LifeSocial A P2P-based Online Social Network
|
|
- Mariah McDowell
- 8 years ago
- Views:
Transcription
1 LifeSocial A P2P-based Online Social Network Project Group A Distributed Framework for Social Networks UPB SS2011 PG-Framework Lecture-05 LifeSocial-a-P2P-based-OSN.ppt Dr.-Ing. Kalman Graffi graffi@mail.upb.de Fachgruppe Theorie verteilter Systeme Fakultät für Elektrotechnik, Informatik und Mathematik Universität Paderborn Fürstenallee 11, D Paderborn, Deutschland Tel , Fax
2 Overview 1 Online Social Networks 2 Motivation for a Peer-to-Peer Approach 2.1 Decentral OSNs 2.2 Safebook 3 LifeSocial 3.1 Requirements for a DHT-based OSN 3.2 Architecture Details of LifeSocial 3.3 LifeSocial Plugin Overview 3.4 Peer and Plugin Communcation Principles 3.5 FreePastry and PAST 3.6 Security 3.7 Practical Distributed Access Control 3.8 Deletion of Data 3.9 Architecture Component: Dispatcher 3.10 Architecture Component: Cache 3.11 Plugin Examples 4 Further Research Challenges Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 2
3 1 Online Social Networks What are Online Social Networks technically? Web-based applications (StudiVZ, Facebook, MySpace, Xing) Provide different services for community members Personal information and photos Events Games Plugin architecture Friends Social interaction Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 3
4 Goals and Motivations Users want System providers want Storing and searching for content Profiles, friend lists, Pictures, shared Wall editing, User to user interaction Chatting, VoIP, Games Security Access control on their data Secure, confidential communication High profit Many users Personalized advertisements Low operational costs For servers, electricity, cooling For personnel, legal issues Controlled Quality of Service To attract and keep users Providing reliable, high quality services Fun! Money! Can the requirements be implemented decentrally? Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 4
5 Centrally hosted OSNs Web-based solution Centrally hosted data Benefits for the provider Data used for marketing Issues Costs / scalability Trust in provider You cannot delete your account, only deactivate (Facebook) Limited application scope No real user-to-user interaction Wide community focus Must share information with the world Although only meant for family Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 5
6 2 Motivation for a Peer-to-Peer Approach Online social networks are very popular Need for decentralization Host your own community and more security Keep control of your data and cooler applications Supporting real-time interaction Server Capacity Consumer PC Capacity (PCs sold since 2008) Resources are available and powerful Can we build a P2P-based online social network? P2P ~ paradigm using only the user devices to create infrastructures Are the public research results useable? Are they combinable? Is the quality still good? Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 6
7 Peer-to-Peer Applications Many legitimate peer-to-peer applications illegal file sharing Source: Above logos copied from the respective web page Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 7
8 2.1 Decentral OSNs Trends Freedom from providers - decentralization Put privacy first - security Distributed OSNs Federation of private webservers Store your data on trusted friends BUT: do you have a webserver? Functionality Friend-of-a-friend Data-centric, similar to yellow pages HelloWorld Not existent anymore Diaspora Great marketing, $ for a promise Buggy and bad code Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 8
9 2.2 Safebook Developed at Eurecom & TU-Darmstadt Main idea: Use only friends in overlay Results in some security Main issue: Performance Requires large friend base per user See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 9
10 3 LifeSocial History Aiming at applicable results in p2p research Some lessons learned Build a running version first Improve later Goal Facebook-like user experience Basis functionality extendible through plugins Data-centric (profiles) and user-to-user (chat,video) interaction BUT: security guarantees Operator view Completely p2p-based BUT: with quality of service control and guarantees Research New application leads to new requirements New requirements to new results See: K. Graffi et al., A Distributed Platform for Multimedia Online Communities, In: Dr.-Ing. IEEE Kalman ISM 08, Graffi, LCN 09, FG P2P 10, Theorie CCNC verteilter 11 Systeme 10
11 User View: Rich Functionality Wide set of functionality Plugin-based application: Profile, Login, Friends, Groups, Mails, Photos, Chat, Whiteboard, Calendar Flexible GUI GUI-Framework like in Eclipse Fast and user-friendly performance See: K. Graffi et al., LifeSocial.KOM: A P2P-based Platform for Secure Online Social Dr.-Ing. Networks, KalmanIn: Graffi, IEEE FG P2P 10, Theorie 2010verteilter Systeme 11
12 Provider View: Monitoring and Management Monitoring and managing global system statistics See: K. Graffi et al., Monitoring and Management of Structured Peer-to-Peer Systems Dr.-Ing. In: IEEE Kalman P2P 09, Graffi, FG Theorie verteilter Systeme 12
13 3.1 Requirements for a DHT-based OSN Functionality Like Facebook Extendible through plugins Different to typical p2p applications Platform to host a wide set of applications General platform Core functionality as a basis Communication patterns? Extendible out of the box App-functionality, app-market? Data access patterns Read: Independent whether friends are online Write: create new content Update: update previous data Consistently for all copies of the data Delete: securely remove data Community-enforced deletion of illegal content See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 13
