Inside Dropbox: Understanding Personal Cloud Storage Services



Similar documents
How To Write A Blog Post On Dropbox

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services

Monitoring commercial cloud service providers

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

Introduction to Mobile Access Gateway Installation

Network Configuration Settings

Background. Personal cloud services are gaining popularity

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Configuration Guide. BES12 Cloud

Setting Up Resources in VMware Identity Manager

Configuration Guide BES12. Version 12.2

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services

Active Management Services

Personal Cloud Storage: Usage, Performance and Impact of Terminals

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

SharePoint Performance Optimization

BlackBerry Enterprise Service 10. Version: Configuration Guide

Cloud Sync White Paper. Based on DSM 6.0

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

Module 6. Designing and Deploying External Access. MVA Jump Start

Introduction to the EIS Guide

Basic Exchange Setup Guide

SVN5800 Secure Access Gateway

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Authentication Methods

Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4

Step-by-Step Configuration

Configuration Guide BES12. Version 12.1

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

VPN Lesson 2: VPN Implementation. Summary

The memoq server in a Corporate Network

WHITE PAPER Citrix Secure Gateway Startup Guide

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

CNS Implementing NetScaler 11.0 For App and Desktop Solutions

The memoq server in a Corporate Network

LDAP over SSL Page 1 of 6.

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

Forward proxy server vs reverse proxy server

Docufide Client Installation Guide for Windows


BlackBerry Enterprise Server Express System Requirements

Secure your Docker images

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise

FortiGate Multi-Threat Security Systems I

NEFSIS DEDICATED SERVER

Internet Storage Sync Problem Statement

Sophos Mobile Control Installation prerequisites form

Steelcape Product Overview and Functional Description

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Private Cloud. Technical Overview. Revision Date: 10 August 2015

MOBILE APPLICATIONS AND CLOUD COMPUTING. Roberto Beraldi

Configuring Microsoft Dynamics AX 2012 Alerts and Notifications Using an SMTP Relay Server with Office 365

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Zimbra Open Source and Collaboration Suite

Pearl Echo Installation Checklist

GoToMyPC Corporate Advanced Firewall Support Features

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

From Centralization to Distribution: A Comparison of File Sharing Protocols

Introduction to FileWave

Application Note. Onsight Connect Network Requirements v6.3

Remote Access and Control of the. Programmer/Controller. Version 1.0 9/07/05

How to configure SSL proxying in Zorp 6

SSL SSL VPN

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

IGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2

How to configure SSL proxying in Zorp 3 F5

Flight Workflow User's Guide. Release

Configuration Guide BES12. Version 12.3

F-Secure Messaging Security Gateway. Deployment Guide

Set up Outlook for your new student e mail with IMAP/POP3 settings

Deploy Remote Desktop Gateway on the AWS Cloud

Secure Cloud Computing with FlexCloud

Paxera Uploader Basic Troubleshooting

Healthstone Monitoring System

Internet Privacy Options

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Testing & Assuring Mobile End User Experience Before Production. Neotys

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Cisco Application Networking for IBM WebSphere

BELNET: Service Level Description Version (29/7/2009)

Signiant Agent installation

DOVECOT Overview. Timo Sirainen Chief Architect Co-Founder

Click Studios. Passwordstate. Installation Instructions

3/21/2011. Topics. What is load balancing? Load Balancing

Preparing for GO!Enterprise MDM On-Demand Service

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud

Topics. 1. What is load balancing? 2. Load balancing techniques 3. Load balancing strategies 4. Sessions 5. Elastic load balancing

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

Kerio Control. Step-by-Step Guide. Kerio Technologies

Transcription:

Inside Dropbox: Understanding Personal Cloud Storage Services Corneliu Claudiu Prodescu School of Engineering and Sciences Jacobs University Bremen Campus Ring 1, 28759 Bremen, Germany Monday 22 nd April, 2013

