SlideShare uma empresa Scribd logo
1 de 32
A Technical Seminar on




                         1
• Anonymizing Peer-to-Peer(P2P) systems is essential to mask the
  identities of the users for the privacy consideration.

• They are mainly of 2 types
   ─ Path based
   ─ Non-path based

• Rumor Riding is an example for non-path –based mutual
  anonymity protocol for decentralized P2P systems.

• RR uses the symmetric cryptographic algorithms.




                                                                   2
•   Fully utilizes the resource of the whole system.

•   Peers are both clients and servers in an overlay network.

•   There are mainly 2 types of P2P systems
    Structured P2P systems
    Unstructured P2P systems

•   In structured P2P networks, peers are organized following
    specific criteria and algorithms, which lead to overlays with
    specific topologies and properties.

•   Unstructured P2P networks do not impose any structure on
    the overlay networks.

                                                                    3
• Unstructured P2P systems are of 3 types:
  Centralized
  Decentralized
  Hybrid
• Anonymity is the state of being indistinguishable from other
  members of some group.

• In terms of the computer community, the anonymity requirement
  is especially important for those users who want to protect their
  personal, private, and sensitive information, such as the user
  name, ID, and IP address, during communication with others.

• Not trying to protect content of message.

• Anonymity can be

   ─ Path-based
   ─ Non-path-based
• Anonymous paths has to be pre-constructed.

• Uses RSA algorithm.

• Both the peer collection and content encryption introduce
  high costs.
•   No need to collect public keys for pre-construct a “secured
    path”.

•   Changing delivery paths often.

•   Eliminating path maintenance overhead.

•   Used AES cryptographic algorithm.

•   Reduce cryptographic overhead for the Initiator, Responder
    and Middle nodes
• Rumor Riding is a lightweight and non-path-based mutual
  anonymity protocol for P2P systems.

• Rumor Riding includes five major components:

  1. Rumor Generation and Recovery.
  2. Query Issuance.
  3. Query Response.
  4. Query Confirm.
  5. File Delivery.
1. Rumor Generation and Recovery
sower sa




                                      Responder
       Initiator I




               Flooding   Key rumor
Cipher rumor
sower sa


                                                                Responder

                                                                  IPsa
                Initiator I       sower sb IPs Re
                                              b




Response cipher                               Response key
    rumor             TCP Link                   rumor
   Reversed path of
    cipher rumor                         Reversed Path of key
                                               rumor
sower sc




                                                               Responder

                                             sower sb
                     Initiator I




Reversed path of response    TCP Link   Reversed path of response
      cipher rumor                             key rumor
    Confirm cipher                          Confirm key
        rumor                                   rumor
sower sc




                                                  Responder

             Initiator I               sower sd




Data rumor           TCP Link    Data rumor
Multiple Rumor Riding

•In RR, an initiator can issue multiple rumors in the query cycle. This
scheme is denoted as (i, j)-RR, which issues i cipher rumors and j key
rumors.

•Advantage of the multiple rumors is that RR can be more reliable as
more sowers can serve the query.
Rumor TTL

•The adaptive TTL determination of RR has two phases:
       (a) setting initial TTL value.
       (b) adaptively adjusting TTL.


Rumor Cache

•Storage overhead is related to the speed of query generation.
Ex: Each peer normally issues no more than 0.3 queries per minute
on average.

•FIFO schemes are used to handle cache overflow.
1. Sower Distribution and Collision Rate

•   P2P systems mainly utilize three communication patterns to
    deliver messages: flooding, random walk, and end-to-end
    delivery.

•   Collision distance may be defined as the number of hops present
    in the shortest path between the initiator and the sower.

•   If this collision distance is sufficiently large then receivers are
    randomly distributed in the network.
1. Anonymity model


   a) Anonymity set
   b) Mutual information system
2. Attacks

•Suppose network has m adversary nodes then probability of peer being
an adversary is m/n.