14 Requirements for a DHT-based OSN Suitable distributed data structures Supporting a wide range of apps Heterogeneous peer capacities and data access patterns Security Root of trust, user authentication Confidential, integer, auth. communication Access control: read/write/delete rights How to address attackers Controlled Quality of Service Guarantees on system behavior? Response time, availability Self-adaptive behavior Several hands-on challenges How to implement Various search mechanisms Bootstrapping, NAT-handling An extendible graphical user interface See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 14
15 3.2 Architecture Details of LifeSocial GUI Framework: Extendable and flexible Provides an interface to the Plugins Plugins: Functionality of online social networks (and more) Easy Plugin-to-Plugin communication Over shared storage Over Plugin ID based messaging Information Cache: Enables the Plugins to reuse the data Hides the asynchronous effects of distributed data storage Monitoring and Management: Provides statistics on system behavior Enables the provider to control the service quality Secure Message Dispatcher: Provides secure, low-delay Plugin-to-Plugin communication Integrate offline messaging feature Secure Storage Dispatcher + access control: Storage and retrieval of data objects (PAST) Replicates data and guarantees their availability Structured Peer-to-Peer Overlay Connects the nodes and enables inter-peer communication Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 15
16 3.3 LifeSocial Plugin Overview Everything is a Plugin Stand-alone applications (apps) Implement OSN functionality (and more) Mandatory or optional Building blocks combinable Communicate over storage messages Traditional OSN functionality Login, Profile, Friends, Groups, Search, Photos, Messages, Chat Extended OSN functionality Multi-chat, Whiteboard, Calendar, Tweets Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 16
17 Plugins Extendability Plugins are OSGI-based See seminar paper Can be loaded on runtime on demand Version updates over the Internet possible Idea: Plugin-Store hosting new Plugins Rapid application development Plugin interfaces are open and combinable Allows for Unix-style reuse of components Core functions and GUI separated Interfaces See upcoming seminar talk OSGi Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 17
18 3.4 Peer and Plugin Communcation Principles Two plugins communicate via messaging Addressing: Peer-ID Routing in DHT Plugin-ID in the Peer Analogous to IP / Port Applications Chatting Playing Streaming Audio Video PluginID PluginID Peer ID Peer ID Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 18
19 Peer and Plugin Communcation Principles Two plugins communicate via storage Common storage in DHT Store under ObjectID Retrieve from ObjectID Applications Profile Personal wall Modifiable friend list Photo album Calendar Peer ID PluginID PluginID Peer ID DHT Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 19
20 3.5 FreePastry and PAST FreePastry based on Pastry, DHT Documents are mapped to peers Every ObjectID has a responsible peer Contacted by document owners and requesters FreePastry routes to responsible peer Add-on PAST manages the data replication Node 1008 queries item 3000 Responsible peer found Principle of ID-based routing Use shortcuts/fingers Responsible for Responsible for Responsible for Plugin-to-Plugin communication PluginID based messaging Send message to PeerID Header information: PluginID Shared storage Distributed storage Additional fine-grained access control Example data object Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 20
21 Building Storage Keys: Two Rules To be able to store/lookup data Associated with a user Use user identifier (user name) To build the storage key To be able to store/lookup data Associated with certain known criteria Use criteria value to build the storage key To avoid key collisions Use Plugin identifiers or/and known keywords to build storage keys Storage key = hash( address + pluginid) Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 21
22 Distributed Linked List Example Photo Plugin: 1. Albums 2. Images Albums contain a collection of images. Distributed Linked List: 1. Every single image is stored separately 2. Album objects hold a list of storage keys of the images 3. An object holds a list of storage keys of the albums High granularity of stored objects Better load balancing of the resources. See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 22
23 Positioning in the Network Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 23
24 PAST - Replication Provides a read / write access Write Object under a specific ObjectID Read Object und ObjectID Replication Automatic replication of data on 5 closest peers in leaf set Observes peer joins/leaves see Key-based Routing (KBR) Interface Adaptation in LifeSocial Modify data (before: write-once) Retrieve data Modify Write under same ObjectID Still some drawbacks! See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 24
25 Deletion of Documents Originally not supported by PAST Approach in LifeSocial Overwrite with tombstone object Tombstone object is replicated Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 25
