SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for 
Peer-to-Peer-based Social Networks 
P2PCS as part of CTS 2014 
May 21, 2014 
Jens Janiuk 
Alexander Mäcker 
Kalman Graffi 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 1
1 Introduction 
2 Distributed List Concept 
3 Access Control in Distributed List 
Read and Write Access 
Key Distribution 
4 Evaluation 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 2
Introduction 
Online Social Networks (OSNs) 
Facebook, Google+, Twitter, . . .heavily used nowadays 
HEINZ NIXDORF INSTITUTE 
(semi-) public user profiles 
communication 
collaboration: sharing and searching user generated content 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 3
Introduction 
Online Social Networks (OSNs) 
Facebook, Google+, Twitter, . . .heavily used nowadays 
HEINZ NIXDORF INSTITUTE 
(semi-) public user profiles 
communication 
collaboration: sharing and searching user generated content 
Current approaches are centralized 
full access to data: massive data-mining 
censorship 
single point of failure, scalability 
high operational costs 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 3
Introduction 
Decentralized Approaches For OSNs 
Peer-to-Peer based OSNs address drawbacks 
DHT-based solution (e.g. PeerSoN, LifeSocial) 
users build a structured P2P overlay 
key-based routing 
DHT: get, put 
joining and leaving 
replication 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
0x11 0x1A 
0x53 
0xCB 0xA1 
0x13 
0xD1 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 4
1 Introduction 
2 Distributed List Concept 
3 Access Control in Distributed List 
Read and Write Access 
Key Distribution 
4 Evaluation 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 5
Distributed List Concept 
Motivation For Distributed Data Structures 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
DHT operations (get, put) on single items do not match OSN applications 
Functionalities operate on 
collection of items 
guestbooks/ wall entries 
photo albums 
message history, . . . 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 6
0x11 HEINZ NIXDORF INSTITUTE 
University of Paderborn 
0x1A 
0x53 
0xCB 0xA1 
0xD1 
Distributed List Concept 
Storage Organization 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 7
A) List ^= DHT item 
+ single get to retrieve list 
- overloaded peers 
- no parallelization 
0x11 HEINZ NIXDORF INSTITUTE 
University of Paderborn 
0x1A 
0x53 
0xCB 0xA1 
0xD1 
Distributed List Concept 
Storage Organization 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 7
A) List ^= DHT item 
+ single get to retrieve list 
- overloaded peers 
- no parallelization 
B) List element ^= DHT item 
+ parallelization 
+ overloading less probable 
- many messages 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
0x11 0x1A 
0x53 
0xCB 0xA1 
0xD1 
Distributed List Concept 
Storage Organization 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 7
Distributed List Concept 
Storage Organization 
A) List ^= DHT item 
+ single get to retrieve list 
- overloaded peers 
- no parallelization 
B) List element ^= DHT item 
+ parallelization 
+ overloading less probable 
- many messages 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
0x11 0x1A 
0x53 
0xCB 0xA1 
0xD1 
C) Partition list into buckets, store buckets in DHT 
+ splitsize gives tradeoff between A) and B) 
i-th element has id=hash(listname + bi=splitsizec) 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 7
Distributed List Concept 
Remote Operations 
Operations on list by put/get functionalities inefficient 
whole buckets are sent through network, e.g., 
set(i): retrieve bucket, send back bucket 
contains(item): retrieve (several) bucket(s) 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 8
Distributed List Concept 
Remote Operations 
Operations on list by put/get functionalities inefficient 
whole buckets are sent through network, e.g., 
set(i): retrieve bucket, send back bucket 
contains(item): retrieve (several) bucket(s) 
Introduce Remote Operations 
use lookup function to issue commands 
message contains request, possibly some data 
+ less traffic 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 8
1 Introduction 
2 Distributed List Concept 
3 Access Control in Distributed List 
Read and Write Access 
Key Distribution 
4 Evaluation 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 9
Access Control in Distributed List 
Example 
User Alice has friends Bob and Carol 
Alice 
Bob Carol 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
Access Control in Distributed List 
Example 
User Alice has friends Bob and Carol 
Alice has guestbook/ wall for friends (distributed list) 
Alice 
Bob Carol 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
User Alice has friends Bob and Carol 
Alice has guestbook/ wall for friends (distributed list) 
Only Alice and friends can read wall 
Alice 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Dave 
Access Control in Distributed List 
Example 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
Access Control in Distributed List 
Example 
User Alice has friends Bob and Carol 
Alice has guestbook/ wall for friends (distributed list) 
Only Alice and friends can read wall 
Only Alice and friends may create new entries 
Alice 
Bob Carol 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
Access Control in Distributed List 
Example 
User Alice has friends Bob and Carol 
Alice has guestbook/ wall for friends (distributed list) 
Only Alice and friends can read wall 
Only Alice and friends may create new entries 
Alice 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Dave 
Bob Carol 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
Access Control in Distributed List 
Example 
User Alice has friends Bob and Carol 
Alice has guestbook/ wall for friends (distributed list) 
Only Alice and friends can read wall 
Only Alice and friends may create new entries 
Only author can modify existing entry 
Alice 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Dave 
Bob Carol 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
Access Control in Distributed List 
Using Cryptographic Means 
Restrict read access 
encrypt elements with common symmetric key 
Restrict changing elements 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 11
Access Control in Distributed List 
Using Cryptographic Means 
Restrict read access 
encrypt elements with common symmetric key 
Restrict changing elements 
sign elements with author’s private key (+nonce) 
