14

Click here to load reader

Access control to bit torrent swarms using closed swarms

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Access control to bit torrent swarms using closed swarms

Access Control to BitTorrent Swarms using Closed Swarms

Dr. Njål BorchNorthern research institute,

Tromsø, Norway

Page 2: Access control to bit torrent swarms using closed swarms

Why access control?

• No access control– Limited commercial possibilities

• DRM– Control content, not distribution– Limits usability from end user perspective

• Closed swarms– Distributed access control mechanism– Differentiated services– Control network resources

Page 3: Access control to bit torrent swarms using closed swarms

DRM

• Manage restrictions on content• Favoured by Broadcast TV

– Non-authorized users costs zero– Loss of profit if people break it

• But online (unicast)?– Non-authorized user costs money– Accumulates high bandwidth cost if broken or circumvented

Page 4: Access control to bit torrent swarms using closed swarms

Control access to resources

• Central system– Authentication service– Username/password– Fairly simple solution– Accumulates bandwidth costs

• P2P system– Cost saving– Appealing scalability properties– Centralized access control on central bits– Leaking nodes

• But: Both (all really) systems can experience leaking content

Page 5: Access control to bit torrent swarms using closed swarms

Closed Swarms – the Idea

Create a flexible authentication mechanism for P2P which is both scalable and allows for experimental and innovative business models.

Page 6: Access control to bit torrent swarms using closed swarms

The nodes

AN L

Page 7: Access control to bit torrent swarms using closed swarms

The Math

Page 8: Access control to bit torrent swarms using closed swarms

The Math

Page 9: Access control to bit torrent swarms using closed swarms

The Math

Page 10: Access control to bit torrent swarms using closed swarms

So basically...

• Non-authorized nodes can be of use– They can even be explicitly allowed

• Can subsidize bandwidth to selected nodes

Page 11: Access control to bit torrent swarms using closed swarms

The basics

Proof of

AccessNode Key

Swarm

Swarm Key

Node

Page 12: Access control to bit torrent swarms using closed swarms

The Protocol

Node A- Generate and send Nonce

- Send signed PoA

- Verify PoA, allow upload

Node B

- Generate and send Nonce

- Verify PoA, allow upload- Send signed PoA

Page 13: Access control to bit torrent swarms using closed swarms

Points

• Seeds do not need to sign and send PoAs• No central access required to validate PoAs• No need to know a node's keys in advance• Only performed on connect (handshake)• BitTorrent implementation backwards compatible

– But non-CS clients are non-authorized

• Allows easy addition of seeds– Provide data or a PoA for the seedbox

Page 14: Access control to bit torrent swarms using closed swarms

Possible applications

• Sell guarantees– Free user gets community service. Might VoD, might not.– Paying customer is guaranteed high speed seeds, will VoD.

• Sell guarantees 2– Home user can watch a live event, if there is capacity– A venue can buy access to an event, and is guaranteed seeds.

• Closed group sharing– Only authorized nodes are allowed access

• Combine with Scalable video coding (SVC)– SD for free users, pay for HD