        Collaborating attack      Withstands attacks

        Timing attack             Withstands attacks

        Traceback attack          Withstands attack

        Predecessor attack        Withstands attacks

        Traffic analysis attack   Withstands attacks
Collaborating attack




 Collaborating attack versus RR.
 (a) Collaborating attack.
 (b) Selective flooding of sowers.
1.Collision rate
          To verify the theoretical results . we examine the distribution of
   collision rate with real traces. Besides the verification, we also use the
   results to guide the selection of rumor parameters.

2.Collision distance
        A longer collision distance often means a higher anonymity level,
   but also increases the delay of a query as well as the traffic overhead.
   On the other hand, the collision distance must be sufficiently large to
   guarantee sower diversity.

3.Sower diversity
        The metric reflects the distribution of sower locations in the P2P
   systems. Evenly random distribution of sower location leads to a higher
   anonymity degree.
4.Number of sowers
          Since each sower implements a selective flooding search for an
   initiator, too many sowers will incur a large number of replicated query
   messages, and too few sowers will result in failure on providing enough
   redundancy and reliability.

5.Traffic overhead
        The amount of traffic overhead represents the comprehensive
   latency in data delivery and bandwidth

6.Response time
          In P2P systems, it is defined as the time elapsed from when a query
   is issued to when the first response arrives.

7.Crypto latency
       The overhead incurred by the main cryptographic algorithms
•    Employing a random walk concept, RR issues key rumors and cipher
    rumors separately, and expects that they meet in some random peers.


•   Various attacks defended by RR is also considered.


•   This protocol can be even extended in other distributed systems, such
    as grid systems and ad-hoc networks.
REFERENCES
[1] Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems Yunhao Liu, Senior
Member, IEEE, Jinsong Han, Member, IEEE, and Jilong Wang, Member, IEEE, VOL. 22,
NO. 3, MARCH 2011.

[2] Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks Li
Xiao, Member, IEEE, ZhichenXu, Member, IEEE, and Xiaodong Zhang, Senior Member,
IEEE, VOL. 14, NO. 9, SEPTEMBER 2003.

[3] Rumor Riding: A Protocol for Providing Anonymity Harish A, Veerapandian N
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307,
Volume-1, Issue-ETIC2011, January 2012.

[4] JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 23(4): 660{671 July 2008
Survey on Anonymity in Unstructured Peer-to-Peer Systems Ren-Yi Xiao.

[5] http://en.wikipedia.org/wiki/Peer-to-peer.
Thank you…




             32

Mais conteúdo relacionado

Mais procurados

CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2Irsandi Hasan
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP ModelTapan Khilar
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceEr. Shiva K. Shrestha
 
Concurrency Conrol
Concurrency ConrolConcurrency Conrol
Concurrency Conrollubna19
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication ProtocolsTrinity Dwarka
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3Rahul Hada
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshellFrank Kelly
 
RPC communication,thread and processes
RPC communication,thread and processesRPC communication,thread and processes
RPC communication,thread and processesshraddha mane
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 

Mais procurados (20)

CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
What is TLS/SSL?
What is TLS/SSL? What is TLS/SSL?
What is TLS/SSL?
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
 
Concurrency Conrol
Concurrency ConrolConcurrency Conrol
Concurrency Conrol
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
DCCN Unit 1.pdf
DCCN Unit 1.pdfDCCN Unit 1.pdf
DCCN Unit 1.pdf
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
Ryu sdn framework
Ryu sdn framework Ryu sdn framework
Ryu sdn framework
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
 
Computer networks chapter1
Computer networks chapter1Computer networks chapter1
Computer networks chapter1
 
RPC communication,thread and processes
RPC communication,thread and processesRPC communication,thread and processes
RPC communication,thread and processes
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 

Semelhante a Rumor riding

Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slideschintaan
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramFRSecure
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017FRSecure
 
Cryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic networkCryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic networkShahana P H
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AAKASH S
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51martinvoelk
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensicsAnpumathews
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
computer-networks-class-xii-part-2-eng.pdf
computer-networks-class-xii-part-2-eng.pdfcomputer-networks-class-xii-part-2-eng.pdf
computer-networks-class-xii-part-2-eng.pdfSangeethManojKumar
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijripublishers Ijri
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 