storing peer verifies signatures 
Restrict adding elements 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 11
Access Control in Distributed List 
Using Cryptographic Means 
Restrict read access 
encrypt elements with common symmetric key 
Restrict changing elements 
sign elements with author’s private key (+nonce) 
storing peer verifies signatures 
Restrict adding elements 
bucket signed with common key of Alice and friends 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 11
1 Introduction 
2 Distributed List Concept 
3 Access Control in Distributed List 
Read and Write Access 
Key Distribution 
4 Evaluation 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 12
Access Control in Distributed List 
Key Distribution by Groups 
Bootstrap security (Graffi et al. IEEE LCN 2009) 
derive private key from user name and password 
derive public key = identifier of user 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 13
Access Control in Distributed List 
Key Distribution by Groups 
Bootstrap security (Graffi et al. IEEE LCN 2009) 
derive private key from user name and password 
derive public key = identifier of user 
Create and store a group item 
asymmetric key pair (eG; dG), symmetric key SG 
stored encrypted for each member 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 13
1 Introduction 
2 Distributed List Concept 
3 Access Control in Distributed List 
Read and Write Access 
Key Distribution 
4 Evaluation 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 14
Evaluation 
Impact on Traffic 
Simulation of 1000 list operations 
each bucket stored at different node 
elements of size 1 kB 
Operation A B 
get(i) 0:5 0:93 
add(item) 0:375 0:053 
remove(i) 0:125 0:017 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 15
Simulation of 1000 list operations 
each bucket stored at different node 
elements of size 1 kB 
traffic considerably reduced 
Operation A B 
get(i) 0:5 0:93 
add(item) 0:375 0:053 
remove(i) 0:125 0:017 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
0 200 400 600 800 1000 
0 50000 150000 250000 
operations 
traffic (kB) 
remote ops, splitsize=10, consolidation 
remote ops, splitsize=inf 
remote ops, splitsize=10 
no remote ops, splitsize=inf 
0 200 400 600 800 1000 
0 2000 6000 10000 
operations 
traffic (kB) 
remote ops, splitsize=10, consolidation 
remote ops, splitsize=inf 
remote ops, splitsize=10 
no remote ops, splitsize=inf 
Evaluation 
Impact on Traffic 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 15
Simulation of 1000 list operations 
each bucket stored at different node 
elements of size 1 kB 
traffic considerably reduced 
traffic depends on splitsize 
Operation A B 
get(i) 0:5 0:93 
add(item) 0:375 0:053 
remove(i) 0:125 0:017 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
0 200 400 600 800 1000 
0 10000 30000 
operations 
traffic (kB) 
splitsize=1, no consolidation 
splitsize=5, no consolidation 
splitsize=20, no consolidation 
splitsize=100, no consolidation 
0 200 400 600 800 1000 
0 2000 4000 6000 
operations 
traffic (kB) 
splitsize=1, no consolidation 
splitsize=5, no consolidation 
splitsize=20, no consolidation 
splitsize=100, no consolidation 
Evaluation 
Impact on Traffic 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 15
Summary 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Distributed datastructures are useful for OSNs 
Buckets and remote operations allow flexible, efficient list functionalities 
Access control fundamental in OSNs 
Cryptographic approaches and groups to control access to list 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 16
Thank you for your attention! 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
Alexander Mäcker 
Heinz Nixdorf Institute 
& Department of Computer Science 
University of Paderborn 
Address: Fürstenallee 11 
33102 Paderborn 
Germany 
E-mail: amaecker@upb.de 
Web: http://www.p2pframework.com 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 17
Remote Write Access 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
1) C requests item from S; possibly sends hash of its own version of item 
2) S replies with current version of item or ACK 
3) C performs following steps 
perform change locally 
compute signature 
send back signature, command and old hash 
4) C compares hashes; either performs changes locally and stores or back to step 2 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 18
Consolidation of Distributed List 
1) Initiating node computes B0k 
and B0k 
+1 and signatures Sig(B0k 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
), Sig(B0k 
+1). 
Signatures sent to nodes Sk and Sk+1 storing Bk and Bk+1. 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19
Consolidation of Distributed List 
1) Initiating node computes B0k 
and B0k 
+1 and signatures Sig(B0k 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
), Sig(B0k 
+1). 
k 
k 
00Signatures sent to nodes Sk and Sk1 storing Bk and Bk1. 
++2) Sk and Sk1 compute Band B++1. Cancel if differ from received ones. 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19
Consolidation of Distributed List 
1) Initiating node computes B0k 
and B0k 
+1 and signatures Sig(B0k 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
), Sig(B0k 
+1). 
k 
k 
00Signatures sent to nodes Sk and Sk1 storing Bk and Bk1. 
++2) Sk and Sk1 compute Band B++1. Cancel if differ from received ones. 
3) Sk+1 notifies Sk . 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19
1) Initiating node computes B0k 
and B0k 
+1 and signatures Sig(B0k 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
), Sig(B0k 
+1). 
k 
k 
00Signatures sent to nodes Sk and Sk1 storing Bk and Bk1. 
++2) Sk and Sk1 compute Band B++1. Cancel if differ from received ones. 
3) Sk+1 notifies Sk . 
4) On reception of notification, Sk+1 stores B0k 
and notifies Sk+1. 
Consolidation of Distributed List 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19
Consolidation of Distributed List 
1) Initiating node computes B0k 
and B0k 
+1 and signatures Sig(B0k 
HEINZ NIXDORF INSTITUTE 
University of Paderborn 
), Sig(B0k 
+1). 
k 
k 
00Signatures sent to nodes Sk and Sk1 storing Bk and Bk1. 
++2) Sk and Sk1 compute Band B++1. Cancel if differ from received ones. 
3) Sk+1 notifies Sk . 
4) On reception of notification, Sk+1 stores B0k 
and notifies Sk+1. 
5) On reception of notification, Sk stores B0k 
+1 after checking that B0k 
is stored as 
expected. 
Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19

