Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf

Size: px
Start display at page:

Download "Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf"

Transcription

1 Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf

2 Peer-to-Peer Systems Chapter 13 Online Social Networks Introduction to Online Social Networks Safebook P2P Framework for Social Networks This slide set is partially based on the lecture Peer-to-Peer Networks" of Prof. Dr. Thorsten Strufe at TU Darmstadt

3 Facebook, Twitter & Co. (Online Social Networks) Online Social Networks (Social Networking Services) web-based services that allow individuals to construct a public or semi-public profile within a bounded system, articulate a list of other users with whom they share a connection, and view and traverse their list of connections and those made by others within the system. Is this really all? the communication of participants through message exchange, commenting on the profiles of others (or previous interactions, e.g. in recommendations), which merely is a message exchange with the aim to annotate the addressed profile, and the wealth of applications (starting from simple ``poking'' mechanisms to a variety of ``gift'' and ``likeness'' applications for interactions between users) Source1: Boyd et al.: Social Network Sites Source2: Cutillo et al.: Privacy Preserving Social Networking through Decentralization 3

4 Online Social Networks Simplified, walled-garden version of the Web : Easy to set-up pages ( profiles ) of individuals ( and companies ) Links reflecting real-world relations between individuals Possibility to share user generated content including messaging Guest book / Wall (asynchronous broadcast) (asynchronous unicast) Chat (~ synchronous unicast) Collaborative applications / games Different target audience / application domain Private and personal OSN Public and professional OSN (business-oriented) 4

5 Target Audience and Domain Professional business services Private and personal services Niche/tailored services Micro blogging : Twitter Business trips and meeting service: Dopplr, TripIT Location-based achievement systems: foursquare, gowalla Slide based on lecture slides of Prof. Dr. Thorsten Strufe, TU Darmstadt, Peer -to-peer Networks, WS

6 Why Bother? 6

7 Goals and Motivations of Users and Providers Users want Storing / searching for content Profiles, friend lists, Pictures, shared Wall editing, User to user interaction Chatting, VoIP, Games Security Access control on their data Secure, confidential communication à Fun! System providers want High profit Many users Personalized advertisements Low operational costs For servers, electricity, cooling For personnel, legal issues Controlled Quality of Service To attract and keep users Providing reliable, high quality services à Money! 7

8 Security Objectives in OSNs Availability Of data and services Robust against censorship But you do not want to have childporn profile pictures Prevent from seizure or hijacking of identities Privacy / Confidentiality Users want to define access control rights on Personal information Communication traces Possibility to hide any data about any user Integrity Protect user data from unauthorized modification and tampering Ensure the link between OSN accounts and people 8

9 Generalized Architectural Model of SNS Distributed Environment Main SNS centralized Additional 3rd party application servers 9

10 Centrally hosted SNS Web-based solution Centrally hosted data Benefits for the provider Data used for marketing Issues Costs / scalability Trust in provider You cannot delete your account, only deactivate (Facebook) Limited application scope No real user-to-user interaction Wide community focus Must share information with the world Although only meant for family» Google+ addresses this with circles 10

11 Quest to Decentralize Issues of centralized architectures Centralized control Centralized data storage Full, centralized access to data Single Point of Failure ( and the legendary twitter whale) Taking back the web Breaking out of the walled gardens (again, cf. AOL) Re-democratizing the web Distribute the services! 11

12 Peer-to-Peer Systems Online Social Networks Decentralized Approaches for OSN This slide set is partially based on the lecture Peer-to-Peer Networks" of Prof. Dr. Thorsten Strufe at TU Darmstadt

13 Plethora P2P / Decentralized Social Services Free and open source software Diaspora, BuddyPress, CrabGrass, Cobs, DaisyChain, Diki, Elgg, FETHR, GNUNet, Gossple, Jappix, Lorea, Mycella, Movim, PeerScape, Pinax, StatusNet Academia Friend-of-a-Friend, FriendStore, HelloWorld, LifeSocial, LotusNet (Likir), PeerSon, Safebook, SocialCircle, Tribler, vis-à-vis, wuala, LifeSocial Focus on systems that implement social networking and publication functions Provide running software or a comprehensive protocol / system description Actually are decentralized 13

14 Decentralized Social Networking Approaches Centralized Idea: host your own OSN Social networks: BuddyPress, CrabGrass Federation of webservers Idea: link (private) webservers via standard protocols Social networks: Diaspora, Hello World Network, Fethr (Twitter), Diki 14

15 Decentralized Social Networking Approaches Centralized index, Storage on clients Idea: server manages index of users, storage of users is used Social networks: Daisychain, COBS, Gossple P2P-based social networks Idea: client devices form p2p network to store and find data Social networks: LibreSocial Motivated through: CPU power & bandwidth grow Privacy - awareness 15

16 1.2 Decentralized Social Networking Approaches Centralized Idea: host your own OSN Social networks: BuddyPress, CrabGrass Federation of (private) webservers Idea: link (private) webservers via standard protocols (FOAF, XMPP, PSYC) Social networks: Diaspora, Hello World Network, Fethr (Twitter), Diki Centralized index, storage on clients Idea: server manages index of users, storage of users is used Social networks: Daisychain, COBS, Gossple P2P applications with social aspects Idea: add to traditional p2p applications social aspects Social networks: Tribler, Wuala P2P-based social networks 16

17 Some Words on these Solutions Friend-of-a-Friend Data-centric, similar to yellow pages Federation of private webservers Store your data on your own / trusted friends webserver BUT: do you have a webserver? No real user-user interaction HelloWorld Network Won a startup prize Not existent anymore Diaspora Great marketing, $ for a promise Buggy and bad code Similar to Friend-of-a-Friend Now ~ users 17

18 Challenges for P2P OSN Let s use P2P to increase privacy in OSN! How could we proceed? Which challenges are we about to encounter? Performance Properties: P2P à filesharing! OSN: small, short lived objects Extreme heterogeneity (friends, uploaded content, resources) User behaviour / sessions (diurnal patterns, session- and inter session times) Incentives Mobile users vs. p2p / recursive routing, etc Security How can we guarantee availability? How do you search for somebody? Key management!? Identification services (we don t want fake accounts!) 18

19 Requirements for a (DHT-based) OSN Functionality Like Facebook Extendible through apps / plugins Different to typical p2p applications à Platform to host a wide set of applications General platform Core functionality as a basis Communication patterns? Extendible out of the box App-functionality, app-market? Data access patterns Read: Independent whether friends are online Write: create new content Update: update previous data Consistently for all copies of the data Delete: securely remove data Community-enforced deletion of illegal content 19

20 Requirements for a (DHT-based) OSN Suitable distributed data structures Security Supporting a wide range of apps Heterogeneous peer capacities and data access patterns Root of trust, user authentication Confidential, integer, auth. communication Access control: read/write/delete rights How to address attackers? Controlled Quality of Service Guarantees on system behavior? Response time, availability Self-adaptive behavior Several hands-on challenges How to implement Various search mechanisms Bootstrapping, NAT-handling An extendible graphical user interface 20

21 Peer-to-Peer Systems Online Social Networks Safebook This slide set is partially based on the lecture Peer-to-Peer Networks" of Jun.-Prof. Dr. Thorsten Strufe at TU Darmstadt

22 Safebook Developed at Eurecom & TU- Darmstadt Main idea: Use only friends in overlay Social topology Results in some security Main issue: Performance Requires large friend base per user 22

23 Design Principles Decentralization - P2P architecture Cooperation enforcement - Friends cooperate Leveraging existing Trust - Social trust trusted link - Friend = neighbor Privacy - Simple anonymous routing - Based on trusted links - Group Encryption 23

24 Architecture 3 Trusted ID System ID Management Contrast 1 Matryoshka Data storage Cooperation Communication with privacy 2 Peer- to- peer dht Lookup Different views of the network 24

25 Network View Social network overlay Trusted ID user id Peer to peer node id ip address 25

26 User i s Matryoshka Entry nodes Outer shell k e a Trust relabonship for i c s friend Inner shell i c d j b i s node d friend of c c friend of i d friend of i l f Trust relabonship for c User i s friends: store i s encrypted profile data End to end privacy based on hop by hop trust 26

27 Finding it, using P2P: a looks for b a e a b s profile req. DHT hash(b s afribute) e d c b s outer shell nodes b s profile d c b k f b s outer shell: h(b), e h(b), f lookup a looks for b s entry nodes k provides b s outer shell nodes data request a sends profile data request to a b s entry node Data reply One of b s inner shell nodes answers 27

28 Role of P2P system x Hop- by- hop trust User 1 u Node Privacy Hide requester s id Hide ids identities Hide requests statistics Integrity No msg forging No id manipulation H(User2) List of entrypoints Availability No DOS P2P system Tradeoff y Entrypoint z Performance Low Delays Lookup key redundancy v Mirror User 2 User2 s Matryoshka 28

29 Evaluation of the scheme (1) Privacy Friendship relations hidden through Matryoshkas Untraceability through pseudonymity and anonymous routing Cloning prevention Dos prevention Access control Availability ID management Key management Data replication at friends nodes 29

30 Performance - Reachability Number of contacts in the inner shell 80 to 250+ contacts required to be reachable at 90% with 3 or 4 hops 30% online probability (Skype data) Too many contacts? 30

31 Performance Reachability Incr. Spanning Ratio Number of contacts in the inner shell 30% online probability (Skype data) 15 to 25 contacts required to be reachable at 90% with 3 or 4 hops 31

32 Performance - Delay Further 1 st Lookup Lookups delay delay CDF CDF for a for 4 shell a 4 shell matryoshka matryoshka (*) (*) 90 th percentile: 90 th percentile: 5,42 s 13,49 s Total data lookup Bme: T dl = T DHT + T Mat Median: Median: 1,73 s 8,04 s Further lookups: T DHT =0 thanks to caching Average: 9,17 2,71 s Time [ms] (*) Data computed by applying the Monte Carlo sampling technique on single hop delay measurements and on delay measurement for a successful DHT key lookup in KAD (Biersack..) 32

33 Summary on Safebook P2P topology matches social topology Social storage, security through trust relations Some critical remarks Performance may be an issue Onion routing of messages Delay: median 1.73s, average 2.71s à in real life probably more Bandwidth: Retrieval of a 100kb picture à generates a multitude of load + delay Bootstrapping problems How to handle users with only few friends? Where to store data if friends are offline? Security issues Do you trust your friends? Conclusion Very interesting attempt, hopefully successful soon 2012: Sold to a startup 33

LifeSocial A P2P-based Online Social Network

LifeSocial A P2P-based Online Social Network LifeSocial A P2P-based Online Social Network Project Group A Distributed Framework for Social Networks www.p2pframework.com UPB SS2011 PG-Framework Lecture-05 LifeSocial-a-P2P-based-OSN.ppt Dr.-Ing. Kalman

More information

Distributed Framework for Social Networks

Distributed Framework for Social Networks Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi graffi@mail.upb.de Tel. +49 5251 606730 Fachgebiet Multimedia Kommunikation Prof. Dr. Christian Scheideler Fakultät für Elektrotechnik,

More information

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Organizational Information Organisational matters Lecturer Jun.-Prof.

More information

Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust

Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust 1 Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust Leucio Antonio Cutillo Refik Molva Thorsten Strufe Institut Eurécom Sophia Antipolis France {cutillo, molva}@eurecom.fr

More information

Decentralizing Social Networking Services

Decentralizing Social Networking Services Decentralizing Social Networking Services Thomas Paul, Sonja Buchegger, Thorsten Strufe Abstract Online Social Networks (OSN) of today represent centralized repositories of personally idenfiable information

More information

Resilient Networks. 00. Preliminaries. Who is who. Organizational Issues. P2P, TK What do we do. Exercise course Rough time line Examination

Resilient Networks. 00. Preliminaries. Who is who. Organizational Issues. P2P, TK What do we do. Exercise course Rough time line Examination Resilient Networks 00. Preliminaries Who is who P2P, TK What do we do Organizational Issues Exercise course Rough time line Examination 23.04.2013 Fachbereich Informatik P2P Group and Telecooperation Group

More information

Decentralized Online Social Networks

Decentralized Online Social Networks Decentralized Online Social Networks Anwitaman Datta 1,SonjaBuchegger 2,LeHungVu 3,ThorstenStrufe 4,and Krzysztof Rzadca 1 2 1 NTU Singapore, anwitaman@ntu.edu.sg, krzadca@gmail.com Royal Institute of

More information

A taxonomy of decentralized online social networks

A taxonomy of decentralized online social networks DOI 10.1007/s12083-014-0258-2 A taxonomy of decentralized online social networks Shihabur Rahman Chowdhury Arup Raton Roy Maheen Shaikh Khuzaima Daudjee Received: 27 January 2013 / Accepted: 27 February

More information

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer

More information

P2P Characteristics and Applications

P2P Characteristics and Applications P2P Characteristics and Applications Lecture for the Project Group A Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi Email: graffi@mail.upb.de Fachgruppe Theorie verteilter Systeme Fakultät

More information

Measurement Study of Wuala, a Distributed Social Storage Service

Measurement Study of Wuala, a Distributed Social Storage Service Measurement Study of Wuala, a Distributed Social Storage Service Thomas Mager - Master Thesis Advisors: Prof. Ernst Biersack Prof. Thorsten Strufe Prof. Pietro Michiardi Illustration: Maxim Malevich 15.12.2010

More information

SANE: A Protection Architecture For Enterprise Networks

SANE: A Protection Architecture For Enterprise Networks Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS

More information

Online Social Networks and Network Layers

Online Social Networks and Network Layers Online Social Networks and Network Layers Lecture for the Project Group A Distributed Framework for Social Networks UPB SS2011 PG-Framework Lecture-01 Online-Social-Networks-Network-Layer.ppt Dr.-Ing.

More information

LotusNet: tunable privacy for distributed online social network services

LotusNet: tunable privacy for distributed online social network services LotusNet: tunable privacy for distributed online social network services Luca Maria Aiello, Giancarlo Ruffo Computer Science Department - Università degli Studi di Torino Corso Svizzera 185, 10149 Turin,

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

Peer-to-Peer Systems: "A Shared Social Network"

Peer-to-Peer Systems: A Shared Social Network Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program

More information

Peer-to-Peer Networks Organization and Introduction 1st Week

Peer-to-Peer Networks Organization and Introduction 1st Week Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/

More information

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM

LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,

More information

Lawful Interception in P2Pbased

Lawful Interception in P2Pbased Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.

More information

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Internet Architecture for Robust Mobility Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Contents Introduction IETF Activity Home Agent Reliability Protocol P2P-based Approaches ROAM and SAMP

More information

Network Security. Chapter 14. Security Aspects of Mobile Communications

Network Security. Chapter 14. Security Aspects of Mobile Communications Network Security Chapter 14 Security Aspects of Mobile Communications Network Security (WS 2002): 14 Security Aspects of Mobile Communications 1 Security Aspects of Mobile Communication Mobile communication

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION

DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION Yoonho Nam, Changhoon Lee, Youngman Jung, Woongryul Jeon and Dongho Won Information Security Group, Sungkyunkwan

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014 Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Skype characteristics

Skype characteristics Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications

More information

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

How To Make A Network Overlay More Efficient

How To Make A Network Overlay More Efficient Corporate Technology Service Layer Components for Resource Management in Distributed Applications Fabian Stäber Siemens Corporate Technology, Information and Communications Copyright Siemens AG 2007. Alle

More information

Distributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service. Tien Dat Le

Distributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service. Tien Dat Le Distributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service Tien Dat Le Outline Introduction Contribution Methodology Implementation Evaluation Conclusion Future

More information

Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)

Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing) 1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication

More information

A PEER-TO-PEER ARCHITECTURE FOR SOCIAL NETWORKING APPLICATIONS

A PEER-TO-PEER ARCHITECTURE FOR SOCIAL NETWORKING APPLICATIONS A PEER-TO-PEER ARCHITECTURE FOR SOCIAL NETWORKING APPLICATIONS By PIERRE ST. JUSTE A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Authenticating Out-of-Band Communication Over Social Links

Authenticating Out-of-Band Communication Over Social Links Authenticating Out-of-Band Communication Over Social Links Anirudh Ramachandran and Nick Feamster School of Computer Science, Georgia Tech {avr,feamster}@cc.gatech.edu Motivating Application: Secured Web

More information

Data protection at affilinet

Data protection at affilinet at affilinet Rev. 04/03/2014 at affilinet Content at affilinet 1 1. Collection and processing of personal data and other data when visiting our Web pages 1 2. Collection and processing of our customers

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

N6Lookup( title ) Client

N6Lookup( title ) Client CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

Attacks Against Peer-to-peer Networks and Countermeasures

Attacks Against Peer-to-peer Networks and Countermeasures Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology lwang@cc.hut.fi Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from

More information

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Kick starting science...

Kick starting science... Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep

More information

Healthy P2P Systems Overview

Healthy P2P Systems Overview Monitoring and Management of Peer-to-Peer Systems Project Group A Distributed Framework for Social Networks www.p2pframework.com UPB SS2011 PG-Framework Lecture-04 Monitoring-and-Management.ppt Dr.-Ing.

More information

bcp for a large scale carrier level VoIP system

bcp for a large scale carrier level VoIP system bcp for a large scale carrier level VoIP system using p2psip draft zhang p2psip bcp 04 Yunfei.Zhang Gang.Li Jin.Peng Baohong.He Shihui.Duan Wei.Zhu {zhangyunfei,ligangyf,pengjin}@chinamobile.com {hebaohong,duanshihui,zhuwei}@catr.cn

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

A Reputation Management System in Structured Peer-to-Peer Networks

A Reputation Management System in Structured Peer-to-Peer Networks A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology

More information

Estimating user interaction strength in online networks

Estimating user interaction strength in online networks Delft University of Technology Parallel and Distributed Systems Report Series Estimating user interaction strength in online networks Adele L. Jia, Boudewijn Schoon, Johan A. Pouwelse, Dick H.J. Epema

More information

Data Storage Solutions for Decentralized Online Social Networks

Data Storage Solutions for Decentralized Online Social Networks Data Storage Solutions for Decentralized Online Social Networks Anwitaman Datta S* Aspects of Networked & Distributed Systems (SANDS)! School of Computer Engineering NTU Singapore isocial Summer School,

More information

Unit 3 - Advanced Internet Architectures

Unit 3 - Advanced Internet Architectures Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

CS5412: TIER 2 OVERLAYS

CS5412: TIER 2 OVERLAYS 1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data

More information

Personal Containers: Yurts for Digital Nomads 1

Personal Containers: Yurts for Digital Nomads 1 Personal Containers: Yurts for Digital Nomads 1 Malte Schwarzkopf, Anil Madhavapeddy, Theodore Hong, Richard Mortier University of Cambridge Computer Laboratory 15 JJ Thomson Avenue Cambridge CB3 0FD firstname.lastname@cl.cam.ac.uk

More information

Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking & Distributed Systems

Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking & Distributed Systems Brochure More information from http://www.researchandmarkets.com/reports/2172101/ Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking

More information

Chord - A Distributed Hash Table

Chord - A Distributed Hash Table Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

More information

How To Create A P2P Network

How To Create A P2P Network Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Peer-to-Peer Computing

Peer-to-Peer Computing Quang Hieu Vu Mihai Lupu Beng Chin Ooi Peer-to-Peer Computing Principles and Applications Springer 1 Introduction 1 1.1 Peer-to-Peer Computing 1 1.2 Potential, Benefits, and Applications 3 1.3 Challenges

More information

Cassandra A Decentralized, Structured Storage System

Cassandra A Decentralized, Structured Storage System Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

our darknet and its bright spots building connections for spaces and people

our darknet and its bright spots building connections for spaces and people our darknet and its bright spots building connections for spaces and people Overview Who are we? What are we talking about? Why should you care? Where are we going with this? When can I join? Who are we?

More information

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Challenges of Stopping Illegal Peer-to-Peer File Sharing The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Realizing a Vision Interesting Student Projects

Realizing a Vision Interesting Student Projects Realizing a Vision Interesting Student Projects Do you want to be part of a revolution? We are looking for exceptional students who can help us realize a big vision: a global, distributed storage system

More information

Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001

Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual routing is a software design method used to provide multiple independent routers that share

More information

Software Concepts. Uniprocessor Operating Systems. System software structures. CIS 505: Software Systems Architectures of Distributed Systems

Software Concepts. Uniprocessor Operating Systems. System software structures. CIS 505: Software Systems Architectures of Distributed Systems CIS 505: Software Systems Architectures of Distributed Systems System DOS Software Concepts Description Tightly-coupled operating system for multiprocessors and homogeneous multicomputers Main Goal Hide

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This

More information

JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris

JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris JXTA Overview Mathieu Jan IRISA Rennes Projet Paris Plan Why peer-to-peer (P2P)? Introduction to JXTA Goals Basic concepts Protocols JXTA 2.0 Loosely-Consistent DHT Conclusion 2 Why peer-to-peer (P2P)?

More information

Network Architecture and Topology

Network Architecture and Topology 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end

More information

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz University of California, Berkeley The Problem

More information

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study

Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN

More information

Outline. 15-744: Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture

Outline. 15-744: Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture Outline 15-744: Computer Networking L-15 Future Internet Architecture 2 Motivation and discussion Some proposals: CCN Nebula Mobility First XIA XIA overview AIP Scion 2 NSF Future Internet Architecture

More information

Async: Secure File Synchronization

Async: Secure File Synchronization Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de

More information

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies

More information

Peer-to-peer Cooperative Backup System

Peer-to-peer Cooperative Backup System Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

SoNet Privacy and Replication in Federated Online Social Networks

SoNet Privacy and Replication in Federated Online Social Networks SoNet Privacy and Replication in Federated Online Social Networks Lorenz Schwittmann, Christopher Boelmann, Matthäus Wander, Torben Weis University of Duisburg-Essen Duisburg, Germany wimi@vs.uni-due.de

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Security in Structured P2P Systems

Security in Structured P2P Systems P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in

More information

High Throughput Computing on P2P Networks. Carlos Pérez Miguel carlos.perezm@ehu.es

High Throughput Computing on P2P Networks. Carlos Pérez Miguel carlos.perezm@ehu.es High Throughput Computing on P2P Networks Carlos Pérez Miguel carlos.perezm@ehu.es Overview High Throughput Computing Motivation All things distributed: Peer-to-peer Non structured overlays Structured

More information

Scalable Internet Services and Load Balancing

Scalable Internet Services and Load Balancing Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and

More information

Threats to be considered (1) ERSTE GROUP

Threats to be considered (1) ERSTE GROUP VoIP-Implementation Lessons Learned Philipp Schaumann Erste Group Bank AG Group IT-Security philipp.schaumann@erstegroup.com http://sicherheitskultur.at/ Seite 1 Threats to be considered (1) Eavesdropping

More information

Peer-to-peer (P2P) telephony and communications

Peer-to-peer (P2P) telephony and communications 02jennings/bryan-p36 4/21/06 9:42 AM Page 2 P2P For Communications: Beyond File Sharing Cullen Jennings and David A. Bryan Dr. Cullen Jennings is a Distinguished Engineer with Cisco Systems specializing

More information

RADOS: A Scalable, Reliable Storage Service for Petabyte- scale Storage Clusters

RADOS: A Scalable, Reliable Storage Service for Petabyte- scale Storage Clusters RADOS: A Scalable, Reliable Storage Service for Petabyte- scale Storage Clusters Sage Weil, Andrew Leung, Scott Brandt, Carlos Maltzahn {sage,aleung,scott,carlosm}@cs.ucsc.edu University of California,

More information

Scalable Internet Services and Load Balancing

Scalable Internet Services and Load Balancing Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and

More information

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton

More information

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004. Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support

More information

P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung

P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths

More information

Limitations of Packet Measurement

Limitations of Packet Measurement Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing

More information