Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare TOWARDS A SECURE DATA SHARING PEER-TO-PEER NETWORK BASED ON GEOMETRIC AND.

Slides:



Advertisements
Similar presentations
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Advertisements

An Innovative Approach to Content Search Across P2P Inter-Networks Potharaju S.R.P Saradhi Mohmed Nazuruddin Shaik Potharaju S R Aditya Under The Guidance.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Attribute-based Indexing Overlay Apr Outline Introduction Basic Idea Advantage Challenge Conclusion.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
PeerDB: A P2P-based System for Distributed Data Sharing Wee Siong Ng, Beng Chin Ooi, Kian-Lee Tan, Aoying Zhou Shawn Jeffery CS294-4 Peer-to-Peer Systems.
Efficient Algorithmic Techniques for Several Multidimensional Geometric Data Management and Analysis Problems Mugurel Ionut Andreica Politehnica University.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
LSDS-IR’08, October 30, Peer-to-Peer Similarity Search over Widely Distributed Document Collections Christos Doulkeridis 1, Kjetil Nørvåg 2, Michalis.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Topology-Aware Overlay Networks By Huseyin Ozgur TAN.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
P2P File Sharing Systems
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
An Evaluation model of botnet based on peer to peer Gao Jian KangFeng ZHENG,YiXian Yang,XinXin Niu 2012 Fourth International Conference on Computational.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Decision Optimization Techniques for Efficient Delivery of Multimedia Streams Mugurel Ionut Andreica, Nicolae Tapus Politehnica University of Bucharest,
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Dynamic P2P Indexing and Search based on Compact Clustering Mauricio Marin Veronica Gil-Costa Cecilia Hernandez UNSL, Argentina Universidad de Chile Yahoo!
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Research of P2P Architecture based on Cloud Computing Speaker : 吳靖緯 MA0G0101.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
SocialVoD: a Social Feature-based P2P System Wei Chang, and Jie Wu Presenter: En Wang Temple University, PA, USA IEEE ICPP, September, Beijing, China1.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
03/19/02Scalab Seminar Series1 Finding Good Peers in Peer-to-Peer Networks Ramaswamy N.Vadivelu Scalab, ASU.
Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Towards a Peer-to-Peer Recommender System Based on Collaborative Filtering.
Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua University Tsinghua Univ. Oct Experimental Study on Neighbor Selection Policy.
Authors Universitatea Politehnica București Facultatea de Automatică și Calculatoare Catedra de Calculatoare Extension of a port knocking client- server.
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Facultatea de Automatica si Calculatoare Universitatea “Politehnica“ din Bucuresti Security in Clouds Building a Malicious Client Detection module for.
Presented by Edith Ngai MPhil Term 3 Presentation
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
A Scalable content-addressable network
Presentation transcript:

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare TOWARDS A SECURE DATA SHARING PEER-TO-PEER NETWORK BASED ON GEOMETRIC AND SEMANTIC DISTANCES Authors: Ana-Delia Sâmbotin, Mugurel Ionut Andreica

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Outline Introduction Goals Design Architecture Experimental Evaluation Conclusion

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Introduction P2P overlay topology in which nodes communicate one- to-one with their neighbors Resource (file) sharing Find a given resource (file) Find similar resources (files) to a given resource (file) Transfer a given resource (file) (hop-by-hop in the P2P topology) Security –Data transfer encryption –Anonymization –Avoid traffic analysis

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Goals Similarity search based on implicit user attributes (i.e. extracted automatically, not explicitly expressed by the users) Better chances of finding a given resource (similar resources) quickly when using bounded flooding for search) Good data transfer performance (e.g. data transfer speed) Security and privacy (encryption, anonymization, etc.)

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Design Each peer computes a set of coordinates in a D-dimensional space, based on: –Network round-trip time (RTT) –Semantic distance (i.e. similarity of resources to other peers) In a distributed manner, each peer will select as neighbors in the topology other peers with small distances to it (based on the distance in the geometric space) –Network RTT => good data transfer performance in hop-by-hop data transfers –Semnatic closeness => good chance of finding a given resource (file) or similar resources (files) nearby (among its neighbors or at most a given distance R away from it)

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Architecture Main modules related to: –Network communication (low- level) –P2P topology construction and maintenance –Data transfer –Resource (file) search –Security

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Architecture Two main roles: Bootstrap node and normal node The nodes will first contact the bootstrap nodes in order to find a set of nodes already in the system; afterwards, they organize themselves Different types of strategies for constructing the P2P overlay

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Strategies for the P2P overlay A network of “supernodes”, that “hide” a group of peers A “supernode” can be considered to be a “proxy” node Geometric coordinates computed based on network abd semantic distances between a peer and a subset of other peers (Resource or Similarity) Search strategy – bounded (distance) flooding

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Architecture - formulas Network distance metric Semantic distance (based on the common resources)

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Security Module Anonymization: using mediators Avoiding traffic analysis –Dummy search terms in a search query –Dummy search queries Encryption of data transfers using public/private keys

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Evaluation – Distance metrics Evaluation (through simulation) of peer distribution in 2D when: (c) –Using only the network distance (a) –Using only the semantic distance (b) –Using a combination of both metrics (c) (a) (b)

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Evaluation – Using Mediators Duration of a search query: –Secure (encrypted messages) with mediator –Secure (encrypted messages) without mediator –Unsecure (without mediator) Encryption slows things down (up to 30%-35%) Using a mediator does not have a meaningful negative impact on performance

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Conclusions Proposed a P2P-based data sharing system with: –Enhanced security attributes (anonymization and encryption) –A combination of network distance (RTT) and semantic distance for building the overlay Experimental results are promising

Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare The end Thank you! Questions?