eclipse and re emergence of anonymous p2p storage network
play

Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay - PowerPoint PPT Presentation

Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay Services George Danezis Marios Isaakidis g.danezis@ucl.ac.uk m.isaakidis@cs.ucl.ac.uk Department of Computer Science University College London HotPETs - July 22, 2016


  1. Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay Services George Danezis Marios Isaakidis g.danezis@ucl.ac.uk m.isaakidis@cs.ucl.ac.uk Department of Computer Science University College London HotPETs - July 22, 2016

  2. Network-level Anonymity 1

  3. Low-latency Anonymity Networks Routing traffic to a hidden server The Invisible Internet Project https://www.torproject.org/docs/hidden-services.html.en https://geti2p.net 2

  4. The “Tor Swiss Army knife” 1 Onion service developers have to cope with: Scalability Availability Observability Platform Security 1 Bryan Ford, ECRYPT CSA 2016 3

  5. The “Tor Swiss Army knife” 1 Onion service developers have to cope with: Scalability Availability Observability Platform Security ... are there any alternatives? 1 Bryan Ford, ECRYPT CSA 2016 3

  6. CENO Experimenting with the client-server paradigm over Freenet https://censorship.no https://equalit.ie 4

  7. Anonymous P2P Storage Networks Decentralized information storage and retrieval systems where nodes: Provide resources – bandwidth and storage Replicate the files Route requests Two operations available: INSERTIONS and RETRIEVALS 5

  8. Anonymous P2P Storage Networks Decentralized information storage and retrieval systems where nodes: Provide resources – bandwidth and storage Replicate the files Route requests Two operations available: INSERTIONS and RETRIEVALS Security Guarantees Anonymity for both producers and consumers of information Plausible deniability High availability and persistence of the information inserted Censorship resistance Global adversary resistance 5

  9. A diverse ecosystem of Freenet services Communication Frost bulletin board Freemail asynchronous communication without leaking metadata FLIP-IRC synchronous messaging (experienced long delays) https://freenetproject.org 6

  10. A diverse ecosystem of Freenet services Communication Frost bulletin board Freemail asynchronous communication without leaking metadata FLIP-IRC synchronous messaging (experienced long delays) Collaboration Wiki systems Infocalypse source code management https://freenetproject.org 6

  11. A diverse ecosystem of Freenet services Communication Frost bulletin board Freemail asynchronous communication without leaking metadata FLIP-IRC synchronous messaging (experienced long delays) Collaboration Wiki systems Infocalypse source code management Library “distributed search engine” Maintainers crawl websites and publish indexes Users retrieve the indexes and perform term matching locally https://freenetproject.org 6

  12. Pseudo-Identities and the Web Of Trust Using public key crypto, Freenet provides an abstraction that allows: the owner of the private key to insert and update information others to discover what the owner has inserted The Web of Trust is a spam resistance mechanism inspired by Levien’s attack resistant trust metrics. 7

  13. CENO Deployment Topology Scaling by allocating tasks and by using High Trust Links 8

  14. Censorship Circumvention over P2P Storage Networks No need to publish proxy/bridges addresses Self-versioned Internet archive A messaging mechanism with strong privacy guarantees Requests need to be handled by an Insertion node only once, then are served directly via the distributed storage Content remains available via the distributed cache when a country throttles Internet access to the rest of the world 9

  15. Censorship Circumvention over P2P Storage Networks No need to publish proxy/bridges addresses Self-versioned Internet archive A messaging mechanism with strong privacy guarantees Requests need to be handled by an Insertion node only once, then are served directly via the distributed storage Content remains available via the distributed cache when a country throttles Internet access to the rest of the world The CENO paradox CENO becomes faster and requires fewer request handling nodes as it gets widely adopted 9

  16. Freenet as an Anonymity Platform “Anonymity as a Service” APIs for developing plugins Existing user base (and storage capacity) Freenet security properties Resistant to traffic analysis attacks 10

  17. Freenet Services Open Challenges Are we there yet? Dynamic content Synchronous messaging Performance Availability of unpopular content Spam resistance Scaling 11

  18. Thank you Marios Isaakidis m.isaakidis@cs.ucl.ac.uk @misaakidis github.com/equalitie/ceno 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend