Leveraging Social Links for Trust and Privacy

Size: px
Start display at page:

Download "Leveraging Social Links for Trust and Privacy"

Transcription

1 Leveraging Social Links for Trust and Privacy Antonio Cutillo, Refik Molva, Melek Önen, Thorsten Strufe EURECOM Sophia Antipolis

2 Security and privacy issues in OSNs Threats Current Status of OSNs Cloning Harvesting Hijacking ID Theft DoS Pollution Ease of data leakage Ease of impersonation Limited privacy support Lack of flexibility in privacy OSN as Big Brother 2 of

3 The Big Brother problem with OSN Privacy protection against Intruders Crawlers Third parties Does not prevent Application Server from disclosing/exploiting your data All existing OSN suffer from it! 3 of

4 The Big Brother problem OSNs market value is increasing 580 million US$ myspace (2005) billion US$ Facebook (2007) Do users actually care about privacy? 4 of

5 Safebook - Design Principles Decentralization -P2P architecture Cooperation enforcement -Friends cooperate Leveraging existing Trust -Social trust trusted link -Friend = neighbor Privacy -Simple anonymous routing -Based on trusted links -Group Encryption 5 of

6 Safebook - Components 3 Trusted Id System Id Management 1 Matryoshka Data storage Cooperation Communication with privacy 2 Peer-to-peer substrate Lookup 6/17

7 Safebook - Overlays a Social network overlay b Peer to peer overlay Internet b 7/17

8 Safebook - Matryoshka Outer shell k e a Trust relationship for i c s friend Entry nodes Inner shell i c d j i s node l f b d friend of c c friend of i d friend of i Trust relationship for c User i s friends End to end privacy based on hop -Store by hop i s encrypted trust profile data 8/17

9 Join process User Registration User a Node Get credentials Join the DHT Create Matryoshka 9/17

10 a looks for b f a e d b c a e b s outer shell d b s profile c k b s outer shell: h(b), e h(b), f lookup a looks for b s entry nodes k provides b s outer shell nodes data request a sends profile data request to an entry node serving b Data reply One of b s inner shell nodes answers 10 of

11 Data retrieval User 1 wants to get User 2 s profile data User 2 s data is stored by User 3 Lookup for User 2 s data along untrusted links P2P User 2 Trust User 1 Transfer of User 2 data along trusted links User 3 11/17

12 Safebook Prototype Safebook = Resident Program User User interface Trust logic Data P2P logic interface Encryption logic Communication Interface 12/17

13 Privacy by Design Privacy through layering Unlinkability of IDs across layers Anonymous communication in matryoshkas End-to-end privacy based on User keys User Id Hop-by-hop privacy based on Node keys u DHT d c b a v Node Id V s matryoshka Social trust: link = friendship 13 of

14 Security and Privacy Privacy Friendship relations hidden through Matryoshkas Untraceability - pseudonymity and anonymous routing Cloning and DoS prevention ID mgr Access control data encryption and key management Availability - replication at friends nodes 14 of

15 Guessing inner layers Span = 1 of

16 Guessing inner layers - Span =2 16 of

17 Performance P2P overlay Rely on existing studies Matryoshka End-to-end reachability/delay based on node liveness Analogy with P2P Derive architectural parameters 17 of

18 Reachability Too many contacts? 30% online probability (Skype data) 80 to to250+ contacts required to be reachable at 90% with 3 or 4 hops Number of contacts in the inner shell 18 of

19 Delay Delay 1 st Lookup for further delay -lookups CDF for -a CDF 4 shell for a matryoshka 4 shell matryoshka (*) 90 th percentile: 90 th percentile: 5,42 s13,49 s Total lookup time: T dl = T DHT + T Mat Median: Median: 1,73 s8,04 s Further lookups: T DHT =0 thanks to caching Average: 9,17 2,71 ss Time [ms] (*) Data computed by applying the montecarlo sampling technique on single hop delay measurements and on delay measurement for a successful DHT key lookup in KAD 19 of

20 Safebook Summary New New Applications Applications New Applications Super DNS for Communications trusted service API Privacy Cooperation enforcement Decentralization Trusted links P2P Social trust Group encryption 20 of

