28
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Embed Size (px)

Citation preview

Page 1: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Privacy-Preserving P2P Data Sharing with OneSwarm

-Piggy

Page 2: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Outline

• Overview• Related Works• Data Sharing with OneSwarm• Protocol Design• Security Analysis• Evaluation

Page 3: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Overview

• P2P file sharing is efficient and common• Most P2P application allow third parties to

monitor users behaviour• Privacy

-the protection of information from unauthorized disclosure

• Attackers can get some privacy information by observing user behaviourex: using BitTorrent to download security patch

Page 4: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Related Works

• BitTorrentA common P2P file sharing protocol with high efficiency but without privacy protection

• TorUses onion routing techniques to anonymize request via a set of relay nodes

• FreenetUses an anonymous P2P publishing system

Page 5: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Data Sharing with OneSwarm

• An exmaple

Page 6: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Data Sharing with OneSwarm

• Public distribution• Everyone in the network can download file freely• All data need not be private• Serves as a fully backwards compatible BitTorrent

client

Page 7: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Data Sharing with OneSwarm

• With permission• Only users with permission can download files• Uses persistent identities to define per-file

permission• Allows all permitted users to recognize one

another and engage in swarming downlod

Page 8: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Data Sharing with OneSwarm

• Without attribution• Depends on obscuring attribution of source

and/or destination• Instead of directly advertise data, it uses privacy-

preserving keyword search• Data is relayed through unknown number of

intermediaries• Apprpriate for sensitive material

Page 9: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Two major tasks• Defining and maintaining the overlay topology• Locating and transferring data objects

• Topology• Define overlay links by exchanging public keys• Peers are either trusted or untrusted

Page 10: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Transport• The mesh defined by the web of trust among users is ued to

locate and transfer data• Inspired by existing P2P swarming systems e.g., BitTorrent• Restrics direct communication to a small number of

persistent contacts• Locates distant data source by flooding through the overlay• Data transfers occur over the reverse search path• Obscuring the identities of sender and receiver when

sharing data without attribution

Page 11: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Linking Peers with Trust relationships• 1024 bit RSA public/private key pair, public key

serves as its identity (persistent) among its peers• Key exchange• Discover and exchange over local area network• Piggy-back on existing social network e.g., Google Talk• By email invitations

Page 12: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Managing Groups and Trusted Peers• Private Community Server• Maintains a list of registered users• Provides authorized subscibers with a current set of

public keys

• Public Community Server• Allows new users to easily obtain a set of untrusted

peers

Page 13: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Identity and Connectivity• Long-term identities are linked to transient IP and

port number via DHT• DHT entries are encrypted with public key• ID->{IP, Port}• Various key exchange + DHT => overlay mesh

Page 14: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Naming and Locating Data• Between connected peers => exchange file list• Naming• 160 bit SHA-1 hash of name and content• Low order 6 bit => file ID in search message

• Congestion Aware Search• Tradeoff between overhead and performance• Shortest path• Management of propagation of searches

Page 15: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Naming and Locating Data• Congestion Aware Search• Search message don’t have time-to-live• Maintaining a set of rotating Bloom filter and forward

search message if the forwarder had idle cpacity and hasnot yet forwrded it• Forward to untrusted peer probabilistically• Delay 150ms before forwarding• Terminate with search cancel message

Page 16: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Naming and Locating Data• Path Setup• Search message matched => search reply (delayed)• Search identifier• Path identifier

Page 17: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Swarming Data Transfer• Keep alive message refresh path• Tunnels BitTorrent traffic through overlay paths• Dicover new path by periodically flooding search

message• Enhance load balance and efficiency

Page 18: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Protocol Design

• Incentives• Client maintain tansfer statistics for each peer• Retain tic-for-tac in BitTorrent• Contention => weight decided by ratio of

contribution and net consumption• Forwarding is sum to 0

Page 19: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Security Analysis

• Goal• Improve privacy by allowing users to control

information disclosure• Resistent to the disclosure of user behaviour to an

attacker with control over a limited # of overlay nodes

Page 20: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Security Analysis

• Attacks and Defenses• Persistent peering relationship limit monitoring

power• Heterogeneity of trust relationship foils timing

attacks• Lack of source routing limits correlation attacks• Constrained reandomness frustrates statistical

attacks• Network dynamics limit value of historical data

Page 21: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Security Analysis

• Timming Attacks

Page 22: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Security Analysis

• Collusion Attacks

Page 23: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Evaluation

• Overlay structure

Page 24: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Evaluation

• Multiple-path Transfer

Page 25: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Evaluation

• Comparison with existing systems

Page 26: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Evaluation

• Overhead

Page 27: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Evaluation

• Utilization

Page 28: Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy

Conclusion

• Strength• Data collected from real world

• Weakness• Not well organized