hiding amongst the clouds
play

Hiding Amongst the Clouds A Proposal for Cloud-based Onion Routing - PowerPoint PPT Presentation

Hiding Amongst the Clouds A Proposal for Cloud-based Onion Routing Nicholas Jones Matvey Arye Jacopo Cesareo Michael J. Freedman Princeton University https://www.torproject.org/about/overview.html We and but... and C loud-based O nion


  1. Hiding Amongst the Clouds A Proposal for Cloud-based Onion Routing Nicholas Jones Matvey Arye Jacopo Cesareo Michael J. Freedman Princeton University

  2. https://www.torproject.org/about/overview.html

  3. We

  4. and

  5. but...

  6. and

  7. C loud-based O nion R outing

  8. Benefits, Risks, and Challenges - Potential benefits of cloud infrastructure - High performance - Adaptability to censorship - Economic challenges - New security problems

  9. Benefits of Cloud Infrastructure Performance (latency, throughput) Censorship Resistance

  10. Performance - Individual nodes are higher bandwidth - Ability to add and remove nodes to meet demand 5:00 P .M.

  11. Performance - Individual nodes are higher bandwidth - Ability to add and remove nodes to meet demand 7:00 P .M.

  12. Performance - Individual nodes are higher bandwidth - Ability to add and remove nodes to meet demand 8:00 P .M.

  13. Performance - Individual nodes are higher bandwidth - Ability to add and remove nodes to meet demand 11:00 P .M.

  14. Performance - Individual nodes are higher bandwidth - Ability to add and remove nodes to meet demand 12:00 A.M.

  15. Performance - Individual nodes are higher bandwidth - Ability to add and remove nodes to meet demand 2:00 A.M.

  16. COR has higher throughput than Tor

  17. COR has higher throughput than Tor

  18. COR has higher throughput than Tor US & International

  19. COR has higher throughput than Tor US & International US Only

  20. COR has higher throughput than Tor US & International US Only 7.6x speedup

  21. Multi-homed Datacenters are Harder to Monitor

  22. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home

  23. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home

  24. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home Datacenter

  25. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home 10-100 Gbps Sprint Datacenter

  26. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home 10-100 Gbps Sprint Datacenter Level 3

  27. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home 10-100 Gbps Sprint Datacenter Level 3 AT&T

  28. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home 10-100 Gbps Sprint Datacenter Level 3 AT&T

  29. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home 10-100 Gbps Sprint Datacenter Level 3 AT&T

  30. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home 10-100 Gbps Sprint Datacenter Level 3 AT&T

  31. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home 10-100 Gbps Sprint Datacenter Level 3 AT&T

  32. Multi-homed Datacenters are Harder to Monitor 1-10 Mbps Home 10-100 Gbps Sprint Datacenter Level 3 AT&T

  33. Blocking Clouds Causes Collateral Damage

  34. Blocking Clouds Causes Collateral Damage X

  35. Blocking Clouds Causes Collateral Damage X X

  36. Blocking Clouds Causes Collateral Damage X X X

  37. Blocking Clouds Causes Collateral Damage X X X X

  38. Blocking Clouds Causes Collateral Damage

  39. Blocking Clouds Causes Collateral Damage

  40. Blocking Clouds Causes Collateral Damage

  41. Blocking Clouds Causes Collateral Damage

  42. Blocking Clouds Causes Collateral Damage

  43. Benefits of Clouds - Higher performance - Elasticity to scale to demand - Multi-homing and scale makes eavesdropping difficult - Elasticity forces censors to make hard choices: collateral damage or unblocked access

  44. Economics Cloud pricing is affordable for end users

  45. Cost of running COR in the cloud - Cloud providers charge for CPU and bandwidth

  46. Cost of running COR in the cloud - Cloud providers charge for CPU and bandwidth - CPU is cheap

  47. Cost of running COR in the cloud - Cloud providers charge for CPU and bandwidth - CPU is cheap - 100+ users on a 34 ¢/hr node

  48. Cost of running COR in the cloud - Cloud providers charge for CPU and bandwidth - CPU is cheap - 100+ users on a 34 ¢/hr node