21 Publications Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe Privacy preserving social networking through decentralization WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, February 2-4, 2009, Snowbird, Utah, USA, Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda All your contacts are belong to us : automated identity theft attacks on social networks WWW'09, 18th Int. World Wide Web Conference, April 20-24, Madrid, Spain Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe Leveraging Social Links for Trust and Privacy in Networks INetSec 2009, Open Research Problems in Network Security, April 23-24, 2009, Zurich, Switzerland Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network 3rd IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications 21/17

OSN Attack Automated Identity Theft Attacks

OSN Attack Automated Identity Theft Attacks OSN Attack Automated Identity Theft Attacks John LePage Department of Electrical & Computer Engineering Missouri University of Science and Technology jlpc5@mst.edu 9 November 2016 2014 John LePage Introduction

More information

New Applications for P2P

New Applications for P2P New Applications for P2P A Research Agenda Forschungsseminar, KIT, 09.11.2010 Benjamin Schiller, Thorsten Strufe Thorsten Strufe, P2P, TU Darmstadt Peer-to-Peer Networkíng Group 1 Peer-to-Peer Thorsten

More information

Identifying Close Friends on the Internet

Identifying Close Friends on the Internet Identifying Close Friends on the Internet Randy Baden Bobby Bhattacharjee Neil Spring from HotNets09 Problem Security and privacy are only as good as the user's ability to identify with whom they wish

More information

P2P Social Networks With Broadcast Encryption Protected Privacy

P2P Social Networks With Broadcast Encryption Protected Privacy P2P Social Networks With Broadcast Encryption Protected Privacy Oleksandr Bodriagov, Sonja Buchegger School of Computer Science and Communication KTH - The Royal Institute of Technology Stockholm, Sweden

More information

Trusted Profile Identification and Validation Model

Trusted Profile Identification and Validation Model International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 1 (May 2013), PP. 01-05 Himanshu Gupta 1, A Arokiaraj Jovith 2 1, 2 Dept.

More information

Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs

Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs ABSTRACT Amre Shakimov Duke University Durham, NC shan@cs.duke.edu Landon P. Cox Duke University Durham, NC lpcox@cs.duke.edu Online Social

More information

A First Step Towards User Assisted Online Social Networks

A First Step Towards User Assisted Online Social Networks A First Step Towards User Assisted Online Social Networks Michal Kryczka IMDEA Networks michal.kryczka@imdea.org Eiko Yoneki University of Cambridge eiko.yoneki@cl.cam.ac.uk Ruben Cuevas Univ. Carlos III

More information

FOSP. Towards a Federated Object Sharing Protocol that Unifies Operations on Social Content Felix Maurer June 16,

FOSP. Towards a Federated Object Sharing Protocol that Unifies Operations on Social Content Felix Maurer June 16, FOSP Towards a Federated Object Sharing Protocol that Unifies Operations on Social Content Felix Maurer June 16, 2014 FORSCHUNGSGRUPPE DEZENTRALE SYSTEME UND NETZDIENSTE KIT University of the State of

More information

Reciprocal Access Direct for Online Social Networks: Model and Mechanisms

Reciprocal Access Direct for Online Social Networks: Model and Mechanisms Reciprocal Access Direct for Online Social Networks: Model and Mechanisms RAVULA VENKATESH M. Tech scholar, Department of CSE Vijay Rural Engineering College, Jntuh Email-id: Venky.5b8@Gmail.Com N.SWAPNA

More information

LifeSocial.KOM: A Secure and P2P-based Solution for Online Social Networks. In: IEEE International

LifeSocial.KOM: A Secure and P2P-based Solution for Online Social Networks. In: IEEE International Kalman Graffi, Christian Gross, Dominik Stingl, Daniel Hartung, Aleksandra Kovacevic, Ralf Steinmetz: LifeSocial.KOM: A Secure and PP-based Solution for Online Social Networks. In: IEEE International Conference

More information

Mechanisms of Multiparty Access Control in Online Social Network

Mechanisms of Multiparty Access Control in Online Social Network Mechanisms of Multiparty Access Control in Online Social Network Suvitha.D Department of CSE, Sree Sastha Institute of Engineering and Technology, Chennai, India Abstract-In this paper, Online Social Networks

More information

A Case For OneSwarm. Tom Anderson University of Washington.

