Communications & Computer Networks Resource Notes - Introduction
EEC 688/788 Secure and Dependable Computing
Lecture 7 Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Distributed Systems Bina Ramamurthy 4/7/2019 B.Ramamurthy.
King Saud University- College OF Applied Studies
Distributed Systems Bina Ramamurthy 4/22/2019 B.Ramamurthy.
Designing Individual Supports
PEER-TO-PEER SYSTEMS.
How to Fix Epson Printer Error Code 0x91|Epson Supports 247
Distributed Systems and Algorithms
Presentation transcript:

P2P: Unique Design Challenges in Accountability and Security

P2P system is defined as: As an interaction model that facilitates sophisticated resource sharing environments between ”consenting” peers.

Motivation There are several design issues such as Search protocols, Mechanisms used for data transfer, Reliability and fault tolerance of the system. P2P system expects all the participants to work for the common good of the system. It is this aspect that poses design challenges and makes P2P design interesting .

Issues / Challenges Accountability Accountability is unique to P2P systems. A mechanism that makes the users accountable for their activity in the network in terms of the resources that they utilize. Here resources could range anything from cycles , storage, files.. Security Secondly we want any system that we design to be secure. But in P2p there are security issues that crop up, because the system is usually made of community based individual peers, unlike in the case of say grid computing.

Security Breaches Typical security breaches include the following. 1. DOS: Denial of service attack 2. Interoperability 3. Unreliable Transport 4. Variable Membership 5. Data tampering

Plan of Action Step 1: Compile the state-of- the -art mechanisms to guarantee accountability. Step 2: Compile the state-of- the -art mechanisms for avoiding security breaches. I am not quite done with compiling this .

Contribution I hope to compile open questions in this area and consequently the research directions. More importantly, one thing that I have noticed is that design issues especially accountability and security have always been treated in isolation. As a contribution the paper makes an attempt of bringing the 2 issues together, by bringing to the forefront some of the issues caused by isolation. This exercise has been helpful in pinpointing open problems and research directions.

PROGRESS: 1. Compiling my findings into a document. 2. I still have to make connections to seemingly disconnected pieces. 3. I have just put down my thoughts on what my presentation should look like.