Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 1 Secure distributed applications: a case study Luca Maria.

Slides:



Advertisements
Similar presentations
FairPeers: Efficient Profit Sharing in Fair Peer-to-Peer Market Places
Advertisements

Università di Roma La Sapienza Dipartimento di Informatica e Sistemistica Distributed Systems Corso di Laurea Specialistica in Ingegneria Informatica AA.
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Tempering Kademlia with a Robust Identity-based System
Distributed Hash Tables
Akshat Sharma Samarth Shah
Embedding identity in DHT systems: security, reputation and social networking management 1 Embedding Identity in DHT Systems: Security, Reputation and.
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
Link creation and profile alignment in the aNobii social network Luca Maria Aiello Giancarlo Ruffo Rossano Schifanella Keywords : link creation, homophily,
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Address Settlement by Peer to Peer (ASP) Jonathan Rosenberg Cullen Jennings Eric Rescorla.
Secure and Flexible Framework for Decentralized Social Network Services Luca Maria Aiello, Giancarlo Ruffo Università degli Studi di Torino Computer Science.
Carnegie MellonCarnegie Mellon Context-Aware Authentication Framework CyLab Mobility Research Center Mobility Research Center Carnegie Mellon Silicon Valley.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Distributed Storage March 12, Distributed Storage What is Distributed Storage?  Simple answer: Storage that can be shared throughout a network.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
The File Mover: An Efficient Data Transfer System for Grid Applications C. Anglano, M. Canonico Dipartimento di Informatica Universita' del Piemonte Orientale,
Group Members: Shane Mallia & Alex McAusland Project Supervisor: John Crawford. Dropped multiple code branches for different platforms Dropped use of UDP.
Outline for today Structured overlay as infrastructures Survey of design solutions Analysis of designs.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Tagging with DHARMA A DHT-based Approach for Resource Mapping through Approximation Luca Maria Aiello, Marco Milanesio Giancarlo Ruffo, Rossano Schifanella.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
A glimpse on social influence and link prediction in OSNs
SSH Secure Login Connections over the Internet
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Introduction of P2P systems
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
Active Directory Overview n Course: Operating System n Professor: Mort Anvari n Student: Lina Si n Date: 09/07/02.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Cracow Grid Workshop October 2009 Dipl.-Ing. (M.Sc.) Marcus Hilbrich Center for Information Services and High Performance.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
1. U2F Case Study Examining the U2F paradox 3 What is Universal 2 nd Factor (U2F)?
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh, 1 Sonia Jahid, 2 Prateek Mittal, 3 Nikita.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Bruce Hammer, Steve Wallis, Raymond Ho
Document title: DSN and its future work in ITU-T Meeting name: The 15 th CJK NGN WG meeting SDO name: CCSA Presenter name: Jianyin Zhang
Cluster computing. 1.What is cluster computing? 2.Need of cluster computing. 3.Architecture 4.Applications of cluster computing 5.Advantages of cluster.
ANONYMOUS STORAGE AND RETRIEVAL OF INFORMATION Olufemi Odegbile.
Agent Group Università di Modena e Reggio Emilia Theory and Practice of Field- based Motion Coordination in Multi-Agent Systems Marco Mamei, Franco Zambonelli.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
A Case Study in Building Layered DHT Applications
Grid Computing Security Mechanisms: the state-of-the-art
Data Management on Opportunistic Grids
Information Technology Sector
Peer-to-peer networking
Cloud Testing Shilpi Chugh.
International Collaboration Project on Information Security
The World’s first Public Chain
Thor: The Hybrid Online Repository
The Italian Academic Community’s Electronic Voting System
Advanced Computer Networks
Module 4 System and Application Security
Presentation transcript:

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 1 Secure distributed applications: a case study Luca Maria Aiello, Federica Cesano, Marco Milanesio, Giancarlo Ruffo, Rossano Schifanella Speaker: Luca Maria Aiello SecNet Group Dipartimento di Informatica, Università degli Studi di Torino Corso Svizzera, 185 – 10149, Torino, Italy Italian Networking Workshop

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 2 Motivations In distributed identity-based commercial applications, user data are retained by central servers. Secure infrastructure Loss of user privacy Exploiting DHT systems for data storage could preserve privacy… Respect of user data secrecy Infrastructure prone to common attacks Our contribution: Likir: a secure p2p middleware LiCha: the first Likir application, is a demonstrative Likir service

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 3 Likir Layered Identity-based Kademlia-like InfRastructure A novel DHT layer Identity: user identity management at middleware level Security: o Protection against known overlay attacks (Routing poisoning, Sybil attack, MITM, Pollution…)

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 4 Likir architecture Many other attempts to secure overlay networks: Myrmic KadSec Maelstrom … By introducing a strong binding between user ID and node ID, Likir solves (or effectively mitigates) DHT security problems

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 5 Likir protocol

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 6 Likir Other good features No Single Point Of Failure No additional system constraints (e.g. clock synchronization) Likir middleware is transparent to application developers Ease of developement and integration of id-based applications Limited computational overhead respect to Kademlia Simple API Possible enhancements Replace RSA with IBS …

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 7 LiCha The Likir Chat Fully distributed IM application User data stored in the DHT Personal data are encrypted before being stored Every content is signed by Likir layer

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 8 How LiCha works LiCha Likir Hi! Cedric Password TCP Application Overlay net DHT storage ID ContactPersonal info Dynaer Lookup(UDP) Store ID Find(“cedric.myopenid.com”) Get(“cedric.myopenid.com”)

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 9 A possible future? Likir becomes an ideal framework for privacy aware social networks Security Identity Privacy Scalability

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 10 Contacts and Credits We would thank Edoardo Rossi, cooperated with us for Licha developement Elton Kola, built Likir registration portal with OpenID verification To get Likir/Licha code, or to contact us:

Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group 11 Thank you!