A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Routing Security in Ad Hoc Networks
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Tarzan: A Peer-to-Peer Anonymizing Network Layer Michael J. Freedman, NYU Robert Morris, MIT ACM CCS 2002
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Ad Hoc Wireless Routing COS 461: Computer Networks
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Common Devices Used In Computer Networks
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Introduction of P2P systems
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Anonymous Communication -- a brief survey
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
An analysis of Skype protocol Presented by: Abdul Haleem.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Skype.
Zueyong Zhu† and J. William Atwood‡
Chapter 18 IP Security  IP Security (IPSec)
Computer Science Graduate Student Jinhae Kim
Anonymous Communication
Internet Networking recitation #4
0x1A Great Papers in Computer Security
Anonymous Communication
Anonymous Communication
Presentation transcript:

A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany

Motivation: Mobile devices become more powerful (computation, resources) They form spontaneous self-organizing communication structure: Mobile Ad-Hoc Network. (all of them are peers) People shares files among those mobile devices to satisfy more requirements. Challenge: Efficiently locating the sharing files

Passive Distributed Indexing PDI: provide a general-purpose file search service. Each mobile device maintains: Repository: a set of sharing files, PDI provides local search services  Doc ID: IP/MAC + local path Index cache: a set of (keyword, doc ID)  Used to answer query for non-local doc

PDI: Query Query model: A query string contains several keywords “AND” operation on all keywords Broadcast: query/response messages (nature of wireless network) Forward: for a predefined number of hops (using broadcast) By experiments: 2 hops are enough

PDI : Cache Cache: all received query results in the local cache index (all nodes which receives a message) Local cache indexing replacement: Least-recently-used algorithm Timeout Exploit locality and erase hotspots

PDI: Messages QUE: Query string, SRC, SEQ, TTL Each node stores the highest SEQ for each SRC and prevents retransmission. REP: contains local search results (set of Doc Ids) Selectively forwarding: only forward the doc Ids which are not in the local cache index

PDI: Example

Experiment Parameters:

Experiment results:

Tarzan: A Peer-to-Peer Anonymizing Network Layer from NYU & MIT

Motivation People want anonymity for all kinds of reasons There are some entities which are interested in exposing the host’s identity The goal of Internet anonymization: A host can communicate with an arbitrary server in such a manner that nobody can determine the host’s identity.

Previous work: Proxy: Trust the proxy, can be blocked by servers, DOS A set of mix relays: Onion routing, Zero-knowledge’s freedom Relay may be corrupted, timing analysis, some other same problems with proxy The above two: Ignore the attack by observing all network traffic There are some other solutions, but still not good

Tarzan: P2P Technique armed Extend mix-net design to a peer-to-peer environment communicate over sequences of mix relays chosen from a pool of volunteer nodes, without centralized component. All peers are potential originators and relays Nobody can tell who is the first hop in a mix path (except the originator itself)

Tarzan: resistant to adversary nodes A new concept: domain Used to remove potential adversarial bias Based on the observation: An adversary may run hundreds of virtual machines, yet is unlikely to control hundreds of different IP subnets.

Tarzan: more… Cover traffic for packet routing Packets can be routed only between mimics Applications (with Tarzan support) can talk to Applications (without Tarzan support) through special IP tunnels Tarzan is transparent to Applications. Tarzan don’t provide authentication and congestion control functionalities.

Tarzan: Architecture Overview

Tarzan: Packet relay Two types of messages: data & control A flow tag uniquely identifies each link of each tunnel. (used for forwarding) Symmetric encryption hides data, MAC protects integrity. Separate keys are used in each direction of each relay

Tarzan: Packet relay (cont.) Clear IP packet’s src filed, encrypt and encapsulate in a UDP packet T = (h1, h2,…, hl, hpnat) For each relay: ekhi, ikhi c(i) = ENC(ekhi, {B(I+1)}) a(i) = MAC(ikhi, {seq, c(i)}) B(i) = {seq, c(I), a(i)}

Tarzan: packet relay (cont.) The initiator does all the encryption Each relay just decrypts the block, retags it, encapsulates in a new UDP packet and forwards it. On the reverse path, the relays encrypt the packet and the initiator decrypts the final packets

Tarzan: Tunnel Setup Initiator is responsible for that work Includes: Generate/distribute symmetric keys Iteratively setup the tunnel one by one an establish request (forward session key are encrypted by the public key of node h i ) Using the existing tunnel to setup next step, so the relays on current tunnel don’t know it’s a data message or control message (for setting up another relay)

Tarzan: IP packet forwarding The last node on the tunnel (PNAT) will send the packet to the server with its own address. Upon receiving the replay, it will send it back along the tunnel. Tunnel failure & reconstruction: Periodically ping message Start reconstruction from the failed relay

Tarzan: Peer discovery Gossip Algorithm Each node has a public key two handshake authentication From weakly connected to fully connected Three different/related operations: Initialization: send entire neighbor set (for fast propagation) Redirection: redirect new nodes to random neighbors (for shed load) Maintenance: an incremental update

Tarzan: peer selection

Tarzan: cover traffic Mimics: node pairs Calculated, not randomly selected !! Mimic relationship is symmetric !! Tunnels must be built through mimics Cover traffic is transferred between mimics (adjust according to all incoming traffic and outgoing traffic) So nobody can observe the real user data

Tarzan: Mimic Topology

Experiment result:

Tarzan: conclusion Resistant to attack (a lot of security analysis) Achieve anonymity for end users Overhead: Each node needs to keep some info for all other nodes in the network Packet transfer latency Considerable computation workload (especially on the initiator of the traffic)