Download presentation
Presentation is loading. Please wait.
Published byJaylan Hessell Modified over 10 years ago
1
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system
2
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 2 PeeR-to-peer beyOnd FILE Sharing Catania Firenze Parma Pavia Roma Torino Trento Security on p2p networks
3
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 3 Goal Design and implementation of a DHT middleware resistant to most known overlay attacks a.Scalability b.Complete decentralization c.Efficiency Preserving:
4
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 4 Steps a.Analysis of DHT security issues b.Overview on existing DHTs properties c.Secure protocol (and architecture) design d.Performance analisys e.Implementation + f. Identity Based Cryptography
5
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 5 Distributed Hash Tables b. Overlay network c. Keyspace d. Key-node binding e. Key-content binding f. Responsibility function g. Lookup in O(log(N)) steps a. Content storage
6
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 6 Attacks against DHTs a. Storage attacks b. Routing attacks c. DDoS attacks e. Man In The Middle d. Sybil attack
7
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 7 Applying countermeasures a.Random NodeIds b.Few nodes per user c.Verifiable node identity d.Secure communication protocol e.Safe bootstrap No existent DHT grants these features
8
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 8 Current DHT designs PastryChordTapestry Kademlia CAN Viceroy
9
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 9 Kademlia a.Simple protocol (ping, store, find-node, find-value) b.Routing messages piggybacking c.Lightweight join phase d.XOR metric e.Caching
10
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 10 Kademlia: applications VuzeBittorrenteMuleLimewireRetroshare
11
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 11 Likir Layered Id-based Kademlia InfRastructure Problema: loose binding between node and identity Soluzione: a certification service Sfida: preserving the p2p paradigm pureness
12
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 12 Likir: architecture
13
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 13 Likir: initialization
14
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 14 Likir: node session
15
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 15 Likir: content STORE All RPC used are the same defined in Kademlia. We customize only the STORE :
16
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 16 Likir: Security properties Routing Storage / DDOS Sybil MITM a. Random generated NodeIds b. Verifiable identity No masquerading Account binded to every node ID-based applications integration c. Credentials binded to contents Verifiable ownership Reputation + Blacklisting d. Secure communication protocol Resistant to interleaving attacks SPoF e. The Certification Service is contected only ONCE
17
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 17 Identity 2.0 +
18
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 18 V E R I F I E D Identity 2.0
19
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 19 1.Setup →2.Extract →3.Sign →4.Verify Identity Based Signature Schema IBS di Boneh Franklyn (2001)
20
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 20 Likir & IBS: evaluation Need of a Private Key Generator Key Escrow Signature generation and check is slower than RSA Identity 2.0 compliant The public key can be omitted Signatures are smaller than in RSA
21
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 21 Performance evaluation
22
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 22 Performance evaluation
23
a.JLikir, Java 1.6 b.Kademlia adhering c.CS implemented like a CA d.Index Side Filtering e.We used JLikir to develop LiCha −Privacy-aware instant messaging application −Fully decentralized service −Likir identity support is fully exploited −High privacy and security level Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 23 Implementation
24
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 24 Conclusions Kademlia + Identity support + Protection from attacks = ————————————— Likir__
25
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 25 Likir monastery, Ladakh Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.