Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems - - PowerPoint PPT Presentation

rumor riding anonymizing unstructured peer to peer systems
SMART_READER_LITE
LIVE PREVIEW

Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems - - PowerPoint PPT Presentation

Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems Narrated by Christo Wilson Table of Contents Table of Contents Problem Scenario Existing Anonymity Schemes Existing Anonymity Schemes T or Crowds Rumor Riding


slide-1
SLIDE 1

Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems

Narrated by Christo Wilson

slide-2
SLIDE 2

Table of Contents Table of Contents

Problem Scenario Existing Anonymity Schemes Existing Anonymity Schemes

T

  • r

Crowds

Rumor Riding

Design Goals Protocol Design Example Analysis Analysis

Practical Considerations Conclusions Conclusions

slide-3
SLIDE 3

Problem Scenario Problem Scenario

You want a copy of that new Justin Timberlake song

T

  • o embarrassed to get it from a store

T

  • o embarrassed to get it from a store

RIAA fueled by devouring human souls

What is needed: Anonymization

y

Existing protocols are unsuitable for P2P

Path-based H

i ht t i l d ti

Heavyweight, asymmetric layered encryption

Proposed solution: Rumor Riding

Non-path based (sort of) Non path based (sort of) Uses Symmetric encryption (mostly)

slide-4
SLIDE 4

Existing Schemes: Existing Schemes:

? Onion Routers Initiator P2P Network Responder

slide-5
SLIDE 5

Existing Schemes: Existing Schemes:

Why not use Tor for P2P?

Designed for client-server architectures Designed for client server architectures

No responder anonymity by default Could be re-architected to fix this deficiency

Asymmetric decryption at every hop Key exchange nightmare Pathing: Pathing:

Construction requires knowledge of many peers Must be persistent for duration of file transfer Paths must be explicitly rebuilt periodically to maintain anonymity

slide-6
SLIDE 6

Existing Schemes: Crowds Existing Schemes: Crowds

? Jondos Initiator P2P Network Responder

slide-7
SLIDE 7

Existing Schemes: Crowds Existing Schemes: Crowds

Why not use Crowds for P2P?

As with T

  • r designed for client-server architectures

As with T

  • r, designed for client server architectures

No responder anonymity by default Could be re-architected to fix this deficiency

Symmetric decryption at every hop provides weaker

anonymity

Still have a key exchange nightmare Still have a key exchange nightmare Pathing:

Must be persistent for duration of file transfer Lack of source-routing provides weaker anonymity

slide-8
SLIDE 8

Rumor Riding: Design Goals Rumor Riding: Design Goals

Provide high degree of initiator and responder anonymity Use symmetric encryption Use symmetric encryption

Do not require extensive key exchanges

Design with attributes of P2P topology in mind: Design with attributes of P2P topology in mind:

Do not require any explicit path construction Require as little path-persistence as possible

slide-9
SLIDE 9

Rumor Riding: Protocol Design Rumor Riding: Protocol Design

Every message split into two pieces: encrypted data and

key

Symmetric encryption (AES, 128-bit) Each piece called a rumor

D t

d k h f d d t diff t i hb

Data and key each forwarded to different neighbors

Rumors continue travelling outward in a random walk

Nodes maintain rumor caches

Rumors constantly checked for pairings (collisions) Collisions identified using CRC check

N d hi h id if lli i b

Nodes which identify rumor collisions become sowers

Act as the proxy for the initiator

slide-10
SLIDE 10

Rumor Riding: Protocol Design Rumor Riding: Protocol Design

Conversations encrypted with public keys

Initial query and response include initiator and responders keys Initial query and response include initiator and responders keys 1024-bit RSA prevents eavesdropping on conversations

Rumor convergence is controlled

g

Rumors can be issued in multiples Each rumor has an adjustable TTL

slide-11
SLIDE 11

Rumor Riding: Example Rumor Riding: Example

Potential Sowers ? ? P2P N k Initiator P2P Network Potential Sowers Responder Potential Sowers

slide-12
SLIDE 12

Rumor Riding: Analysis Rumor Riding: Analysis

Resilient to attack

Forwarding provides Crowds-like plausible deniability Forwarding provides Crowds like plausible deniability Separating paired rumors makes local eavesdropping difficult End-to-end public key encryption prevents man-in-the-middle

attacks

Random walks prevent timing attacks and traffic analysis

slide-13
SLIDE 13

Rumor Riding: Analysis Rumor Riding: Analysis

Potential Sowers P2P N k Initiator P2P Network Potential Sowers Responder Potential Sowers

slide-14
SLIDE 14

Rumor Riding: Analysis Rumor Riding: Analysis

Trace driven simulation

1 000 to 100 000 node Gnutella-like network 1,000 to 100,000 node Gnutella like network 600 second mean node lifetime

Theoretical vs. Simulated rumor collision rates:

slide-15
SLIDE 15

Practical Considerations Practical Considerations

O(n) processing overhead

Every incoming rumor must be decrypted and CRCed against entire

cache contents

Static RSA key pairs enables correlative attacks

Compromised initiators and/or responders can track remote hosts

p p individually, uniquely

Duplication of effort, non-unique search query results

Queries are usually controlled floods Queries are usually controlled floods K-Rumors can result in K sowers issuing queries Each query may elicit identical responses

Fil h ki i h i

File chunking necessitates return path persistence or constant

production of new rumors

Payload rumors in multiple may result in duplicates at receiver

slide-16
SLIDE 16

Practical Considerations Practical Considerations

Small-world networks significantly compromise anonymity

Compromised super-nodes can potentially allow statistical Compromised super nodes can potentially allow statistical

ascertain of initiators/responders

Rumor collision distance inversely related to collision rate

slide-17
SLIDE 17

Practical Considerations Practical Considerations

Latency

Numbers are way higher Numbers are way higher

than cumulative latencies for path-based protocols Thi li fil f

This applies to file transfers

too, not just queries!

slide-18
SLIDE 18

Conclusions Conclusions

Novel protocol design

Surprising that any random walk based protocol even works

p g y p

Decent anonymity Integrates well with P2P network topologies

T

d i i l ti h l f ibilit

Trace driven simulations help prove feasibility Promises of low overhead and no-pathing are overblown High latency and rumor generation overhead may hinder High latency and rumor generation overhead may hinder

large file transfers

Seems geared toward Gnutella-like P2P protocols

Would be more useful/applicable if it worked for T

  • rrents
slide-19
SLIDE 19

Questions? Questions?

No, I don’t have any Justin Timberlake for you.