A Case For OneSwarm. Tom Anderson University of Washington. A Case For OneSwarm Tom Anderson University of Washington http://oneswarm.cs.washington.edu/ With: Jarret Falkner, Tomas Isdal, Alex Jaffe, John P. John, Arvind Krishnamurthy, Harsha Madhyastha and Mike

More information

A WebRTC DHT. Andres Ledesma (UCY) in cooperation with Mikael (Peerialism).

A WebRTC DHT. Andres Ledesma (UCY) in cooperation with Mikael (Peerialism). A WebRTC DHT Andres Ledesma (UCY) in cooperation with Mikael (Peerialism). Preface I Existing DHT overlays have been optimized using one criteria (network proximity, social links, content caching or others).

More information

Security and Privacy in Online Social Networks

Security and Privacy in Online Social Networks Security and Privacy in Online Social Networks Leucio Antonio Cutillo 1, Mark Manulis 2, and Thorsten Strufe 2 1 Eurecom, Sophia Antipolis, France, cutillo@eurecom.fr 2 TU Darmstadt & CASED, Darmstadt,

More information

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 The Design and Implementation of a Next Generation Name Service for the Internet Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 Presenter: Saurabh Kadekodi Agenda DNS overview Current DNS Problems

More information

Towards an algorithm for efficient use of social network resources by using web scraping techniques

Towards an algorithm for efficient use of social network resources by using web scraping techniques Towards an algorithm for efficient use of social network resources by using web scraping techniques Valon Xhafa, Blerim Rexha and Korab Rrmoku Abstract The rapid growth of Web in recent years has changed

More information

PRIVACY BY DESIGN FOR DELAY TOLERANT NETWORKS

PRIVACY BY DESIGN FOR DELAY TOLERANT NETWORKS PRIVACY BY DESIGN FOR DELAY TOLERANT NETWORKS 9th ETSI Security Workshop Sophia Antipolis, France, on 15th 16th January 2014 Dr. Haitham Cruickshank H.Cruickshank@surrey.ac.uk, Naveed Ahmad n.ahmad@surrey.ac.uk

More information

Cooperation in Open Distributed Systems. Stefan Schmid

Cooperation in Open Distributed Systems. Stefan Schmid Cooperation in Open Distributed Systems Stefan Schmid T-Labs, Berlin, July 2, 2009 Distributed Systems 2008/9 Wireless: Many mobile phones today have WLAN (and even Skype) P2P: Olympic games 2008 live-broadcast

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

PoX: Protecting Users from Malicious Facebook Applications

PoX: Protecting Users from Malicious Facebook Applications PoX: Protecting Users from Malicious Facebook Applications Manuel Egele a,, Andreas Moser b, Christopher Kruegel a, Engin Kirda c a University of California, Santa Barbara, Harold Frank Hall, Santa Barbara,

More information

P2PNS: A Secure Distributed Name Service for P2PSIP

P2PNS: A Secure Distributed Name Service for P2PSIP P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS

More information

Privacy-Preserving Decentralized Communications

Privacy-Preserving Decentralized Communications Privacy-Preserving Decentralized Communications A Research Agenda Sonja Buchegger, KTH CSC Online Privacy Problematic Current services (FB, GMail, GCal, Flickr, Pinterest) are free users pay with their

More information

C4PS - Helping Facebookers Manage their Privacy Settings

C4PS - Helping Facebookers Manage their Privacy Settings C4PS - Helping Facebookers Manage their Privacy Settings Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe CASED, Technische Universität Darmstadt Abstract The ever increasing

More information

Social Network Privacy Protection Research in Big Data Era Shuang LIANG

Social Network Privacy Protection Research in Big Data Era Shuang LIANG 2016 Joint International Conference on Artificial Intelligence and Computer Engineering (AICE 2016) and International Conference on Network and Communication Security (NCS 2016) ISBN: 978-1-60595-362-5