26 3.6 Security Root of Trust Username and passphrase private key Deduce private/public key at any PC NodeID = UserID = public key Buddy List List of friends s UserIDs Checked if online during login Secure communication Confidential, integer, authenticated Encrypt every message with NodeID (=PubKey) of addressed peer Requirements for access control No unauthorized user can read content Author is authenticated Content integrity can be checked False authorship can be rejected Data objects should be signed Data object must be replicable Replication Multiple storage of the same content Find copy to read Find all copies to write consistently Replication independent of security Efficient mechanisms usable See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 26
27 Used Keys Asymmetric Key pair for signing and encryption 2048 bit RSA-Key serves the purpose Symmetric Needed for item encryption 128 bit AES-Key Storage Local storage for later reusage Java KeyStore secures keys with password Quick access to keys The Public Key Infrastructure User-/NodeId String representation of users public key Enlarge Id-range of FreePastry Public key available for everyone Trust must be obtained individually Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 27
28 Evaluation - Data Overhead Message Increasing message size does not affect overhead Constant overhead because of wrapping class Less than 2 kb acceptable, especially for large messages Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 28
29 Evaluation - Time Overhead Message Encryption and decryption time are independent from message size Most time must be needed for administrative processes Obtaining keys, building CryptedItem Initially obtaining public key from network 300ms! Therefore local storage of public keys unavoidable Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 29
30 1extract 3.7 Practical Distributed Access Control Step 1: PeerID = UserID = PublicKey SharedItem objectid Header 3 [userid A] = Pub User A = f(username, passphrase) Privileged users Payload userids are public keys [userid B] = Pub User B Step 2: wrap symmetric key with public key 4 Attach enc. keys to data object Serialized and encrypted with symmetic key 2 Signed CryptedItem objectid Key list 5 Symmetric Key Encrpyted with Pub User A Byte array containing encrypted SharedItem userid A key A userid B key B userid C key C Signature Symmetric Key Encrpyted with Pub User B See: K. Graffi et al. (Norwegian Information Security Lab) Practical Security in P2P-based Dr.-Ing. Social Kalman Networks, Graffi, FG In: Theorie IEEE LCN 09 verteilter Systeme 30
31 Evaluation - Data Overhead Shared Item Overhead depends on number of privileged users Each additional privileged user causes data overhead of about 413 bytes Comes from added userids and wrapped keys to the key list Much more overhead than in message encryption but acceptable Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 31
32 Evaluation - Time Overhead SharedItem Encryption time rises linear with number of privileged users Key wrapping time per user = 0.36 ms Decryption time constant because only one key has to be unwrapped Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 32
33 3.8 Deletion of Data Deletion is essential To control own data Delete unwanted private data Several approaches feasible Good: Independent of replication Replication can be improved Bindings are to be avoided Idea: Tombstone objects Empty data elements With timestamp Overwrite old data Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 33
34 Deletion of Illegal Content Note: Not implemented in LifeSocial Idea: Community-based decision For a quorum of read-enabled peers Quorum may decide on validity of content (picture) Secured decision: If to delete: Take somehow influence on replication Danger of misuse by attackers Quorum: multicast group SCRIBE: Extension of FreePastry To create and manage multicast groups Allows to send messages to all group members Multicast is also useful for other purposes Group chat Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 34
35 3.9 Architecture Component: Dispatcher Message Dispatcher Sort incoming messages by PluginID Attach appropriate headers to sent messages Storage Dispatcher Handles storage access Decouples from overlay events Asynchronous storage access Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 35
36 3.10 Architecture Component: Cache Information Cache stores Incoming messages (under PluginID) Requested ObjectIDs (under ObjectID) Also for outgoing data/messages Help for Plugins Plugins pick the required objects Anytime as often as needed Like: Cache.get(ObjectID) Instant results Possible states: Available: Object is returned Pending: Object will come soon Lookup process still ongoing Fail: Object not available Timeout occured Plugins may react instantly Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 36
37 3.11 Plugin Examples Profile-Plugin Functions Register (create new profile data) Change a profile field Get profile item Write current profile item Profile Item Created while registration One specific data item Personal information Picture ID of Profile Item Hash of concatenation of Username Profile-Plugin ProfileItemToken Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 37
