Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.

Slides:



Advertisements
Similar presentations
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Advertisements

Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Pastiche: Making Backup Cheap and Easy. Introduction Backup is cumbersome and expensive Backup is cumbersome and expensive ~$4/GB/Month (now $0.02/GB)
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005.
The Byzantine Generals Problem Boon Thau Loo CS294-4.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Peer-to-Peer Systems Kulesh Shanmugasundaram Security Issues.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Bowstron & Peter Druschel Presented by: Long Zhang.
Secure routing for structured peer-to-peer overlay networks M. Castro, P. Druschel, A. Ganesch, A. Rowstron, D.S. Wallach 5th Unix Symposium on Operating.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Presented by.
Pastry Partially borrowed for Gabi Kliot. Pastry Scalable, decentralized object location and routing for large-scale peer-to-peer systems  Antony Rowstron.
Looking Up Data in P2P Systems Hari Balakrishnan M.Frans Kaashoek David Karger Robert Morris Ion Stoica.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Decentralized Location Services CS273 Guest Lecture April 24, 2001 Ben Y. Zhao.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Tapestry: A Resilient Global-scale Overlay for Service Deployment Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John.
Topology-Aware Overlay Networks By Huseyin Ozgur TAN.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems (Antony Rowstron and Peter Druschel) Shariq Rizvi First.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Security Considerations for Structured p2p Peng Wang 6/04/2003.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks IPTPS Feb. 25, 2005 Byung-Gon Chun, Ben Y. Zhao, and John Kubiatowicz.
1 Security and Trust in P2P systems. 2 Trust and Security Peer-to-Peer systems require different entities to decide how to interact or whether to interact.
1 Security and Trust in P2P systems. 2 What is trust When thinking about security in a system, various entities need to “trust” others to varying degrees.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
CIS 640-2, Presenter: Yun Mao1 Security for Structured Peer- to-peer Overlay Networks By Miguel Castro et al. OSDI ’ 02 Presented by Yun Mao in CIS640.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Secure Routing for Structured Peer-to-Peer Overlay Networks M. Castro, P. Druschel, A. Ganesh, A. Rowstron and D. S. Wallach Proc. Of the 5 th Usenix Symposium.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel, Middleware 2001.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Chord Advanced issues. Analysis Theorem. Search takes O (log N) time (Note that in general, 2 m may be much larger than N) Proof. After log N forwarding.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Christian Scheideler Dept. of Computer Science
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Packet Leashes: Defense Against Wormhole Attacks
Controlling the Cost of Reliability in Peer-to-Peer Overlays
COS 461: Computer Networks
PASTRY.
Secure Routing for Structured Peer-to-Peer Overlay Networks
Presentation transcript:

Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems

Oct 6, 2003CS 294-4: Peer-to-Peer Systems2 The problem P2P systems: resilient but not secure Malicious nodes:  fake IDs  distort routing table entries  prevent correct message delivery “Techniques to allow nodes to join, to maintain routing state, and to forward messages securely in presence of malicious nodes”

Oct 6, 2003CS 294-4: Peer-to-Peer Systems3 In retrospect Unlike Byzantine solutions  specific to P2P systems  no exact agreement needs to be reached Unlike the Sybil attack  resort to central authentication for IDs

Oct 6, 2003CS 294-4: Peer-to-Peer Systems4 The model N nodes Bound f on the fraction of faulty nodes Bound cN on the number of faulty nodes in coalition Every node has a static IP address “Secure routing ensures that when a non-faulty node sends a message to key k, the message reaches all non-faulty members is the set of replica roots R k with very high probability”

Oct 6, 2003CS 294-4: Peer-to-Peer Systems5 Sub-problems Securely assigning IDs to nodes  attacker may capture all replicas for an object  attacker may target a particular victim Securely maintaining routing tables  attackers may populate with faulty entries  most messages are routed to faulty nodes Securely forwarding messages  even with proper routing tables, faulty nodes can corrupt, drop, misroute messages

Oct 6, 2003CS 294-4: Peer-to-Peer Systems6 Certified nodeIDs Offline certification authorities  assign random IDs to nodes  certificate binds the ID to public key and IP attacker cannot swap IDs between his nodes bad for dynamic address assignment, host mobility, or organizational changes CAN nodeIDs change when nodes join and depart  Avoid giving multiple IDs to one entity charge for each certificate – increases cost of attack bind IDs to existing trustworthy identities

Oct 6, 2003CS 294-4: Peer-to-Peer Systems7 Secure routing table maintenance Should have at most fraction f of faulty entries  worst for row 0 of the Pastry routing table  during node joins, probability of getting a faulty entry is (1 - f) x f + f x 1 > f Impose constraints on the table entry  required to be closest to some point in ID space  like Chord

Oct 6, 2003CS 294-4: Peer-to-Peer Systems8 One solution for Pastry: two routing tables Normal locality-aware routing table A constrained routing table  Row l, column d entry for node i: shares a prefix of length l with I has d as its (l+1) st digit closest nodeID to the point p: p satisfies above properties and has remaining digits same as i New state initialization algorithm exploiting an interesting property

Oct 6, 2003CS 294-4: Peer-to-Peer Systems9 Secure message forwarding Probability of routing successfully between two non-faulty nodes is (1-f) h-1  h is log 2 b (N) for Pastry Probability of routing correctly to a non- faulty replica root is (1-f) h Tradeoff: increasing b decreases the number of hops but also increases the amount of state information

Oct 6, 2003CS 294-4: Peer-to-Peer Systems10 Probability of routing to a correct replica b=4

Oct 6, 2003CS 294-4: Peer-to-Peer Systems11 Proposed Solution Has to ensure that with high probability, one copy of the message reaches each replica root 1.Route message to the key 2.Root node returns prospective set of replica roots 3.Did routing work? (failure test) Yes: use these as replica roots No: use expensive redundant routing

Oct 6, 2003CS 294-4: Peer-to-Peer Systems12 Routing failure test Takes a key and the set of prospective replica roots Returns negative if the set of roots is likely to be correct for the key; otherwise positive If no set is returned, returns positive Works by comparing the density of nodeIDs in the sender’s neighborhood set with the density of nodeIDs close to the replica roots of the destination key

Oct 6, 2003CS 294-4: Peer-to-Peer Systems13 The test for Pastry In Pastry, the replica set is a subset of the neighbor set of the key’s root Let µ p be the average numerical distance between the consecutive nodeIDs in p’s neighbor set To test root neighbor set {id0, id1, …}, for a key x, p checks that: 1.All nodeIDs in the set have valid certificates, the middle one is the closest nodeID to x, and the nodeIDs satisfy the definition of a neighbor set 2.The average numerical distance µ rn between consecutive nodeIDs in this set < µ p x γ γ decides the tradeoff between false positives and false negatives

Oct 6, 2003CS 294-4: Peer-to-Peer Systems14 Redundant routing If the failure test returns positive Use constrained routing table P sends the message to key x via different members of its neighborhood set  messages take diverse path (longer paths?) Any non-faulty node that receives the message and has the root of x in its neighborhood set, sends its certificate to p p collects such certificates in a list; sends the list to all nodes in the list. Process iterates upto 3 times p computes the closest neighbor’s to x

Oct 6, 2003CS 294-4: Peer-to-Peer Systems15 Performance of redundant routing 100,000 nodes, b=4, l=r=32

Oct 6, 2003CS 294-4: Peer-to-Peer Systems16 Etc. Tolerates upto 25% malicious nodes well Self-certifying data – nodes can check the authenticity of returned objects  reduces need for redundant routing