More information

Overlay and P2P Networks. Unstructured networks: Freenet. Dr. Samu Varjonen

Overlay and P2P Networks. Unstructured networks: Freenet. Dr. Samu Varjonen Overlay and P2P Networks Unstructured networks: Freenet Dr. Samu Varjonen 1.2.2015 Contents Last week Napster Skype Gnutella BitTorrent and analysis This week: Freenet Introduction to structured networks

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

Paradigm Shift in the Security-n-Privacy Implementation of Semi-Distributed Online Social Networking

Paradigm Shift in the Security-n-Privacy Implementation of Semi-Distributed Online Social Networking Computer and Information Science; Vol. 6, No. 1; 2013 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Paradigm Shift in the Security-n-Privacy Implementation of Semi-Distributed

More information

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201

Distributed Systems. peer-to-peer Johan Montelius ID2201. Distributed Systems ID2201 Distributed Systems ID2201 peer-to-peer Johan Montelius 1 Idéa use resources in edge of network computing storage communication 2 Computing 3 seti@home central server millions of clients hundred of thousands

More information

DMAP : Global Name Resolution Services Through Direct Mapping

DMAP : Global Name Resolution Services Through Direct Mapping DMAP : Global Name Resolution Services Through Direct Mapping Tam Vu, Rutgers University http://www.winlab.rutgers.edu/~tamvu/ (Joint work with Akash Baid, Yanyong Zhang, Thu D. Nguyen, Junichiro Fukuyama,

More information

MIX Network for Location Privacy First Draft

MIX Network for Location Privacy First Draft 2G1319 Communication Systems Design Department of Microelectronics and Information Technology, KTH csd2002-ipv6privacy@2g1319.ssvl.kth.se MIX Network for Location Privacy First Draft O. Sirovatcenko April

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example

Overlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization

More information

Trust embedded business model of Online Service Network (OSN)

Trust embedded business model of Online Service Network (OSN) ITU Workshop on Future Trust and Knowledge Infrastructure, Phase 2 Geneva, Switzerland 1 July 2016 Trust embedded business model of Online Service Network (OSN) Minzheong Song Professor, Hansei University

More information

Ensuring β-availability in P2P Social Networks

Ensuring β-availability in P2P Social Networks Ensuring β-availability in P2P Social Networks Nashid Shahriar, Shihabur R. Chowdhury*, Mahfuza Sharmin**, Reaz Ahmed*, Raouf Boutaba*, and Bertrand Mathieu Dept. of CSE, Bangladesh University of Engineering

More information

SOCIAL NETWORKING IN TODAY S BUSINESS WORLD

SOCIAL NETWORKING IN TODAY S BUSINESS WORLD SOCIAL NETWORKING IN TODAY S BUSINESS WORLD AGENDA Review the use of social networking applications within the business environment Review current trends in threats, attacks and incidents Understand how

More information

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication NETWORKING 1. ITDNW01 Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social 2. ITDNW02 Congestion Control for Background Data Transfers With Minimal Delay Impact 3. ITDNW03 Transient

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

JXTA TM Technology for XML Messaging

JXTA TM Technology for XML Messaging JXTA TM Technology for XML Messaging OASIS Symposium New Orleans, LA 27-April-2004 Richard Manning Senior Software Architect Advanced Technology & Edge Computing Center Sun Microsystems Inc. www.jxta.org

More information

Decentralized Online Social Network Using Peer-to-Peer Technology

Decentralized Online Social Network Using Peer-to-Peer Technology REV Journal on Electronics and Communications, Vol. 5, No. 1 2, January June, 2015 29 Regular Article Decentralized Online Social Network Using Peer-to-Peer Technology Manh Ha Tran, Van Sinh Nguyen, Synh

More information

Ian Clarke Oskar Sandberg

Ian Clarke Oskar Sandberg Ian Clarke is the architect and coordinator of The Freenet Project, and the Chief Executive Officer of Cematics Ltd, a company he founded to realise commercial applications for the Freenet technology.

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

An Offline Foundation for Accountable Pseudonyms

An Offline Foundation for Accountable Pseudonyms An Offline Foundation for Accountable Pseudonyms Bryan Ford MIT CSAIL Jacob Strauss SocialNets April 1, 2008 Introduction Anonymity is a cherished principle Traditional: voting, peer review Online: email,

More information

Anonymous Communications

Anonymous Communications Anonymous Communications Andrew Lewman andrew@torproject.org December 05, 2012 Andrew Lewman andrew@torproject.org () Anonymous Communications December 05, 2012 1 / 45 Who is this guy? 501(c)(3) non-profit

More information

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT 1 Avinash Chaudhari, 2 Pradeep Gamit 1 L.D. College of Engineering, Information Technology, Ahmedabad India 1 Chaudhari.avi4u@gmail.com,

More information

Addressing the P2P Bootstrap Problem for Small Overlay Networks

Addressing the P2P Bootstrap Problem for Small Overlay Networks Addressing the P2P Bootstrap Problem for Small Overlay Networks David Isaac Wolinsky, Pierre St. Juste, P. Oscar Boykin, and Renato Figueiredo Advanced Computing Information Systems Lab University of Florida

More information

Inference Attacks by Third-Party Extensions to Social Network Systems

Inference Attacks by Third-Party Extensions to Social Network Systems Inference Attacks by Third-Party Extensions to Social Network Systems Seyed Hossein Ahmadinejad Mohd Anwar Philip W. L. Fong Department of Computer Science University of Calgary Calgary, Alberta, Canada

More information

CS 134 Winter Privacy and Anonymity

CS 134 Winter Privacy and Anonymity CS 134 Winter 2016 Privacy and Anonymity 1 Privacy Privacy and Society Basic individual right & desire Relevant to corporations & government agencies Recently increased awareness However, general public

More information

SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS

SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS Jon Hanny Director of Information Security and Assurance, Buckley Sandler LLP Gaurav Chikara Senior Security Engineer, Cooley LLP AGENDA Social

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

MOBILE THREAT LANDSCAPE. February 2018

MOBILE THREAT LANDSCAPE. February 2018 MOBILE THREAT LANDSCAPE February 2018 WHERE DO MOBILE THREATS COME FROM? In 2017, mobile applications have been a target of choice for hackers to access and steal data, with 86% of mobile threats coming

More information

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs

More information

Peer-to-Peer Systems and Security IN2194. Chapter 1 Peer-to-Peer Systems 1.1 Basics

Peer-to-Peer Systems and Security IN2194. Chapter 1 Peer-to-Peer Systems 1.1 Basics Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Peer-to-Peer Systems and Security IN2194 Chapter 1 Peer-to-Peer Systems 1.1 Basics Dipl.-Inform. Heiko Niedermayer

More information

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility Rubén Cuevas, Carmen Guerrero, Ángel Cuevas, María Calderón, Carlos J. Bernardos Departamento de Ingeniería Telemática, Universidad

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

Distributed Social Network in Browsers. Yang Ji Michael Puckett

Distributed Social Network in Browsers. Yang Ji Michael Puckett Distributed Social Network in Browsers Yang Ji Michael Puckett Problem Large scale personal data abuse and manipulation raises question to the cloud based architecture in social networks. Sensitive personal

More information

Empirical Characterization of P2P Systems

Empirical Characterization of P2P Systems Empirical Characterization of P2P Systems Reza Rejaie Mirage Research Group Department of Computer & Information Science University of Oregon http://mirage.cs.uoregon.edu/ Collaborators: Daniel Stutzbach

More information

Credit-based Network Management

Credit-based Network Management Credit-based Network Management 2009-01-06 Outline The problem of Network Management The Idea of Credit-based Network Management An Implementation in Campus Network Conclusions Network management headaches

More information

GNUnet Distributed Data Storage

GNUnet Distributed Data Storage GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview

More information

Analysis of Mobile Social Networking & Emergence of Proximity Based Mobile

Analysis of Mobile Social Networking & Emergence of Proximity Based Mobile Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.958

More information

Ensuring β-availability in P2P Social Networks

Ensuring β-availability in P2P Social Networks Ensuring β-availability in P2P Social Networks Nashid Shahriar, Shihabur Rahman Chowdhury, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba and Bertrand Mathieu Dept. of Comp. Sc. and Engg., Bangladesh University

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Generalization Algorithm For Prevent Inference Attacks In Social Network Data

