Privacy-Preserving P2P Data Sharing with OneSwarm
description
Transcript of Privacy-Preserving P2P Data Sharing with OneSwarm
![Page 1: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/1.jpg)
Privacy-Preserving P2P Data Sharing with OneSwarm
Authors: Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas Anderson
Published In: ACM SIGCOMM, September 2010
Presented By: Muhammad` Faisal Amjad
![Page 2: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/2.jpg)
Acknowledgement
Sources of figures / graphs / tables:• The paper being presented• http://oneswarm.cs.washington.edu/• http://www.bittorrent.com/
![Page 3: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/3.jpg)
Outline
• Introduction to P2P file sharing• The Issue of Privacy in P2P file sharing• Overview of OneSwarm file sharing System• OneSwarm Protocol Design• Security Analysis• Contributions• Weaknesses• Suggested Improvements
![Page 4: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/4.jpg)
Introduction to P2P file sharing
Download from a single Source
![Page 5: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/5.jpg)
Introduction to P2P file sharing
Multiple Computers download the same file from a single Source
![Page 6: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/6.jpg)
Introduction to P2P file sharing
Every Computer becomes part of a network of sources of the same file
Torrent File
![Page 7: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/7.jpg)
Introduction to P2P file sharing
From where to get different pieces of the file ?
![Page 8: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/8.jpg)
Introduction to P2P file sharing
A “Tracker” gives info about various sources called “Peers”, for the file
![Page 9: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/9.jpg)
Privacy ???
![Page 10: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/10.jpg)
The Issue of Privacy in P2P file sharing
• Protocols like BitTorrent offer high performance and robustness but participants can easily be monitored by anyone who cares
• Anonymization networks e.g. Tor and FreeNet offer privacy but at the cost of performance
• Available P2P file sharing systems offer an un-attractive choice between privacy and performance
![Page 11: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/11.jpg)
OneSwarm File Sharing System
![Page 12: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/12.jpg)
Overview
• Central to the design is the notion of “flexible privacy” and “friend-to-friend sharing”.
• Instead of relying only on a directory service such as a “Tracker” to discover peers, OneSwarm builds trusted links through social network peers
• Users are free to control the tradeoff between performance and privacy by managing the level of trust in peers.
![Page 13: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/13.jpg)
![Page 14: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/14.jpg)
Overview of OneSwarm file sharing System - Search
Searching for a file through a chain of friends OR Peers
![Page 15: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/15.jpg)
File is sent on the reverse path
Overview of OneSwarm file sharing System - Response
![Page 16: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/16.jpg)
Receiver’s perspective of the source of file
Overview of OneSwarm file sharing System - Anonymity
![Page 17: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/17.jpg)
Sender’s perspective of the destination of file
Overview of OneSwarm file sharing System - Anonymity
![Page 18: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/18.jpg)
Protocol Design
OneSwarm protocol supports two tasks:
• Defining and maintaining the overlay topology
• Locating and transferring data objects
![Page 19: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/19.jpg)
Protocol Design - Tasks
1) Defining and maintaining the overlay topology
• Bootstrapping the mesh network: Exchange of encryption keys• Social Network Import – Email, Social NW or LAN• Community Servers• Manually
• Name resolution: Distributed Hash Table is maintained by every user serves as the name resolution service. Contains encrypted IDs and their mapping for IP / Port
![Page 20: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/20.jpg)
Protocol Design - Tasks2) Locating and transferring data objects
• Congestion-aware Search: Controlled flooding of search queries to locate data and construct forwarding paths without overwhelming the network or exposing endpoints.
• Swarming Data Transport: Data is split into blocks, with active downloaders redistributing completed blocks. Transfers use multiple paths and multiple sources, if available.
• Long Term History: Each client maintains transfer volumes for each peer, using these to prioritize service during periods of congestion.
![Page 21: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/21.jpg)
So… How does OneSwarm Provide Privacy
![Page 22: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/22.jpg)
Privacy Levels provided by OneSwarm
• Public Distribution – Same as BitTorrent*
• Without Attribution• Multi-hop (chain of friends) instead of direct P2P transfer• Changing source + destination IP addresses & Ports at
every hop
• With Permission – Peer identities and resource names are shared only through Public/Private key combinations
*All OneSwarm transfers are encrypted
![Page 23: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/23.jpg)
Privacy Levels provided by OneSwarm
![Page 24: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/24.jpg)
Security Analysis – Attacks & Defenses
• Timing Attack – Search queries and responses are forwarded after adding a random delay to inhibit calculation of RTT to infer proximity
• Correlation Attack – Peers have limited view of the overlay and cannot control path setup beyond directly connected neighbors. Attackers could use this to correlate performance with ongoing transfers
• Collusion Attack - Search queries and responses are forwarded probabilistically, making it very hard for directly connected colluding peers to infer source of data or monitor habits
![Page 25: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/25.jpg)
Performance Evaluation
• File Size – 20 MB• 120 PlanetLab machines• To limit overhead, Tor was modified to create 10 new paths every 10 seconds instead of every 10 minutes
![Page 26: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/26.jpg)
Contributions
• A new system that provides flexibility for the user to manage the level of privacy for file sharing
• Incorporation of social network for building p2p file sharing network
![Page 27: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/27.jpg)
Weaknesses
• Evaluation of Protocol in “Privacy-Preserving” modes• No details are provided regarding the implementation /
functioning of community servers• Manual bootstrapping of mesh topology has not been
explained
![Page 28: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/28.jpg)
Improvements
• Capability to import friends from other social networks
![Page 29: Privacy-Preserving P2P Data Sharing with OneSwarm](https://reader035.fdocuments.in/reader035/viewer/2022062422/56813c63550346895da5ed69/html5/thumbnails/29.jpg)
Questions