Download presentation
Presentation is loading. Please wait.
Published byTylor Colleton Modified over 9 years ago
1
On-the-fly Verification of Erasure-Encoded File Transfers Mike Freedman & Max Krohn NYU Dept of Computer Science
2
Downloading Large Files From P2P Networks For large files, transfer times are much bigger than average node uptimes. Some files are very popular: multiple sources and multiple requesting nodes. Is it possible to have multicast, even though sources and receivers frequently enter and leave the network.
3
Solution: Rateless Erasure Codes Source (S1) Receiver (R1) Source (S2)Source (S3)Source (S4)
4
Solution: Rateless Erasure Codes Source (S1) Receiver (R1) Source (S2)Source (S3)Source (S4) Wants file F
5
Mutli-Sourced Downloads Source (S1) Receiver (R1) Source (S2)Source (S3)Source (S4)
6
Mutli-Sourced Downloads Source (S1) Receiver (R1) Source (S2)Source (S3)Source (S4)
7
Receiver (R3)Receiver (R4) Receiver (R3) “Overlapping Multicast Trees” Source (S1)Source (S2)Source (S3)Source (S4) Receiver (R2) Receiver (R1)
8
Resuming Truncated Downloads Source (S1) Receiver (R1)Receiver (R2)
9
Resuming Truncated Downloads Source (S1) Receiver (R1)Receiver (R2)
10
Resuming Truncated Downloads Source (S1) Receiver (R1)Receiver (R2)
11
Threat Model KaZaa eDonkey 2000 Gnutella Morpheus
12
Threat Model KaZaa eDonkey 2000 Gnutella Morpheus
13
Threat Model KaZaa eDonkey 2000 Gnutella Morpheus
14
Threat Model KaZaa eDonkey 2000 Gnutella Morpheus
15
Bogus Data Attack KaZaa eDonkey 2000 Gnutella Morpheus
16
Unwanted Data Attack KaZaa eDonkey 2000 Gnutella Morpheus
17
Attacking Erasure Encoded Transfers Source (S1) Receiver (R1) Source (S2)Source (S3)Source (S4)
18
Attacking Erasure Encoded Transfers Source (S1) Receiver (R1) Source (S2)Source (S3)Source (S4)
19
Erasure Encoding of Files …
20
Easily Verifiable…. …
21
…but Not on the Fly Source (S1) Receiver (R1) Source (S2)Source (S3)Source (S4)
22
What Happened? R1 received checkblock c from S4. S4 claims: blah
23
What Happened? R1 received checkblock c from S4. S4 claims: R1 knows: But how can R1 verify c? Wouldn’t it be nice if: Not true for SHA1!
24
What Happened? R1 received checkblock c from S4. S4 claims: R1 knows: But how can R1 verify c? Wouldn’t it be nice if: Not true for SHA1!
25
What Happened? R1 received checkblock c from S4. S4 claims: R1 knows: But how can R1 verify c? Wouldn’t it be nice if: Not true for SHA1!
26
What Happened? R1 received checkblock c from S4. S4 claims: R1 knows: But how can R1 verify c? Wouldn’t it be nice if: Not true for SHA1!
27
A Homomorphic Hashing Scheme Assume file block size of 8kB Pick large prime (about 1024 bits) and small prime (about 256 bits) that divides, and 256 generators of order q: Writes the file F as matrix, elements in
28
How To Hash The hash of a message or check block is an element in :
29
How To Hash The hash of a message or check block is an element in : The hash of the entire file is an n-element vector of the hashes of the blocks:
30
The Only Important Slide implies that Why?
31
How To Encode Checkblocks are constructed using modular addition over. To generate a checkblock, pick a set And compute
32
How To Verify Given the correct hash: And a check block: verify that: Note: LHS computation is expensive!
33
Success! Source (S1) Receiver (R1) Source (S2)Source (S3)Source (S4)
34
Analysis + Security of the hash function based on hardness of the discrete log. − Hashes are big (1/256 the size of the file), but we can apply this process recursively. + Our paper details a batched, probabilistic verification scheme that drastically reduces exponentiations. + Verifying rate is 40x faster than download rates on a T1.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.