38 Friends Plugin Friends-Plugin Functions: Send and receive friend requests Based on UserID Queued in open requests list Accept or decline friend request Check for undelivered messages Get friends list item to UserID Friends-List Item ID Hash of concatenation of Username Friend-Plugin FriendsItemToken Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 38
39 Groups Plugin Functions: Create group Join and leave group Send (and receive) messages to all group members They are stored in a specific message queue (for the Groups-Plugin) Check for undelivered messages Show all groups of a user Get Groups-list Item to UserID Show all users of a group Get Groups-Item to Group-ID Group ID Hash of concatenation of Groups-Plugins Group-Name Groups-List ID Hash: Username + Groups-Plugin + GroupsItemToken Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 39
40 Messaging and Chat- Plugin functionality (messaging) Data items: Inbox and Outbox Send message to UserID List of messages Append message in User s inbox Get Inbox Item, get Outbox Item message 1 message 2 Message 3 Check for undelivered messages Delete message entries Offline messaging Approach for undelivered messages Destined to Plugins Put them in Message Queue Peer ID PluginID PluginID Peer ID Peer ID PluginID DHT PluginID Peer ID Retrieve when online again Chat Plugin Functions Send message to UserID:PluginID Specific PluginID to be used Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 40
41 Essential Distributed List Operations Useful, but not implemented in Lifesocial Append list entry Add new entry to a List-Item ListItem identified by ObjectID Add Entry write permission without ability to modify previous entries Useful for messaging, friend lists, group lists Delete list entry Delete previously set entry Previous authorship required Useful for group lists, multicast groups Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 41
42 Screenshots Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 42
43 Screenshots Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 43
44 Screenshots Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 44
45 4 Further Research Challenges No p2p framework as such Limited functionality Untested and incomplete Like in real software projects No clear interfaces But in OSGi: interfaces defined Interfaces unclear Clear separation of functionality Allows to improve individual solutions Allows to build more advanced solutions A good starting point Many components already available It runs and can be tested (in small) Some bugs, but well documented Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 45
46 Challenges: Testing and Monitoring Monitoring and Management Integrated monitoring solution Implement a distributed control loop Self-learning and calibrating How to secure control signals? Integrated testing facility How to test large scale networks What kind of workload to induce? Which metrics to measure? Support for heterogeneity Data access patterns are heterogeneous Peer capacities are heterogeneous Most solutions assume homogeneity Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 46
47 Challenges: Security Storage and replication attacks (Joining) attackers may be responsible for crucial data in DHT Attacks on: read/write/delete Routing challenges Malicious nodes may attack routing Colluding malicious nodes? Compatible with current Routing? Accounting in DHT Introduce accounting and billing for premium services Get money for clicking ads Pay money for using specific apps How to setup a secure distributed approach? Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 47
48 Challenges: Usability and new Plugins Finalization of the framework Which functionality to provide? Functionality to be tested Dummy programs and good documentation New / improved Plugins Showing the power of the framework Best if several basic-functions are combined Example: Wiki? Video-Chat? Game? Graphical user interface General toolset of visualizations How to manage internal information flows? Pull-based, Push-based? Impressive visualization of Plugins Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 48
49 Challenges: Marketing and Licenses Out of the box Usability Easy to install Pre-created set of bundles Licensing issue GUI and Website to follow Corporate Identity Look and feel of the social network Target group-specific: logos, flyers, advertisment Launching of press releases Licensing Which libraries are used? Which one to take for the P2P Framework? Maintenance Proper documentation Website representation / group pictures Community building Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 49
50 Questions?? Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 50
Distributed Framework for Social Networks
Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi graffi@mail.upb.de Tel. +49 5251 606730 Fachgebiet Multimedia Kommunikation Prof. Dr. Christian Scheideler Fakultät für Elektrotechnik,
More informationPeer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Chapter 13 Online Social Networks Introduction to Online Social Networks
More informationOnline Social Networks and Network Layers
Online Social Networks and Network Layers Lecture for the Project Group A Distributed Framework for Social Networks UPB SS2011 PG-Framework Lecture-01 Online-Social-Networks-Network-Layer.ppt Dr.-Ing.
More informationHealthy P2P Systems Overview
Monitoring and Management of Peer-to-Peer Systems Project Group A Distributed Framework for Social Networks www.p2pframework.com UPB SS2011 PG-Framework Lecture-04 Monitoring-and-Management.ppt Dr.-Ing.
