29
Privacy-Preserving P2P Data Sharing with OneSwarm Authors: Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas Anderson Published In: ACM SIGCOMM, September 2010 Presented By: Muhammad` Faisal Amjad

Privacy-Preserving P2P Data Sharing with OneSwarm

  • Upload
    april

  • View
    38

  • Download
    3

Embed Size (px)

DESCRIPTION

Privacy-Preserving P2P Data Sharing with OneSwarm. Authors: Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas Anderson. Published In:ACM SIGCOMM, September 2010. Presented By:Muhammad` Faisal Amjad. Acknowledgement. Sources of figures / graphs / tables: - PowerPoint PPT Presentation

Citation preview

Page 1: Privacy-Preserving P2P Data Sharing with OneSwarm

Privacy-Preserving P2P Data Sharing with OneSwarm

Authors: Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas Anderson

Published In: ACM SIGCOMM, September 2010

Presented By: Muhammad` Faisal Amjad

Page 2: Privacy-Preserving P2P Data Sharing with OneSwarm

Acknowledgement

Sources of figures / graphs / tables:• The paper being presented• http://oneswarm.cs.washington.edu/• http://www.bittorrent.com/

Page 3: Privacy-Preserving P2P Data Sharing with OneSwarm

Outline

• Introduction to P2P file sharing• The Issue of Privacy in P2P file sharing• Overview of OneSwarm file sharing System• OneSwarm Protocol Design• Security Analysis• Contributions• Weaknesses• Suggested Improvements

Page 4: Privacy-Preserving P2P Data Sharing with OneSwarm

Introduction to P2P file sharing

Download from a single Source

Page 5: Privacy-Preserving P2P Data Sharing with OneSwarm

Introduction to P2P file sharing

Multiple Computers download the same file from a single Source

Page 6: Privacy-Preserving P2P Data Sharing with OneSwarm

Introduction to P2P file sharing

Every Computer becomes part of a network of sources of the same file

Torrent File

Page 7: Privacy-Preserving P2P Data Sharing with OneSwarm

Introduction to P2P file sharing

From where to get different pieces of the file ?

Page 8: Privacy-Preserving P2P Data Sharing with OneSwarm

Introduction to P2P file sharing

A “Tracker” gives info about various sources called “Peers”, for the file

Page 9: Privacy-Preserving P2P Data Sharing with OneSwarm

Privacy ???

Page 10: Privacy-Preserving P2P Data Sharing with OneSwarm

The Issue of Privacy in P2P file sharing

• Protocols like BitTorrent offer high performance and robustness but participants can easily be monitored by anyone who cares

• Anonymization networks e.g. Tor and FreeNet offer privacy but at the cost of performance

• Available P2P file sharing systems offer an un-attractive choice between privacy and performance

Page 11: Privacy-Preserving P2P Data Sharing with OneSwarm

OneSwarm File Sharing System

Page 12: Privacy-Preserving P2P Data Sharing with OneSwarm

Overview

• Central to the design is the notion of “flexible privacy” and “friend-to-friend sharing”.

• Instead of relying only on a directory service such as a “Tracker” to discover peers, OneSwarm builds trusted links through social network peers

• Users are free to control the tradeoff between performance and privacy by managing the level of trust in peers.

Page 13: Privacy-Preserving P2P Data Sharing with OneSwarm
Page 14: Privacy-Preserving P2P Data Sharing with OneSwarm

Overview of OneSwarm file sharing System - Search

Searching for a file through a chain of friends OR Peers

Page 15: Privacy-Preserving P2P Data Sharing with OneSwarm

File is sent on the reverse path

Overview of OneSwarm file sharing System - Response

Page 16: Privacy-Preserving P2P Data Sharing with OneSwarm

Receiver’s perspective of the source of file

Overview of OneSwarm file sharing System - Anonymity

Page 17: Privacy-Preserving P2P Data Sharing with OneSwarm

Sender’s perspective of the destination of file

Overview of OneSwarm file sharing System - Anonymity

Page 18: Privacy-Preserving P2P Data Sharing with OneSwarm

Protocol Design

OneSwarm protocol supports two tasks:

• Defining and maintaining the overlay topology

• Locating and transferring data objects

Page 19: Privacy-Preserving P2P Data Sharing with OneSwarm

Protocol Design - Tasks

1) Defining and maintaining the overlay topology

• Bootstrapping the mesh network: Exchange of encryption keys• Social Network Import – Email, Social NW or LAN• Community Servers• Manually

• Name resolution: Distributed Hash Table is maintained by every user serves as the name resolution service. Contains encrypted IDs and their mapping for IP / Port

Page 20: Privacy-Preserving P2P Data Sharing with OneSwarm

Protocol Design - Tasks2) Locating and transferring data objects

• Congestion-aware Search: Controlled flooding of search queries to locate data and construct forwarding paths without overwhelming the network or exposing endpoints.

• Swarming Data Transport: Data is split into blocks, with active downloaders redistributing completed blocks. Transfers use multiple paths and multiple sources, if available.

• Long Term History: Each client maintains transfer volumes for each peer, using these to prioritize service during periods of congestion.

Page 21: Privacy-Preserving P2P Data Sharing with OneSwarm

So… How does OneSwarm Provide Privacy

Page 22: Privacy-Preserving P2P Data Sharing with OneSwarm

Privacy Levels provided by OneSwarm

• Public Distribution – Same as BitTorrent*

• Without Attribution• Multi-hop (chain of friends) instead of direct P2P transfer• Changing source + destination IP addresses & Ports at

every hop

• With Permission – Peer identities and resource names are shared only through Public/Private key combinations

*All OneSwarm transfers are encrypted

Page 23: Privacy-Preserving P2P Data Sharing with OneSwarm

Privacy Levels provided by OneSwarm

Page 24: Privacy-Preserving P2P Data Sharing with OneSwarm

Security Analysis – Attacks & Defenses

• Timing Attack – Search queries and responses are forwarded after adding a random delay to inhibit calculation of RTT to infer proximity

• Correlation Attack – Peers have limited view of the overlay and cannot control path setup beyond directly connected neighbors. Attackers could use this to correlate performance with ongoing transfers

• Collusion Attack - Search queries and responses are forwarded probabilistically, making it very hard for directly connected colluding peers to infer source of data or monitor habits

Page 25: Privacy-Preserving P2P Data Sharing with OneSwarm

Performance Evaluation

• File Size – 20 MB• 120 PlanetLab machines• To limit overhead, Tor was modified to create 10 new paths every 10 seconds instead of every 10 minutes

Page 26: Privacy-Preserving P2P Data Sharing with OneSwarm

Contributions

• A new system that provides flexibility for the user to manage the level of privacy for file sharing

• Incorporation of social network for building p2p file sharing network

Page 27: Privacy-Preserving P2P Data Sharing with OneSwarm

Weaknesses

• Evaluation of Protocol in “Privacy-Preserving” modes• No details are provided regarding the implementation /

functioning of community servers• Manual bootstrapping of mesh topology has not been

explained

Page 28: Privacy-Preserving P2P Data Sharing with OneSwarm

Improvements

• Capability to import friends from other social networks

Page 29: Privacy-Preserving P2P Data Sharing with OneSwarm

Questions