Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.

Slides:



Advertisements
Similar presentations
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Freenet A Distributed Anonymous Information Storage and Retrieval System Ian Clarke Oskar Sandberg Brandon Wiley Theodore W.Hong.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
UNIVERSITY OF JYVÄSKYLÄ Chedar P2P platform InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Research Assistant.
1 Unstructured Routing : Gnutella and Freenet Presented By Matthew, Nicolai, Paul.
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2P File Sharing Systems
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
Searching In Peer-To-Peer Networks Chunlin Yang. What’s P2P - Unofficial Definition All of the computers in the network are equal Each computer functions.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Ian Clarke, Oskar Sandberg, Brandon Wiley,Theodore W. Hong Presented by Zhengxiang.
Freenet File sharing for a political world. Freenet: A Distributed Anonymous Information Storage and Retrieval System I. Clarke, O. Sandberg, B. Wiley,
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Freenet: Anonymous Storage and Retrieval of Information
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Composing Web Services and P2P Infrastructure. PRESENTATION FLOW Related Works Paper Idea Our Project Infrastructure.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
CASCADE: AN ATTACK-RESISTANT DHT WITH MINIMAL HARD STATE
CS 268: Lecture 22 (Peer-to-Peer Networks)
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Unstructured Routing : Gnutella and Freenet
Freenet.
InfoShare A Distributed P2P Information Storage & Retrieval System
Presentation transcript:

Freenet

Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet  Designed to provide anonymity among other features

Freenet  Data flows in reverse path of query  Impossible to know if a user is initiating or forwarding a query  Impossible to know if a user is consuming or forwarding data  “Smart” queries  Requests get routed to correct peer by incremental discovery * Figure from “Protecting Freedom of Information Online with Freenet”, Ian Clarke and Scott Miller. IEEE Internet Computing, Jan/Feb 2002

Freenet  Peer-to-peer indexing and searching service  Peer-to-peer file downloading  Files served use the same route as searches (not point-to-point)  Provides for anonymity

Freenet  Completely anonymous, for producers or consumers of information  Resistance to attempts by third parties to deny access to information  Goals:  Anonymity for producers and consumers  Deniability for information storers  Resistance to denial attacks  Efficient storing and routing  Does NOT provide  Permanent file storage  Load balancing

Freenet  Somewhat similar to Gnutella but…  As file passes through ‘vine-like’ framework, the file makes a copy of itself at each point along its route  Implemented encryption to hid the originating point of the file  Vision of open source project is to allow all information, copyrighted or not, to be distributed anonymously and untraceable in a p2p network

Freenet history  Final Year project Ian Clarke, Edinburgh University, Scotland, June, 1999Ian Clarke Edinburgh University  Sourceforge Project, most active  V.0.1 (released March 2000)  Latest version(Sept, 2001): 0.4

What is Freenet and Why?  Distributed, Peer to Peer, file sharing system  Completely anonymous, for producers or consumers of information  Resistance to attempts by third parties to deny access to information

Us er Each user acts independently There is no central directory server Peers directly change file information among each other in a query Architecture of Gnutella and Freenet

File Discovery Mechanisms in Freenet: Chain Mode  A request for a file can be forwarded through many different nodes.  If a node does not have the document that the requestor is looking for, it forwards the request to one of its neighbor that is more likely to have the document  The messages form a chain as each node forwards the request to the next node  Message times out after passing through a certain number of nodes, so that huge chains don’t form.  The chain ends when the message times out or when a node replies with the data.

File Discovery Mechanisms in Freenet: Chain Mode Us er A B C D E F G H * Computer A send its query to its neighbor B, which forwards it to one of its neighbor D, which in turn forwards it to one of its neighbor G, finally, the query reach H who has the requested data The reply is passed back through each node that forwarded the request, back to the original node that started the chain

Advantages and Disadvantages of Chain Mode in Searching  Advantages:  Fast discovery with less network traffic in average case  Search stops once the requested file is found  More scalable  Disadvantages:  Slow discovery in worst case

Worst Case Scenario in Chain Mode Discovery Us er C D E F A B H* J I Computer H has the requested file, but the query never reaches it because of poor routing decision at computer G Instead, the query ends up with no file found G

Freenet  It aims:  To allow people to distribute material anonymously.  To allow people to retrieve material anonymously.  To make the removal of material almost insuperably difficult.  To operate without central control.

operation of freenet  Searches are only passed to one other servent, which pass it on. After no positive response from that chain, another servent is tried.  But the entire document sought is passed along, unless it is too large  Servents keep caches of popular documents until no one asks for it for a long time.  popular documents frequent and close to users.

searching on freenet  You basically can not search on freenet.  Each document has an identifier  The identifier and the document can not be changed.  This will make it difficult to use it on its own as a device for people to exchange copyrighted material.

Some security and authentication issues  How to ensure anonymity:  Nodes can lie randomly about the requests and claim to be the origin or the destination of a request  Hop-To-Live values are fuzzy  Then it’s impossible to trace back a document to its original node  Similarly, it’s impossible to discover which node inserted a given document.

Scalability  X-axis: # of nodes  Y-axis: # of pathlength  The relation between network size and average pathlenth.  Initially, 20 nodes. Add nodes regularly.

Fault Tolerance  X-axis: # of nodes failing  Y-axis: # of pathlength  The median pathlength remains below 20 even when up to 30% nodes fails.

Small world Model  X-axis: # of nodes failing  Y-axis: # of pathlength  Most of nodes have only few connections while a small number of news have large set of connections.  It follows power law

Is it Perfect?  How long will it take to search or insert?  Trade off between anonymity and searching efforts: Chord vs Freenet  Have no idea about if search fails due to no such document or just didn’t find it.  File lifetime  Freenet doesn’t guarantee a document you submit today will exist tomorrow