Semelhante a Rumor riding (20)

Anon p2p slides
Anon p2p slidesAnon p2p slides
Anon p2p slides
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
 
IP spoofing .pptx
IP spoofing .pptxIP spoofing .pptx
IP spoofing .pptx
 
Cryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic networkCryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic network
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Onion Routing.ppt
Onion Routing.pptOnion Routing.ppt
Onion Routing.ppt
 
computer-networks-class-xii-part-2-eng.pdf
computer-networks-class-xii-part-2-eng.pdfcomputer-networks-class-xii-part-2-eng.pdf
computer-networks-class-xii-part-2-eng.pdf
 
The Onion Routing (TOR)
The Onion Routing (TOR)The Onion Routing (TOR)
The Onion Routing (TOR)
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P SystemNon Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
 
ch07.ppt
ch07.pptch07.ppt
ch07.ppt
 

Último

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Último (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Rumor riding

  • 2. • Anonymizing Peer-to-Peer(P2P) systems is essential to mask the identities of the users for the privacy consideration. • They are mainly of 2 types ─ Path based ─ Non-path based • Rumor Riding is an example for non-path –based mutual anonymity protocol for decentralized P2P systems. • RR uses the symmetric cryptographic algorithms. 2
  • 3. Fully utilizes the resource of the whole system. • Peers are both clients and servers in an overlay network. • There are mainly 2 types of P2P systems Structured P2P systems Unstructured P2P systems • In structured P2P networks, peers are organized following specific criteria and algorithms, which lead to overlays with specific topologies and properties. • Unstructured P2P networks do not impose any structure on the overlay networks. 3
  • 4. • Unstructured P2P systems are of 3 types: Centralized Decentralized Hybrid
  • 5. • Anonymity is the state of being indistinguishable from other members of some group. • In terms of the computer community, the anonymity requirement is especially important for those users who want to protect their personal, private, and sensitive information, such as the user name, ID, and IP address, during communication with others. • Not trying to protect content of message. • Anonymity can be ─ Path-based ─ Non-path-based
  • 6. • Anonymous paths has to be pre-constructed. • Uses RSA algorithm. • Both the peer collection and content encryption introduce high costs.
  • 7. No need to collect public keys for pre-construct a “secured path”. • Changing delivery paths often. • Eliminating path maintenance overhead. • Used AES cryptographic algorithm. • Reduce cryptographic overhead for the Initiator, Responder and Middle nodes
  • 8.
  • 9. • Rumor Riding is a lightweight and non-path-based mutual anonymity protocol for P2P systems. • Rumor Riding includes five major components: 1. Rumor Generation and Recovery. 2. Query Issuance. 3. Query Response. 4. Query Confirm. 5. File Delivery.
  • 10. 1. Rumor Generation and Recovery
  • 11.
  • 12. sower sa Responder Initiator I Flooding Key rumor Cipher rumor
  • 13.
  • 14.
  • 15. sower sa Responder IPsa Initiator I sower sb IPs Re b Response cipher Response key rumor TCP Link rumor Reversed path of cipher rumor Reversed Path of key rumor
  • 16.
  • 17. sower sc Responder sower sb Initiator I Reversed path of response TCP Link Reversed path of response cipher rumor key rumor Confirm cipher Confirm key rumor rumor
  • 18.
  • 19. sower sc Responder Initiator I sower sd Data rumor TCP Link Data rumor
  • 20. Multiple Rumor Riding •In RR, an initiator can issue multiple rumors in the query cycle. This scheme is denoted as (i, j)-RR, which issues i cipher rumors and j key rumors. •Advantage of the multiple rumors is that RR can be more reliable as more sowers can serve the query.
  • 21. Rumor TTL •The adaptive TTL determination of RR has two phases: (a) setting initial TTL value. (b) adaptively adjusting TTL. Rumor Cache •Storage overhead is related to the speed of query generation. Ex: Each peer normally issues no more than 0.3 queries per minute on average. •FIFO schemes are used to handle cache overflow.
  • 22. 1. Sower Distribution and Collision Rate • P2P systems mainly utilize three communication patterns to deliver messages: flooding, random walk, and end-to-end delivery. • Collision distance may be defined as the number of hops present in the shortest path between the initiator and the sower. • If this collision distance is sufficiently large then receivers are randomly distributed in the network.
  • 23.
  • 24.
  • 25. 1. Anonymity model a) Anonymity set b) Mutual information system
  • 26. 2. Attacks •Suppose network has m adversary nodes then probability of peer being an adversary is m/n. Collaborating attack Withstands attacks Timing attack Withstands attacks Traceback attack Withstands attack Predecessor attack Withstands attacks Traffic analysis attack Withstands attacks
  • 27. Collaborating attack Collaborating attack versus RR. (a) Collaborating attack. (b) Selective flooding of sowers.
  • 28. 1.Collision rate To verify the theoretical results . we examine the distribution of collision rate with real traces. Besides the verification, we also use the results to guide the selection of rumor parameters. 2.Collision distance A longer collision distance often means a higher anonymity level, but also increases the delay of a query as well as the traffic overhead. On the other hand, the collision distance must be sufficiently large to guarantee sower diversity. 3.Sower diversity The metric reflects the distribution of sower locations in the P2P systems. Evenly random distribution of sower location leads to a higher anonymity degree.
  • 29. 4.Number of sowers Since each sower implements a selective flooding search for an initiator, too many sowers will incur a large number of replicated query messages, and too few sowers will result in failure on providing enough redundancy and reliability. 5.Traffic overhead The amount of traffic overhead represents the comprehensive latency in data delivery and bandwidth 6.Response time In P2P systems, it is defined as the time elapsed from when a query is issued to when the first response arrives. 7.Crypto latency The overhead incurred by the main cryptographic algorithms
  • 30. Employing a random walk concept, RR issues key rumors and cipher rumors separately, and expects that they meet in some random peers. • Various attacks defended by RR is also considered. • This protocol can be even extended in other distributed systems, such as grid systems and ad-hoc networks.
  • 31. REFERENCES [1] Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems Yunhao Liu, Senior Member, IEEE, Jinsong Han, Member, IEEE, and Jilong Wang, Member, IEEE, VOL. 22, NO. 3, MARCH 2011. [2] Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks Li Xiao, Member, IEEE, ZhichenXu, Member, IEEE, and Xiaodong Zhang, Senior Member, IEEE, VOL. 14, NO. 9, SEPTEMBER 2003. [3] Rumor Riding: A Protocol for Providing Anonymity Harish A, Veerapandian N International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-ETIC2011, January 2012. [4] JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 23(4): 660{671 July 2008 Survey on Anonymity in Unstructured Peer-to-Peer Systems Ren-Yi Xiao. [5] http://en.wikipedia.org/wiki/Peer-to-peer.

Notas do Editor

  1. Let ’ s first take a look at what is the Peer-to-peer model. Peer to peer mode is aiming to fully utilize the resource of the whole system. basically, peer are both clients and servers, and build an overlay p2p network. Our research will focus on the unstructured P2P architecture. the peers in the unstructured p2p systems are interconnected in an adhoc way. The unstructured p2p systems can be divided into 3 categories: the centralized, decentralized and hybrid. Centralize unstructured p2p uses a central server to perform the query service. Each node uploads the resource list, and sends query to the server, the server give them the ip address of responders, and peer download the target from a desired responder. Single point failure Decentralize unstructured p2p get rid of central server. User can use a so `call route search and direct download machnism to retrieve the object. I will talk it later. Hybrid p2p systems combine these two models. Some super peer interconnect each other in a decentralized way, and a super node and a group of normal nodes connected in a centralized way. Thus, the hybrid model improves the system efficiency.