Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay - - PowerPoint PPT Presentation

eclipse and re emergence of anonymous p2p storage network
SMART_READER_LITE
LIVE PREVIEW

Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay - - PowerPoint PPT Presentation

Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay Services George Danezis Marios Isaakidis g.danezis@ucl.ac.uk m.isaakidis@cs.ucl.ac.uk Department of Computer Science University College London HotPETs - July 22, 2016


slide-1
SLIDE 1

Eclipse and Re-Emergence of Anonymous P2P Storage Network Overlay Services

Marios Isaakidis m.isaakidis@cs.ucl.ac.uk George Danezis g.danezis@ucl.ac.uk

Department of Computer Science University College London

HotPETs - July 22, 2016

slide-2
SLIDE 2

1

Network-level Anonymity

slide-3
SLIDE 3

2

Low-latency Anonymity Networks

Routing traffic to a hidden server

The Invisible Internet Project https://www.torproject.org/docs/hidden-services.html.en https://geti2p.net

slide-4
SLIDE 4

3

The “Tor Swiss Army knife”1

Onion service developers have to cope with: Scalability Availability Observability Platform Security

1Bryan Ford, ECRYPT CSA 2016

slide-5
SLIDE 5

3

The “Tor Swiss Army knife”1

Onion service developers have to cope with: Scalability Availability Observability Platform Security ... are there any alternatives?

1Bryan Ford, ECRYPT CSA 2016

slide-6
SLIDE 6

4

CENO

Experimenting with the client-server paradigm over Freenet https://censorship.no https://equalit.ie

slide-7
SLIDE 7

5

Anonymous P2P Storage Networks

Decentralized information storage and retrieval systems where nodes: Provide resources – bandwidth and storage Replicate the files Route requests

Two operations available: INSERTIONS and RETRIEVALS

slide-8
SLIDE 8

5

Anonymous P2P Storage Networks

Decentralized information storage and retrieval systems where nodes: Provide resources – bandwidth and storage Replicate the files Route requests

Two operations available: INSERTIONS and RETRIEVALS Security Guarantees

Anonymity for both producers and consumers of information Plausible deniability High availability and persistence of the information inserted Censorship resistance Global adversary resistance

slide-9
SLIDE 9

6

A diverse ecosystem of Freenet services

Communication

Frost bulletin board Freemail asynchronous communication without leaking metadata FLIP-IRC synchronous messaging (experienced long delays) https://freenetproject.org

slide-10
SLIDE 10

6

A diverse ecosystem of Freenet services

Communication

Frost bulletin board Freemail asynchronous communication without leaking metadata FLIP-IRC synchronous messaging (experienced long delays)

Collaboration

Wiki systems Infocalypse source code management https://freenetproject.org

slide-11
SLIDE 11

6

A diverse ecosystem of Freenet services

Communication

Frost bulletin board Freemail asynchronous communication without leaking metadata FLIP-IRC synchronous messaging (experienced long delays)

Collaboration

Wiki systems Infocalypse source code management

Library “distributed search engine”

Maintainers crawl websites and publish indexes Users retrieve the indexes and perform term matching locally https://freenetproject.org

slide-12
SLIDE 12

7

Pseudo-Identities and the Web Of Trust

Using public key crypto, Freenet provides an abstraction that allows: the owner of the private key to insert and update information

  • thers to discover what the owner has inserted

The Web of Trust is a spam resistance mechanism inspired by Levien’s attack resistant trust metrics.

slide-13
SLIDE 13

8

CENO Deployment Topology

Scaling by allocating tasks and by using High Trust Links

slide-14
SLIDE 14

9

Censorship Circumvention over P2P Storage Networks

No need to publish proxy/bridges addresses Self-versioned Internet archive A messaging mechanism with strong privacy guarantees Requests need to be handled by an Insertion node only once, then are served directly via the distributed storage Content remains available via the distributed cache when a country throttles Internet access to the rest of the world

slide-15
SLIDE 15

9

Censorship Circumvention over P2P Storage Networks

No need to publish proxy/bridges addresses Self-versioned Internet archive A messaging mechanism with strong privacy guarantees Requests need to be handled by an Insertion node only once, then are served directly via the distributed storage Content remains available via the distributed cache when a country throttles Internet access to the rest of the world

The CENO paradox CENO becomes faster and requires fewer request handling nodes as it gets widely adopted

slide-16
SLIDE 16

10

Freenet as an Anonymity Platform

“Anonymity as a Service”

APIs for developing plugins Existing user base (and storage capacity) Freenet security properties

Resistant to traffic analysis attacks

slide-17
SLIDE 17

11

Freenet Services Open Challenges

Are we there yet?

Dynamic content Synchronous messaging Performance Availability of unpopular content Spam resistance Scaling

slide-18
SLIDE 18

12

Thank you

Marios Isaakidis

m.isaakidis@cs.ucl.ac.uk @misaakidis

github.com/equalitie/ceno