  49. Cost of running COR in the cloud - Cloud providers charge for CPU and bandwidth - CPU is cheap - 100+ users on a 34 ¢/hr node - Bandwidth is dominant cost

  50. Cost of running COR in the cloud - Cloud providers charge for CPU and bandwidth - CPU is cheap - 100+ users on a 34 ¢/hr node - Bandwidth is dominant cost - 100MB as low as 1 ¢ Amazon EC2 Pricing

  51. Tor’s Total Bandwidth Cost in the Cloud Approximately 900 MB/s 376 TB/month COR Cost: $61,200/month

  52. Security Challenges and Solutions Involved Parties and Trust Model Building Tunnels Paying for Tunnels Learning About Relays

  53. Distributing Trust - Tor - Tunnels between volunteer relays - COR - Tunnels between clouds from different providers

  54. Is that sufficient? - Should users pay cloud providers directly? - Not anonymous: Credit cards and Paypal leak info

  55. Is that sufficient? - Should users pay cloud providers directly? - Not anonymous: Credit cards and Paypal leak info - Another layer of indirection: Anonymity Service Providers - Operate relays and pay cloud providers - Mask users’ identities - Accept anonymous payment for access

  56. System Roles - Cloud Hosting Providers (CHPs) - Provide infrastructure for COR relays - Anonymity Service Providers (ASPs) - Run relays and directory servers - Sell tokens - Redeemable for XX MB of connectivity or XX amount of time

  57. System Architecture Example ASP 2 ASP 1 CHP A DESTINATION SERVER REQUEST TRAFFIC ENCRYPTED IP 2.2.2.2 IP 1.1.1.1 USER CHP B Organizations used above are examples only

  58. System Architecture Example ASP 2 ASP 1 CHP A DESTINATION SERVER REQUEST TRAFFIC ENCRYPTED IP 2.2.2.2 IP 1.1.1.1 USER CHP B Cloud Hosting Providers Organizations used above are examples only

  59. System Architecture Example ASP 2 ASP 1 CHP A DESTINATION SERVER REQUEST TRAFFIC ENCRYPTED IP 2.2.2.2 IP 1.1.1.1 USER CHP B Organizations used above are examples only

  60. System Architecture Example ASP 2 ASP 1 CHP A DESTINATION SERVER REQUEST TRAFFIC ENCRYPTED IP 2.2.2.2 IP 1.1.1.1 USER CHP B Anonymity Service Providers Organizations used above are examples only

  61. System Architecture Example ASP 2 ASP 1 CHP A DESTINATION SERVER REQUEST TRAFFIC ENCRYPTED IP 2.2.2.2 IP 1.1.1.1 USER CHP B Organizations used above are examples only

  62. Circuit Construction Must be Policy Aware

  63. Circuit Construction Must be Policy Aware - Two relays within each datacenter

  64. Circuit Construction Must be Policy Aware - Two relays within each datacenter - Different entry and exit ASPs

  65. Circuit Construction Must be Policy Aware - Two relays within each datacenter - Different entry and exit ASPs - Different entry and exit CHPs

  66. Circuit Construction Must be Policy Aware - Two relays within each datacenter - Different entry and exit ASPs - Different entry and exit CHPs - ASP and CHP relays are contiguous within a circuit

  67. Paying for Access - Users purchase tokens - Redeem tokens for access (bandwidth or time) - Chaum’s e-cash: - Cryptographically untraceable

  68. How do users gain access? - Users need two things: - Tokens - COR Directory

  69. How do users gain access? - Users need two things: - Tokens - COR Directory - Solution: Bootstrapping Network - Low speed - High Latency - Free

  70. Adversaries enumerate and block ingress - Current technologies - Tor Bridges - Two separate problems: - COR Relays - High speed, low latency, not free - Bootstrapping - Low speed, high latency, free

  71. Summary Tor COR

  72. Summary Tor COR Secure

  73. Summary Tor COR Secure High Speed

  74. Summary Tor COR Secure High Speed Dynamic Scaling

  75. Summary Tor COR Secure High Speed Dynamic Scaling Adaptive to censorship

  76. Summary Tor COR Secure High Speed Dynamic Scaling Adaptive to censorship Free

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend