The Darknet and the Future of Content Distribution by Shruthi B Krishnan.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Advertisements

Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Safeguarding and Charging for Information on the Internet Hector Garcia-Molina, Steven P. Ketchpel, Narayanan Shivakumar Stanford University Presented.
Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED
N-Secure Fingerprinting for Copyright Protection of Multimedia
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
PZ13B Programming Language design and Implementation -4th Edition Copyright©Prentice Hall, PZ13B - Client server computing Programming Language.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
IT ARCHITECTURE © Holmes Miller BUILDING METAPHOR 3CUSTOMER’S CONCERN Has vision about building that will meet needs and desires 3ARCHITECT’S CONCERN.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Wide-area cooperative storage with CFS
5th Edition, Irv Englander
Review of Free Riding on Gnutella Eytan Adar and Bernardo Huberman Shreeram Sahasrabudhe.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
HOMEWORK PAGE STAND ALONE PROGRAMS FUNCTION ON THEIR OWN AND SOMETIMES CANNOT SHARE DATA WITH OTHER PROGRAMS. INTEGRATED SOFTWARE COMBINES.
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
Free Powerpoint Templates Page 1 Free Powerpoint Templates Peer-2-Peer File Sharing Kenie Moses TECH621Social Internet Spring 2011.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
C LIENT /S ERVER AND P EER TO P EER National 4/5 Computing Science.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Introduction Widespread unstructured P2P network
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles learned from Experience Authors: J. C. K. Yau et al. Submission:
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
What is a Network?. Definition of a computer network A computer network is a system in which computers are connected to share information and resources.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Networking Basics Lesson 1 Introduction to Networks.
Marketing Management Online marketing
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Unit Seven Database 1.Passage One. Foundation of Database.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Input Output Excel Internet/ Etc.Grab Bag
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
1 Information Technology Infrastructure & Management Overview.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
Peer-to-Peer Modeling: Expanding and Specifying the Model Mike Kissinger and Jeremy Tout.
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. NAS versus SAN NAS – Architecture to provide dedicated file level access.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Napster and Gnutella Protocols English micro-project Guillaume CASSIN May 31, 2001.
Chapter 8 E-Commerce Technologies Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie.
5th Edition, Irv Englander
E-Commerce: Doing Business on the Internet
An Introduction to Cloud Computing
Unit# 5: Internet and Worldwide Web
Fun Stuff: Digital Media
Client/Server and Peer to Peer
Overview of Computer system
Presentation transcript:

The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Agenda  Introduction  What is darknet?  Features of darknet  Evolution of darknet  Introducing content into darknet  Methods of policing  Conclusions

Introduction  Copying or distributing content in digital format is easier  Legal vs. illegal distribution of content  Terms used ObjectsObjects UsersUsers HostsHosts

What is darknet?  Darknet is a collection of networks and technologies used to share digital content  Assumptions Any widely distributed object is available to some users in a form that permits copyingAny widely distributed object is available to some users in a form that permits copying Users copy available and interesting objectsUsers copy available and interesting objects Users have high-bandwidth channelsUsers have high-bandwidth channels  Infrastructure requirements  Input facilities  Transmission facilities  Output facilities  Search mechanisms/ database  Caching mechanism  Target infrastructure requirements to fight darknet

Evolution of darknet – Early Small-World networks  “Sneaker net” of floppy disks and tapes  Limitations LatencyLatency Lack of search enginesLack of search engines  Interconnected Small-World networks

Evolution of darknet – contd Central Internet Servers  Internet displaced sneaker net – reduced latency and powerful search mechanisms  Centralized storage and search  Efficient for legal online commerce  Poor support for illegal object distribution

Evolution of darknet – contd Peer-to-peer networks (Napster)  Distributed storage of objects – injection, storage, distribution & consumption of objects done by users  Centralized database for searching – became the legal target

Evolution of darknet – contd Peer-to-peer networks (Gnutella)  Distributed object storage and distributed database  To reach any host on Gnutella darknet, a peer needs one or few participating peer-IP addresses  Open protocol

Fully distributed darknets  How robust are they?  Free riding Downloading objects without sharing themDownloading objects without sharing them Some users sacrifice their resources, free-riders don’tSome users sacrifice their resources, free-riders don’t  Lack of anonymity Server end-points can be determinedServer end-points can be determined

Fully distributed darknets – Attacks

Introducing content into darknet – Conditional Access systems  Subscribers are given access to objects based on a service contract  Customers have no access to channels they are not entitled to  Can freely use channels subscribed for

Introducing content into darknet (contd) – DRM systems  Client obtains Encrypted contentEncrypted content License specifying how to useLicense specifying how to use  BOBE-strong vs. BOBE-weak systems  Renewability

Introducing content into darknet (contd) – using software  Mainly used to secure computer programs  Bind software to a host – program won’t work on an unlicensed machine  Machine id should not be virtualizable  Code to perform bind-checks should be resistant to tampering

Policing hosts – Watermarking  Embeds an indelible, invisible mark on content  Concerns about the robustness of the embedding layer  Key management  Watermark detectors in software or hardware

Policing hosts (contd) – Fingerprinting  Supplier marks the object with an individualized mark identifying the purchaser  If shared on darknet, purchaser is identified  No key-distribution needed  Expensive  Collusion attacks

Conclusion  Technological implications Even strong DRM systems can failEven strong DRM systems can fail Watermark detectors have not made an impactWatermark detectors have not made an impact  Competition to legal commerce  Evidence that darknet will continue to exist

Questions….