Presentation Outline Introduction Dropbox Architecture Measurements and Evaluations Conclusions

Cloud Storage Services Cloud services increasingly prevalent Microsoft, Amazon, Google Cloud storage in particular very popular Dropbox, UbuntuOne, Box.com Non-trivial amount of traffic

Measurement Setup Cloud Storage Services Traffic Measurement use tstat to monitor traffic from 2 university campuses 2 points of presence in a major ISP over 42 consecutive days client/server IP addresses, TCP metrics classify traffic by TLS sever name and DNS FQDN

Initial Measurement Figure: Storage Services Usage source: ID:UPCSS Dropbox leads constantly

Dropbox Desktop Client Main characteristics Python native client for Windows / MacOS / Linux Data transfers via librsync

Dropbox Desktop Client Dropbox Servers - DNS Analysis Figure: Domain names used by Dropbox services source: ID:UPCSS Two planes are distinguished: control plane (meta-data, notification, authentication) data plane (storage)

Dropbox Desktop Client Dropbox Servers - Protocol Analysis - Issue Dropbox protocol is not publicly documented Most communication is encrypted under TLS.

Dropbox Desktop Client Dropbox Servers - Protocol Analysis - Issue Dropbox protocol is not publicly documented Most communication is encrypted under TLS. Dropbox Servers - Protocol Analysis - Solution Route traffic through Squid proxy Use Squid SSL Bump module to decrypt TLS Change at run-time the client-trusted Dropbox Inc. certificate with the one provided to Squid SSL Bump. Memory Re-writing

Dropbox Desktop Client Dropbox Servers - Protocol Insight Figure: Dropbox Protocol Example - File upload source: ID:UPCSS Notification protocol via HTTP long polling notifyx.dropbox.com Meta-data and storage protocols via TCP/SSL client-lb, client.dropbox.com

Dropbox Desktop Client Dropbox Servers - Protocol Insight Data (new files or deltas) is chunked in 4MBytes pieces Namespaces are used for each shared folder each user has an initial namespace Each device provides a unique ID

Dropbox WebUI Use separate servers for user private and share-by-link files dl-web, dl.dropbox.com Significantly less traffic Not analyzed further plot coming soon

Overall Traffic Traffic Share Figure: Dropbox vs Youtube Traffic Share in Campus 2 source: ID:UPCSS Dropbox traffic as much as 1/3 of Youtube traffic

Overall Traffic Dropbox server breakdown Figure: Traffic Share of Dropbox Servers source: ID:UPCSS Dropbox application preferred more than 80% in all vantage points

Overall Traffic Flow Sizes Figure: Distribution of Flow Sizes source: ID:UPCSS bound in range 4Kb - 400Mb significant amount of flows less than 10Kb

Throughput Analysis Throughput Figure: Upload Throughput source: ID:UPCSS 1-chunk flows bound by TCP slow-start multi-chunk flows affected by sequential chunk ACKs bundled ACKs introduced in next version

User Patterns Device Distribution Figure: Devices per user source: ID:UPCSS Most users use Dropbox with a single device

User Patterns Namespace Distribution Figure: Namespaces per user source: ID:UPCSS Most users only have their own namespace Campus users tend to share more

User Patterns Device Daily Activation Figure: Fraction of Active Devices per day source: ID:UPCSS Weekends clearly visible in campus data-sets

User Patterns Download/Upload breakdown 30% occasional users 26% download-only 7% upload-only 37% actively upload and download

User Patterns Download/Upload breakdown Figure: User Downloads/Uploads in Home 1 source: ID:UPCSS

Conclusions Dropbox is the most popular cloud storage service

Conclusions Dropbox is the most popular cloud storage service Architecture Analysis

Conclusions Dropbox is the most popular cloud storage service Architecture Analysis Usage Patterns

Conclusions Dropbox is the most popular cloud storage service Architecture Analysis Usage Patterns Throughput analysis and recommendations

Thank you Questions?