Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Scalable Content-Addressable Network Lintao Liu
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Freenet A Distributed Anonymous Information Storage and Retrieval System Ian Clarke Oskar Sandberg Brandon Wiley Theodore W.Hong.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
FreeNet: A Distributed Anonymous Information Storage and Retrieval System Ian Clark, Oskar Sandberg, Brandon Wiley and Theodore Hong.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Anonymity and Friends: Keeping the Act of Communication Private Chris DuPuis 8 March 2006.
1 Unstructured Routing : Gnutella and Freenet Presented By Matthew, Nicolai, Paul.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Peer-to-Peer Computing
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Wide-area cooperative storage with CFS
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
F REENET UDAYA S PISIPATI 02/26/08. C ONTENTS  Introduction  Design goals  Architecture  Basic model  Keys in searching  Retrieving data  Storing.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Survey of Peer to Peer Technologies Authors: Bratislav Milić, Jelena Krunić, Veljko Milutinović,
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
1 1.Freenet Architecture a)Goals b)Properties 2.Searching a network a)Searching/Routing algorithm b)Adaptive behaviour c)Differences with other algorithms.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Ian Clarke, Oskar Sandberg, Brandon Wiley,Theodore W. Hong Presented by Zhengxiang.
Freenet File sharing for a political world. Freenet: A Distributed Anonymous Information Storage and Retrieval System I. Clarke, O. Sandberg, B. Wiley,
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Josh Colvin CIS 590, Fall 2011.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Freenet Ubiquitous Computing - Assignment Guided By: Prof. Niloy Ganguly Department of Computer Science and Engineering Submitted By: o Parin Deepak Cheda.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Peer to Peer Network Design Discovery and Routing algorithms
Freenet: Anonymous Storage and Retrieval of Information
Company LOGO Freenet By Yogesh Kalyani. OUTLINE  Introducing P2P  Overview of Freenet  Key’s  Protocol  Security Analysis  Improvement  Strength.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Freenet A Distributed Anonymous Information System and Retrieval System I. Clarke, O. Sandberg, B. Wiley, W. Hong ECE 6102 Presented By: Kaushik Chowdhury.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
ANONYMOUS STORAGE AND RETRIEVAL OF INFORMATION Olufemi Odegbile.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
Key Distribution in DTNs
CS 268: Lecture 22 (Peer-to-Peer Networks)
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Unstructured Routing : Gnutella and Freenet
Freenet.
Presentation transcript:

Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006

Outline Overview of Freenet Architecture and Protocol Performance Security Discussion

Freenet Design Goals Freenet is basically a P2P file system that supports anonymity for readers and writers. Anonymity and deniability Resistant to denial of service Efficient Completely Decentralized

Keys and Use 3 Keys for each file Keyword-signed key (descriptive string) Signed-subspace key (personal namespace) Content-hash key (file contents) KSK and SSK (public half only) are published to allow retrieval CHK allows for updating the file, different CHK and same SSK cause collision

More Keys and Use The structure allows for users to have directories. Using public/private key pairs allows only users who “own” the space to write files there No centralized place to find keys. Must find them from someone who publishes. Possible crawler www publishing of hashes and keys

Retrieval If the file is not found locally, forwards the request on to the node with most similar key. Prevents loops by moving down the list if a file is not found. Hops to live reduces network load and keeps requests from progressing too far Requests are cached Reply message can have the data source changed during trip back to node that requested  Routing Improves over time  Caching of files replicates popular data closer to requests

Storing Calculate the keys and send an insert message. This is very similar to retrieval. The hops-to-live here serves to check for collisions in the keys generated. When a node inserts it checks for a collision along the path of insertion. The file is stored along the initial path at all the hosts New files with similar keys are put on hosts with other similar keys

Management Cache uses LRU policy Files put in the system might not stay All files are stored encrypted, provides plausible deniability only  Discussion: is plausible deniability at the node operator good enough?

Joining the network Uses out of band communication for initial join msg Choose a random seed, send it. Once received the next node generates a random seed and XORs with the original, and continues the chain. After last node generates seed, each host releases the seed for verification  Discussion: The structure of the network seems to depend somewhat on the initial node chosen. Isn’t this effected by the out of band communication?

Performance and Scalability Randomly constructed Same cache size and routing table size at every node The network improves over time as claimed. Path length of requests decrease As network grows, path length scales like log The effect of routing tables can be seen when the network gets very large.

Security Aims to protect readers and writers identity to an attack involving collaborating nodes No data security, or assurance of data Sender Anonymity protected “beyond suspicion”? Without some analysis, this seems like a bold statement “pre-routing” suggested, but seems like just another idea suggested Some aspects of onion routing

More Security Source protection by randomly flipping the data-source field Modification of files by attackers is prevented by the use of hashes and signatures (CHK and SSK) If just stored by KSK, the namespace can be dictionary attacked Resistant to junk insertion Displacement of files requires private keys again.

Attacks Network construction When hosts connect, there’s the possibility that an attacker can influence how the routes are setup. Force the network to arrange itself in certain ways (this will change) Want to determine who sent a message With multiple compromised hosts, it seems possible might need to guess at topology? More attacks?

Discussion  Questions?  What are some possible attacks on the system?  Is the lack of search capability acceptable in a system like this?  Does the anonymity provided seem less than hoped for in a system like this?  Does Freenet lack some features you would expect in an anonymous publishing/retieval system?  What does Freenet have to offer over crowds?

How essential is search? A lot of unanswered questions in creating and being part of the system “beyond suspicion” for collaberating nodes in the sender anonyminty Somewhat inspiried by crowds the main difference here is the promise of security. The authors and readers should be anonymous. Scientology documetns being erradicated Leaked Diebold source code