Generalization Algorithm For Prevent Inference Attacks In Social Network Data Generalization Algorithm For Prevent Inference Attacks In Social Network Data Chethana Nair, Neethu Krishna, Siby Abraham 1Dept of computer Science And Engg, Christ Knowledge City, M annoor, 2,3 Dept Of

More information

Host Website from Home Anonymously

Host Website from Home Anonymously Abstract Host Website from Home Anonymously Prerna Mahajan 1 and Kashish Gupta 2 1 Professor, Department of Computer Science, IITM Janakpuri, New Delhi, India 2 Research Scholar, Department of Computer

More information

Introduction on Peer to Peer systems

Introduction on Peer to Peer systems Introduction on Peer to Peer systems Georges Da Costa dacosta@irit.fr dacosta@irit.fr 1/55 Goal of this Lecture What can P2P do, not only as a buzzword What it can't do Shows some examples & algorithms

More information

NearBucket-LSH: Efficient Similarity Search in P2P Networks

NearBucket-LSH: Efficient Similarity Search in P2P Networks NearBucket-: Efficient Similarity Search in P2P Networks Naama Kraus, David Carmel 2, Idit Keidar 2, and Meni Orenbach Viterbi EE Technion, Haifa, Israel 2 Yahoo Research, Haifa, Israel Abstract. We present

More information

A Traceback Attack on Freenet

A Traceback Attack on Freenet A Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract Freenet

More information

Protocols for Anonymous Communication

Protocols for Anonymous Communication 18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

pweb : A Personal Interface to the World Wide Web

pweb : A Personal Interface to the World Wide Web pweb : A Personal Interface to the World Wide Web Reaz Ahmed, Shihabur Rahman Chowdhury, Alexander Pokluda, Md. Faizul Bari, Raouf Boutaba and Bertrand Mathieu David R. Cheriton School of Computer Science,

More information

Peer-to-peer computing research a fad?

Peer-to-peer computing research a fad? Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node

More information

Unit 8 Peer-to-Peer Networking

Unit 8 Peer-to-Peer Networking Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System

More information

Five Reasons It s Time For Secure Single Sign-On

Five Reasons It s Time For Secure Single Sign-On Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Verified Secure Routing

Verified Secure Routing Verified Secure Routing David Basin ETH Zurich EPFL, Summer Research Institute June 2017 Team Members Verification Team Information Security David Basin Tobias Klenze Ralf Sasse Christoph Sprenger Thilo

More information

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup

More information

Identifying and Preventing Conditions for Web Privacy Leakage

Identifying and Preventing Conditions for Web Privacy Leakage Identifying and Preventing Conditions for Web Privacy Leakage Craig E. Wills Computer Science Department Worcester Polytechnic Institute Worcester, MA 01609 1 Position Statement Beyond tracking and proposals

More information

Bitcoin, Security for Cloud & Big Data

Bitcoin, Security for Cloud & Big Data Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).

More information

What is peer to peer?

What is peer to peer? 1 1 1 1 1 1 1 1 0 1 0 1 0 1 What is peer to peer? PP in some sense is decentralization moving away from monolithic central hub-spoke model to the decentralized device to device or service to service model.

More information

Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 2

Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 2 Table of Contents Hacking Web Sites Broken Authentication Emmanuel Benoist Spring Term 2018 Introduction Examples of Attacks Brute Force Session Spotting Replay Attack Session Fixation Attack Session Hijacking

More information

From POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno

From POTS to VoP2P: Step 1. P2P Voice Applications. Renato Lo Cigno Advanced Networking P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg The Client/Server model in conversationsl communications User-plan

More information

ICT 6544 Distributed Systems Lecture 2: ARCHITECTURES

ICT 6544 Distributed Systems Lecture 2: ARCHITECTURES ICT 6544 Distributed Systems Lecture 2: ARCHITECTURES Hossen Asiful Mustafa 1 Introduction Distributed systems are often complex pieces of software of which the components are by definition dispersed across

More information

Distributed Automatic Configuration of Complex IPsec-Infrastructures

Distributed Automatic Configuration of Complex IPsec-Infrastructures Noname manuscript No. (will be inserted by the editor) Distributed Automatic Configuration of Complex IPsec-Infrastructures Michael Rossberg Guenter Schaefer Thorsten Strufe the date of receipt and acceptance

