1 Security and Trust in P2P systems. 2 Trust and Security Peer-to-Peer systems require different entities to decide how to interact or whether to interact.

Slides:



Advertisements
Similar presentations
CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Advertisements

Secure Multiparty Computations on Bitcoin
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Peer-to-Peer Systems Kulesh Shanmugasundaram Security Issues.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Secure routing for structured peer-to-peer overlay networks M. Castro, P. Druschel, A. Ganesch, A. Rowstron, D.S. Wallach 5th Unix Symposium on Operating.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Wide-area cooperative storage with CFS
P2P Course, Structured systems 1 Introduction (26/10/05)
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
1 Security and Trust in P2P systems. 2 What is trust When thinking about security in a system, various entities need to “trust” others to varying degrees.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
CIS 640-2, Presenter: Yun Mao1 Security for Structured Peer- to-peer Overlay Networks By Miguel Castro et al. OSDI ’ 02 Presented by Yun Mao in CIS640.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Secure Routing for Structured Peer-to-Peer Overlay Networks M. Castro, P. Druschel, A. Ganesh, A. Rowstron and D. S. Wallach Proc. Of the 5 th Usenix Symposium.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Peer to Peer Network Design Discovery and Routing algorithms
BATON A Balanced Tree Structure for Peer-to-Peer Networks H. V. Jagadish, Beng Chin Ooi, Quang Hieu Vu.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Malugo – a scalable peer-to-peer storage system..
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Controlling the Cost of Reliability in Peer-to-Peer Overlays
DHT Routing Geometries and Chord
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Presentation transcript:

1 Security and Trust in P2P systems

2 Trust and Security Peer-to-Peer systems require different entities to decide how to interact or whether to interact with others  Security decisions I need to know whether I can “trust” another entity within this system Should I trust “Alice” because my friend, Bob, trusts her?

3 Trust and Security The “perfect” P2P system  A system with perfectly flat hierarchy, and with each entity allowing other entities to use local resources How can we provide security without a centralized entity?  Infrastructure  The model of interaction between entities!

4 What is trust When thinking about security in a system, various entities need to “trust” others to varying degrees  We say “trusted hardware”, or “trust administrators So… what is trust  Trust is a bet about the future contingent actions of others

5 Malicious node A malicious node might give erroneous responses to a request  Application level Returning false data  Network level Returning false routes May work together, acting in concert, to attack the remainder of the nodes

6 Outline Identification Routing table risk  Victim Data  Victim Peer Content verification Punishment

7 Identification Identity  Undesirable to know the identity of other entities Privacy Anonymity However,  If you wish to trust entity A, you need to be able to identify it

8 Identification Public key infrastructures (PKI)  Should be run with somebody!  For a PKI to work in this sort of situation, you need to have a trusted third party Recommendation systems  Chains of trust Transitive trust  Trust should be granted directly.

9 Identification  When trust must be transitive, it creates brittleness  In most P2P system, transitive trust is a key component  How to measure “reputation” Roles Time related

10 Secure Routing in p2p systems Security routing primitive ensures that when a non-faulty nodes sends a message to a key k, the message reaches all non-faulty members in the set of replica roots R k with very high probability Security routing guarantees that a replicas are initially placed on legitimate replica roots, and that a lookup message reaches a replica if one exists

11 Three problems Securely assigning nodeIds to nodes  Ensure attackers cannot choose the value of nodeIDs Securely maintaining the routing tables  Ensure that the fraction of faulty nodes that appear in the routing tables of correct nodes does not exceed the fraction of faulty nodes in the entire overlay Securely forwarding messages  Ensure that at least one copy of a message sent to a key reaches each correct replica root for the key with high probability

12 System model N nodes f (0<f<1) : fraction of faulty nodes  Faulty nodes can behave arbitrarily and they may not all necessarily be operating as a single conspiracy The set of faulty nodes is partitioned into independent coalitions, which are disjoint sets with size bounded by cN  (1/N<= c <= f)  Consider the case: c < f

13 Secure nodeId assignment A node might choose its identifier maliciously  Allocate itself a collection of nodeIds closer to that document’s key than any existing nodes in the system Censor a specific document  Choose nodeIds to maximize its chances of appearing in a victim node’s routing tables

14 Secure nodeId assignment Centralized authority  The server is only consulted when new nodes join and is otherwise uninvolved in the actions of the p2p system Sybil attacks  Coalition nodes might try to get a large number of nodeIds Even if those nodeIds are random, a large enough collection of them would still give the attackers disproportionate control over the network  Moderate the rate at which nodeIds are given out Charging money? By solving little problem?

