Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,

Slides:



Advertisements
Similar presentations
Peer-to-Peer Infrastructure and Applications Andrew Herbert Microsoft Research, Cambridge
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Secure routing for structured peer-to-peer overlay networks M. Castro, P. Druschel, A. Ganesch, A. Rowstron, D.S. Wallach 5th Unix Symposium on Operating.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Storage Management and Caching in PAST, a large-scale, persistent peer- to-peer storage utility Authors: Antony Rowstorn (Microsoft Research) Peter Druschel.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Wide-area cooperative storage with CFS
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Storage management and caching in PAST PRESENTED BY BASKAR RETHINASABAPATHI 1.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Security and Trust in P2P systems. 2 Trust and Security Peer-to-Peer systems require different entities to decide how to interact or whether to interact.
1 Security and Trust in P2P systems. 2 What is trust When thinking about security in a system, various entities need to “trust” others to varying degrees.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 10: Peer-to-Peer.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
CIS 640-2, Presenter: Yun Mao1 Security for Structured Peer- to-peer Overlay Networks By Miguel Castro et al. OSDI ’ 02 Presented by Yun Mao in CIS640.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Secure Routing for Structured Peer-to-Peer Overlay Networks M. Castro, P. Druschel, A. Ganesh, A. Rowstron and D. S. Wallach Proc. Of the 5 th Usenix Symposium.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Peer-to-peer systems Chapter Outline Introduction Napster and its legacy Peer-to-peer middleware Routing overlay Pastry 2.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
CS 268: Lecture 22 (Peer-to-Peer Networks)
EE 122: Peer-to-Peer (P2P) Networks
Building Peer-to-Peer Systems with Chord, a Distributed Lookup Service
Presentation transcript:

Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University, Houston, TX 77005, USA

Security Introduction Background, models and solution Routing in p2p systems Storage Trust in p2p overlays Conclusions

Introduction Peer to Peer systems: Gnutella & Napster: mainly for file sharing CAN, Chord, Pastry, Tapestry: structured p2p overlays Designed for various services such as network storage, content distribution, web caching, searching and indexing (use of routing tables)

Introduction These systems are scalable, fault-tolerant and provide effective load balancing Making them secure is a challenge Several types of attack: – Erroneous responses (false data/routes) – Abuse of resources (disk space/bandwidth) – “trust” issues (malicious code) – Other

Security Introduction Background, models and solution Routing in p2p systems Storage Trust in p2p overlays Conclusions

Background, models and solution Abstract routing overlay model Nodes and objects have unique identifiers called nodeIds and keys respectively. Keys are mapped to unique live nodes called roots Nodes have routing tables and neighbor sets Replica functions are used to map keys to sets of replica keys

Background, models and solution Pastry Random assignment of nodeIds from a circular 128-bit id space nodeIds and keys are thought of as a sequence of digits in base 2 b (b is usually 4) Routing is based on prefix

Background, models and solution Pastry routing table

Background, models and solution Message Routing Example Source node: 65a1fc Message has key: d46a1c Message arrives at node D467c4 after 4 hops

Background, models and solution System model The system has N nodes Fraction of faulty nodes (f): 0 ≤ f < 1 Faulty nodes form clusters of independent coalitions whose size is bounded by cN where 1/N ≤ c < f Parameter c is coalition independency factor

Background, models and solution System model All IP addresses are static Communication is over Internet connections – Network-level: no routing through the overlay – Overlay-level: routing through the overlay using corresponding protocol Cryptographic techniques are used to prevent data observation and modification

Security Introduction Background, models and solution Routing in p2p systems Storage Trust in p2p overlays Conclusions

Routing in p2p systems The problem: a malicious overlay node can corrupt, delete, deny access to or supply stale copies of all replicas of an object We need a secure routing technique – Successful delivery of a message even if some nodes corrupt, drop or misroute it – Successful delivery to all legitimate replica roots for a given key

Routing in p2p systems Secure routing requires: – 1)Securely assigning nodeIds to nodes Attackers can’t choose values of nodeIds assigned to nodes they control – 2)Securely maintaining the routing tables The fraction of faulty nodes in routing tables is less than the fraction of faulty nodes in the entire overlay – 3)Securely forwarding messages At least one copy of a message sent to a key reaches correct replica roots for the key with high probability

Routing in p2p systems 1)Secure nodeId assignment Nodes might choose their identifiers maliciously so that it is easy to censor specific documents or appear on the routing table of a victim node Random assignment of nodeIds is necessary Possible use of a server that is only consulted when new nodes join

Routing in p2p systems 1)Secure nodeId assignment What if a hostile node or coalition of nodes try to get a large number of nodeIds? Best solution: moderate the rate at which nodeIds are given out Other solutions: charging money for nodeId certificates or external authentication requirements

Routing in p2p systems 2)Robust routing primitives Attackers control a fraction f of the nodes in the p2p network For h hops, the probability a route is free of malicious nodes is (1 – f) h Unfortunately, adversaries take advantage from locality and they try to appear more often in their neighbor's routing table Constrained routing tables

Routing in p2p systems 3)Robust routing primitives To increase the odds of a message reaching its destination, we attempt redundant routes In Pastry, source node sends to all its neighbors. Then, each of them forwards the message to the target node If at least one route is successful, the message is considered successfully delivered For f ≤ 30% probability of success is 99.9%

Routing in p2p systems Ejecting misbehaving nodes That is an open problem If a node is accused of cheating, proof needs to be presented It’s not clear how proof can be generated at the routing layer False positives

Security Introduction Background, models and solution Routing in p2p systems Storage Trust in p2p overlays Conclusions

Storage Systems should be designed to limit how much remote space one can consume without providing a suitable amount of storage for the use of others The same applies to network bandwidth

Storage – Disk Space A malicious node might choose to claim its storage is full, when it actually has free space What if we use a central authority again, just like in nodeId assignment? Use of quotas That way every request to store a document would require a query to the quota authority Bottleneck

Storage – Disk Space Method 1: Attach Smartcards that provide quota information to each node. – Problem: Impractical, can be hacked Method 2: Ask your neighbors to act as quota managers. Distribute quota information just like sending messages. – Problem: No incentive for the neighbors

Storage – Disk Space Nodes keep two logs – Local list of files that the node is storing on behalf of remote nodes – Remote list of files that other nodes are storing on behalf of the local node Log entries contain IP addresses of remote nodes and file sizes The local list also contains the amount of free disk space available

Storage – Disk Space Of course, feeding false information to nodes is a problem Anonymous communication prevents this This way a node does not know who is checking on it

Storage – Disk Space Cheating chains Example: A claims it’s storing a file for B and B confirms that, but no files are actually stored. The same can happen with more nodes Random audits should be performed with random keys. This way cheaters will be eventually caught, but it is costly

Storage – Network Bandwidth Bandwidth sharing Micropayment systems Perform query→spend a token Receive a query→get a token Surplus of tokens→refuse to service queries High cost of evaluating validity of tokens Data needs to be widely replicated

Security Introduction Background, models and solution Routing in p2p systems Storage Trust in p2p overlays Conclusions

Trust in p2p overlays Spoofing of search results is possible Solution: implementation of something like Google’s PageRank technology – For Google, pages linked by “popular” pages are themselves more popular – We could add this notion of popularity in p2p systems using the audit log – Users themselves could rank the files Code → Architecture to safely execute it

Security Introduction Background, models and solution Routing in p2p systems Storage Trust in p2p overlays Conclusions

Summary of security techniques – Cryptography – Redundant routing – Economic methods Diversity of p2p systems → diversity of solutions