Presentation is loading. Please wait.

Presentation is loading. Please wait.

Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.

Similar presentations


Presentation on theme: "Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system."— Presentation transcript:

1 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system

2 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 2 PeeR-to-peer beyOnd FILE Sharing Catania Firenze Parma Pavia Roma Torino Trento Security on p2p networks

3 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 3 Goal Design and implementation of a DHT middleware resistant to most known overlay attacks a.Scalability b.Complete decentralization c.Efficiency Preserving:

4 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 4 Steps a.Analysis of DHT security issues b.Overview on existing DHTs properties c.Secure protocol (and architecture) design d.Performance analisys e.Implementation + f. Identity Based Cryptography

5 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 5 Distributed Hash Tables b. Overlay network c. Keyspace d. Key-node binding e. Key-content binding f. Responsibility function g. Lookup in O(log(N)) steps a. Content storage

6 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 6 Attacks against DHTs a. Storage attacks b. Routing attacks c. DDoS attacks e. Man In The Middle d. Sybil attack

7 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 7 Applying countermeasures a.Random NodeIds b.Few nodes per user c.Verifiable node identity d.Secure communication protocol e.Safe bootstrap No existent DHT grants these features

8 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 8 Current DHT designs PastryChordTapestry Kademlia CAN Viceroy

9 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 9 Kademlia a.Simple protocol (ping, store, find-node, find-value) b.Routing messages piggybacking c.Lightweight join phase d.XOR metric e.Caching

10 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 10 Kademlia: applications VuzeBittorrenteMuleLimewireRetroshare

11 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 11 Likir Layered Id-based Kademlia InfRastructure Problema: loose binding between node and identity Soluzione: a certification service Sfida: preserving the p2p paradigm pureness

12 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 12 Likir: architecture

13 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 13 Likir: initialization

14 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 14 Likir: node session

15 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 15 Likir: content STORE All RPC used are the same defined in Kademlia. We customize only the STORE :

16 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 16 Likir: Security properties Routing Storage / DDOS Sybil MITM a. Random generated NodeIds b. Verifiable identity  No masquerading  Account binded to every node  ID-based applications integration c. Credentials binded to contents  Verifiable ownership  Reputation + Blacklisting d. Secure communication protocol  Resistant to interleaving attacks SPoF e. The Certification Service is contected only ONCE

17 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 17 Identity 2.0 +

18 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 18 V E R I F I E D Identity 2.0

19 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 19 1.Setup →2.Extract →3.Sign →4.Verify Identity Based Signature Schema IBS di Boneh Franklyn (2001)

20 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 20 Likir & IBS: evaluation Need of a Private Key Generator Key Escrow Signature generation and check is slower than RSA Identity 2.0 compliant The public key can be omitted Signatures are smaller than in RSA

21 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 21 Performance evaluation

22 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 22 Performance evaluation

23 a.JLikir, Java 1.6 b.Kademlia adhering c.CS implemented like a CA d.Index Side Filtering e.We used JLikir to develop LiCha −Privacy-aware instant messaging application −Fully decentralized service −Likir identity support is fully exploited −High privacy and security level Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 23 Implementation

24 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 24 Conclusions Kademlia + Identity support + Protection from attacks = ————————————— Likir__

25 Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 25 Likir monastery, Ladakh Questions?


Download ppt "Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system."

Similar presentations


Ads by Google