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Experiences Leveraging DHTs for a Security Application

Experiences Leveraging DHTs for a Security Application Experiences Leveraging DHTs for a Security Application Amit Levy with: Roxana Geambasu (Columbia) Yoshi Kohno (UW) Arvind Krishnamurthy (UW) Hank Levy (UW) Paul Gardner (Vuze) Vinnie Moscaritolo (PGP)

More information

Abusing Social Networks for Automated User Profiling

Abusing Social Networks for Automated User Profiling Abusing Social Networks for Automated User Profiling Marco Balduzzi 1, Christian Platzer 2, Thorsten Holz 2, Engin Kirda 1, Davide Balzarotti 1, and Christopher Kruegel 3 1 Institute Eurecom, Sophia Antipolis

More information

Anonymity in P2P Systems

Anonymity in P2P Systems Anonymity in P2P Systems Protecting User Presence by Hiding Tor Hidden Service Activity Karsten Loesing Distributed and Mobile Systems Group, University of Bamberg 1. Bamberger-Zwickauer Workshop, 2007-06-14

More information

ETHERNITY DECENTRALIZED CLOUD COMPUTING

ETHERNITY DECENTRALIZED CLOUD COMPUTING ETHERNITY DECENTRALIZED CLOUD COMPUTING Whitepaper 4 August 2013 v1.3 HODL UG crowdsale@ethernity.cloud DISCLAIMER: The ETHERNITY Tokens are a crypto asset that is currently being developed by the ETHERNITY

More information

Mobile Device Management

Mobile Device Management Mobile Device Management David Roundtree, CISSP Identity & Security Public Sector State & Local Date: April 23, 2013 1 This document is for informational purposes. It is not a commitment to deliver any

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

How Alice and Bob meet if they don t like onions

How Alice and Bob meet if they don t like onions How Alice and Bob meet if they don t like onions Survey of Network Anonymisation Techniques Erik Sy 34th Chaos Communication Congress, Leipzig Agenda 1. Introduction to Anonymity Networks Anonymity Strategies

More information

A Brief Comparison of Security Patterns for Peer to Peer Systems

A Brief Comparison of Security Patterns for Peer to Peer Systems A Brief Comparison of Security Patterns for Peer to Peer Systems Rahul J. Vaghela 1, Kalpesh Patel 2 1 PG Student, Department of Computer Engineering, L.D. College Of Engineering, Gujarat Technological

More information

You are Who You Know and How You Behave: Attribute Inference Attacks via Users Social Friends and Behaviors

You are Who You Know and How You Behave: Attribute Inference Attacks via Users Social Friends and Behaviors You are Who You Know and How You Behave: Attribute Inference Attacks via Users Social Friends and Behaviors Neil Zhenqiang Gong Iowa State University Bin Liu Rutgers University 25 th USENIX Security Symposium,

More information

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms EJ Jung Goals 1. Hide what you wrote encryption of any kind symmetric/asymmetric/stream 2. Hide to whom you sent and when pseudonym?

More information

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2 416 Distributed Systems Mar 3, Peer-to-Peer Part 2 Scaling Problem Millions of clients server and network meltdown 2 P2P System Leverage the resources of client machines (peers) Traditional: Computation,

More information

Multi-Factor Authentication (MFA) Interoperability Profile. Karen Herrington, Virginia Tech David Walker, Internet2 September 26, 2016

Multi-Factor Authentication (MFA) Interoperability Profile. Karen Herrington, Virginia Tech David Walker, Internet2 September 26, 2016 Multi-Factor Authentication (MFA) Interoperability Profile Karen Herrington, Virginia Tech David Walker, Internet2 September 26, 2016 1 Mission Working group formed at the request of the Assurance Advisory

More information

Feasibility, Effectiveness, Performance and Potential Solutions on Distributed Content Sharing System

Feasibility, Effectiveness, Performance and Potential Solutions on Distributed Content Sharing System www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 1 January 2016, Page No. 15638-15649 Feasibility, Effectiveness, Performance and Potential Solutions

More information

Distributed Hash Tables

Distributed Hash Tables Distributed Hash Tables CS6450: Distributed Systems Lecture 11 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University.

More information