15 Admission control system (ACS) Property  Security Provide resiliency against attacks that work by creating shadow nodes  Efficiency Should be simple and does not require a lot of overhead on participating nodes  Fairness Nodes should do an equal amount of work to join the network  Response to attack Make the attack more difficult while not affecting other legitimate nodes  Scalability  Verifiability Allow any node in the system to verify that it is communicating with a node that was legitimately admitted to the network

16 It is important that the upper layer nodes are both static and trustworthy A must gain admission from a sequence of nodes, starting with leaf node B and ending with root X At each stage, A is required to solve a puzzle presented by B Decentralized, multi-puzzle scheme

17 Join protocol  Get token A wishes to join the network, it must first discover a leaf node B To gain admission from B by solving B’s puzzle After solving the puzzle, it is given a token and is used to prove to B’s parent admission by B At each stage, A is given a token to be used as proof of previous puzzle solution. When reach the root, a final token format is issued by X A’s signature

18  Connect to the network A must prove to its prospective neighbors that it has been admitted by the root node X Signature verification is cost The neighboring nodes each require A to solve one more puzzle challenges protect neighbors from a DoS attack

19 Node Upgrade  A must prove its stability before inclusion in the ACS  Initially, A joins the ACS as a leaf node, and evaluated by its parent node  To maintain a balanced tree A node only upgrades nodes when its number of children has reached the degree of the tree  When it is sufficiently deep to support the join load and achieve the proper security guarantees, no node will be added in the ACS

20 Node departure  Not a member of ACS  A member of ACS Leave gracefully The oldest child is chosen to replace the departing node Due to a failure Children must rejoin the network by  Contact its grandparent  Or, find another node in the ACS

21 Security  The ACS is designed to limit Sybil attacks, not to prevent them!  Attacker is a member of ACS Easily detected by the parent of the attacker by observing the rate of the token requests  Attacker is not a member of ACS Control a significant fraction of nodes Attack is limited by ensuring only a small number of tokens are released during a period of time

22 How about patient attackers? If an attacker is patient enough, it can achieve the required number of IDs to launch a massive attack Cut-off window  Define a token expiration time, W  How to determine the value of W Limit the number of good users that must execute the rejoin process to a small percentage

23 Analysis Models  Legitimate nodes arrive according to a Poisson distribution with an arrival rate of g  Life time is exponentially distributed with mean of  g  Assume an attacker is equal in computational power to the average user  l: Joining difficulty (measured in maximum time)

24 Analysis Puzzles and fairness  The distribution of the time to solve the puzzle is uniform  Single puzzle of average time l / 2  n puzzles of difficulty l/2n  Example 5 mins to solve with a maximum standard deviation of 30 seconds 9 puzzles and each takes max 33.3 seconds.

25 Analysis Steady state  The number of nodes in the network, N N= g *  g  To control fraction f of nodes, an attacker will be required to obtain (f*N)/(1-f) IDs  Assume there are n attackers Arrival rate of attacker nodes will be a = 2*n / l The time to launch a successful attack

26 Analysis Example  If λ g = 1 node/sec, and µ g = 2.3 hours, the steady state number of nodes is 8280  For the attacker to control 10% of the total nodes in the network it is required to obtain 920 IDs  If the joining process takes on average 5 minutes, a successful attack would take 76 hours which is more than 3 days.

27 Analysis Cut-off windows (legitimate nodes)  P : the percentage of legitimate nodes that will be required to reacquire fresh tokens

28 Analysis Example  If µ g = 2.3 hours and W = 4 hours,  The percentage of Legitimate nodes that will be cut off the network and asked to rejoin is 17.5%.

29 Analysis Cut-off window (attackers)  The combined number of nodes of n attackers can accumulate is 2*n*W / l  Example If the maximum join time is 10 minutes and W = 4 hours The maximum number of nodes an attacker can accumulate is 48 nodes

30 Robust routing primitives If an attacker controls a fraction f of the nodes in the p2p network, we would expect that each entry in every routing table would have a probability of f of pointing to a malicious node. If a desired route consumes h hops  The probability being free of malicious nodes is (1-f) h  How about Chord with 2 m nodes?`

31 Robust routing primitives  Locality-based attacks The adversary could take advantage of its locality to a given victim node to get more entries in that node’s routing table Increase its odds of controlling any given route that uses the victim node Attempt multiple, redundant routes from the source to the destination  Costly  How to determine “Not found”

32 Content verification Adversary may spoof the results Verification can be done if we have verification codes Solve by Google’s PageRank technology  Pages that are linked from “popular” pages are themselves more popular  How to add such a notion of popularity into a p2p system

33 Punishment Remove malicious nodes when they are detected Can we have a global view, who can punish the misbehave nodes? Unstructured p2p  Do it by yourself Structured p2p  Should convince other nodes  Or by yourself!

34

35 Conclusions and Discussions What we learn  Topologies Centralized p2p system Search cost is bounded Single point of failure Decentralized p2p system Unstructured p2p system  Flexible  Unbounded search Structured p2p system  Scalibility, bounded search  Only support keyword query Super peer architecture

36 Conclusions and Discussions  Search Constraint of hash Dimension reduction and Document retrieval Absolute angle Rolling index Locality preserving hashing idistance  Application BT For efficiency downloading Tit for tat Skype Super peer architecture  Security Identification Secure nodeId assignment and routing

37 Conclusions and Discussions A better topologies?  Robustness  Scalibility  Flexible  Bounded search  Fairness  Etc.

38 Conclusions and Discussions Support general query?  The constraint of hash  Similarity search  Range query  Content-based retrieval Trust without a third party?  nodeId assignment  Routing table management  Content management How to decide the score?