More informationFinal Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
More informationP2P Characteristics and Applications
P2P Characteristics and Applications Lecture for the Project Group A Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi Email: graffi@mail.upb.de Fachgruppe Theorie verteilter Systeme Fakultät
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationBit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
More informationProject Group NODES - Offering Dynamics to Emerging Structures www.peerfact.org
PeerfactSim: A Simulation Framework for Peer-to-Peer Systems (and more) Project Group NODES - Offering Dynamics to Emerging Structures www.peerfact.org UPB SS2011 PG-Nodes Lecture-06 P2P-Simulations.ppt
More informationPeer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationVoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
More informationLawful Interception in P2Pbased
Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.
More informationIdentity Theft Protection in Structured Overlays
Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005 Background: Structured Overlays network abstraction IDs, not IPs app level
More informationProblems in Diaspora: A Distributed Social Network
Problems in Diaspora: A Distributed Social Network Yousra Javed yjaved@uncc.edu ABSTRACT Recently, the notion of distributed social network has been introduced to address the limitations of centralized
More informationFacebook Smart Card FB 121211_1800
Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any
More informationE-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationNAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
More informationJournal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
More informationAn apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
More informationRELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
More informationDIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
More informationImplementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
More informationWebmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
More informationNapster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
More informationObject Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationSecurity in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Administration Guide Published: 2010-06-16 SWDT487521-1041691-0616023638-001 Contents 1 Overview: BlackBerry Enterprise
More informationUsing Avaya Flare Experience for Windows
Using Avaya Flare Experience for Windows Release 9.0 Issue 02.01 September 2013 Contents Chapter 1: About Flare Experience... 5 About Flare Experience... 5 Main window... 6 Button descriptions... 10 Chapter
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More informationDistributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service. Tien Dat Le
Distributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service Tien Dat Le Outline Introduction Contribution Methodology Implementation Evaluation Conclusion Future
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationP2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationHigh Throughput Computing on P2P Networks. Carlos Pérez Miguel carlos.perezm@ehu.es
High Throughput Computing on P2P Networks Carlos Pérez Miguel carlos.perezm@ehu.es Overview High Throughput Computing Motivation All things distributed: Peer-to-peer Non structured overlays Structured
More informationA Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
More informationClass Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account
EMAIL Basics Class Outline Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account Part 3 Managing Your Messages Deleting messages The Trash
More informationAloaha Mail and Archive
Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally
More informationInstallation and Configuration Manual
Beacon Office Installation and Configuration Manual Version - 2.5(1) Radianta Inc. September 2008 Radianta, Inc. Beacon Office Page 2 Table of Contents Introduction... 4 What is Beacon Office... 4 How
More informationSoNet Privacy and Replication in Federated Online Social Networks
SoNet Privacy and Replication in Federated Online Social Networks Lorenz Schwittmann, Christopher Boelmann, Matthäus Wander, Torben Weis University of Duisburg-Essen Duisburg, Germany wimi@vs.uni-due.de
More informationSecurity Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationHelloWorld: An Open Source, Distributed and Secure Social Network
HelloWorld: An Open Source, Distributed and Secure Social Network Markus Ackermann maac0001@stud.fh-kl.de Benjamin Ludwig belu0001@stud.fh-kl.de Krister Hymon krhy0001@stud.fh-kl.de Kai Wilhelm kawi0002@stud.fh-kl.de
More informationInstalling and Configuring TrueConf Online
Installing and Configuring TrueConf Online How to Install? How to Login? How to Configure? Creating a Conference How to Make 1-on-1 VideoCall? What modes of group conferences are available in TrueConf
More informationInternet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr
Internet Architecture for Robust Mobility Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Contents Introduction IETF Activity Home Agent Reliability Protocol P2P-based Approaches ROAM and SAMP
More informationPeer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
More informationKey Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
More informationPROJECT MANAGEMENT SYSTEM
Requirement Analysis Document v.2 14.12.2009 CENG-401 SOFTWARE ENGINEER PROJECT MANAGEMENT SYSTEM (Project Manager) Ahmet Edip SEÇKİN 07010555 (Developer) Erhan ŞEN 07010507 (Developer) Semih Serdar CENGİZOĞLU
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationComputer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
More informationSecurity vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
More informationisecuremail User Guide for iphone
isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationSANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationTLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
More informationPSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
More informationSkype characteristics
Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications
More informationDKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
More informationqwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas
More informationZoho Projects. Social collaborative project management platform
Zoho Projects is a feature- rich and easy- to- use cloud- based collaborative project management platform for small to medium- sized businesses as well as teams and departments in larger companies. Its
More informationHow to select the right Marketing Cloud Edition
How to select the right Marketing Cloud Edition Email, Mobile & Web Studios ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire customer lifecycle
More informationKrunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
More informationEmail Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
More informationREBRANDING THE KBMMW REMOTE DESKTOP PAGE 1/4
PAGE 1/ BY KIM MADSEN starter expert Delphi PROLOGUE kbmmw Enterprise Edition have long included components that makes it possible to create a remote desktop server, client, proxy and service, and a set
More informationA Study on Secure Electronic Medical DB System in Hospital Environment
A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationHosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration
Hosted VoIP Phone System Admin Portal User Guide for Call Center Administration Contents 1 About this Guide... 4 2 Accessing the Hosted VoIP Phone System Administration Portal... 5 3 Hosted VoIP Phone
More informationClient Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
More informationPOSEIDON social network for carers
PersOnalized Smart Environments to increase Inclusion of people with DOwn s syndrome Deliverable D5.5 POSEIDON social network for carers Call: Objective: FP7- ICT- 2013-10 ICT- 2013.5.3 ICT for smart and
More informationWHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD
WHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD TABLE OF CONTENTS 1 In this whitepaper... 3 2 User security... 4 2.1 Authentication... 4 2.2 Authorization & Access Control...
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationThe English translation Of MBA Standard 0301
MBA 文 書 0603 号 MBA Document 0603 The English translation Of MBA Standard 0301 MISAUTH Protocol Specification The authoritive specification is Japansese one, MBA Standard 0203 (June 2004). The Protocol
More informationHushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
More informationConfiguring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
More informationSOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
More informationThe following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
More informationLecture II : Communication Security Services
Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication
More informationALERT & Cisco CallManager
Micromedia International Technical specification Author : Pierre Chevrier Pages : 28 Company : Micromedia International Date : 26/05/2011 Réf. : ETT_20090618_000001.docx ALERT & Cisco CallManager This
More informationimail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2
imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 4 1. How to access to Sunway imail account?... 4 2. I can t login to my
More informationCassandra A Decentralized, Structured Storage System
Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More information9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationChristoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW
Bitcoin s Peer-to-Peer network Christoph Sorge February 12th, 2014 Bitcoin minisymposium at KNAW Clipart source: http://openclipart.org, users Machovka and Keistutis Department of Computer Science What
More informationManaging User Accounts
Managing User Accounts This chapter includes the following sections: Active Directory, page 1 Configuring Local Users, page 3 Viewing User Sessions, page 5 Active Directory Active Directory is a technology
More informationWhy you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
More informationTechnical White Paper BlackBerry Security
Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...
More informationPDF hosted at the Radboud Repository of the Radboud University Nijmegen
PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is a publisher's version. For additional information about this publication click this link. http://hdl.handle.net/2066/60933
More informationEnabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
More informationForensic Toolkit. Sales and Promotional Summary ACCESSDATA, ON YOUR RADAR
Forensic Toolkit Sales and Promotional Summary ACCESSDATA, ON YOUR RADAR What is AccessData s Forensic Toolkit? Also known as FTK, this application enables you to perform complete and thorough computer
More informationSecuring Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
More informationb+s Connects CCE Edition
b+s Connects CCE Edition A Business Whitepaper by Bucher + Suter May, 2014 Todd Samalin, Sales Engineer Contents General Introduction... 2 What is b+s Connects?... 2 b+s Connects Introduction... 2 Editions...
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More informationSOSIMPLE Self Organizing SIMPLE A Proposed P2P Instant Messaging System
SOSIMPLE Self Organizing SIMPLE A Proposed P2P Instant Messaging System David A. Bryan College of William and Mary, CSCI 780, P2P and Grid Systems December, 2003 1 Introduction Instant messaging (IM) has
More informationEnterprise Email Archive Managed Archiving & ediscovery Services User Manual
Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Copyright (C) 2012 MessageSolution Inc. All Rights Reserved Table of Contents Chapter 1: Introduction... 3 1.1 About MessageSolution
More informationS ven. Tips to Keep Financial Apps Safe & Secure
S ven Tips to Keep Financial Apps Safe & Secure Mobile applications provide users with access to critical information while on the go. In order to quickly empower users with immediate access to their financial
More information