Weitere ähnliche Inhalte

Ähnlich wie IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Social Networks

From Open Linked Data towards an Ecosystem of Interlinked Knowledge
From Open Linked Data towards an Ecosystem of Interlinked KnowledgeFrom Open Linked Data towards an Ecosystem of Interlinked Knowledge
From Open Linked Data towards an Ecosystem of Interlinked Knowledge
Sören Auer
 
Open Data Dialog 2013 - Linked Data in Education
Open Data Dialog 2013 - Linked Data in EducationOpen Data Dialog 2013 - Linked Data in Education
Open Data Dialog 2013 - Linked Data in Education
Stefan Dietze
 

Ähnlich wie IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Social Networks (20)

2014kalman 140910040324-phpapp02 (1)
2014kalman 140910040324-phpapp02 (1)2014kalman 140910040324-phpapp02 (1)
2014kalman 140910040324-phpapp02 (1)
 
" NoSQL Databases: An Overview" Lena Wiese, Research Group Knowledge Engineer...
" NoSQL Databases: An Overview" Lena Wiese, Research Group Knowledge Engineer..." NoSQL Databases: An Overview" Lena Wiese, Research Group Knowledge Engineer...
" NoSQL Databases: An Overview" Lena Wiese, Research Group Knowledge Engineer...
 
LOD2 Webinar Series FOX
LOD2 Webinar Series FOXLOD2 Webinar Series FOX
LOD2 Webinar Series FOX
 
(PROJEKTURA) Big Data Open Data story for TGG
(PROJEKTURA) Big Data Open Data story for TGG(PROJEKTURA) Big Data Open Data story for TGG
(PROJEKTURA) Big Data Open Data story for TGG
 
Knowledge Graph Introduction
Knowledge Graph IntroductionKnowledge Graph Introduction
Knowledge Graph Introduction
 
Replication and Synchronization Algorithms for Distributed Databases - Lena W...
Replication and Synchronization Algorithms for Distributed Databases - Lena W...Replication and Synchronization Algorithms for Distributed Databases - Lena W...
Replication and Synchronization Algorithms for Distributed Databases - Lena W...
 
Media Suite: Unlocking Archives for Mixed Media Scholarly Research
Media Suite: Unlocking Archives for Mixed Media Scholarly Research Media Suite: Unlocking Archives for Mixed Media Scholarly Research
Media Suite: Unlocking Archives for Mixed Media Scholarly Research
 
Make our Scientific Datasets Accessible and Interoperable on the Web
Make our Scientific Datasets Accessible and Interoperable on the WebMake our Scientific Datasets Accessible and Interoperable on the Web
Make our Scientific Datasets Accessible and Interoperable on the Web
 
Dataset Sources Repositories.pptx
Dataset Sources Repositories.pptxDataset Sources Repositories.pptx
Dataset Sources Repositories.pptx
 
Challenges in Enabling Mixed Media Scholarly Research with Multi-Media Data i...
Challenges in Enabling Mixed Media Scholarly Research with Multi-Media Data i...Challenges in Enabling Mixed Media Scholarly Research with Multi-Media Data i...
Challenges in Enabling Mixed Media Scholarly Research with Multi-Media Data i...
 
Retrieval, Crawling and Fusion of Entity-centric Data on the Web
Retrieval, Crawling and Fusion of Entity-centric Data on the WebRetrieval, Crawling and Fusion of Entity-centric Data on the Web
Retrieval, Crawling and Fusion of Entity-centric Data on the Web
 
Semantic Linking & Retrieval for Digital Libraries
Semantic Linking & Retrieval for Digital LibrariesSemantic Linking & Retrieval for Digital Libraries
Semantic Linking & Retrieval for Digital Libraries
 
Dataset Sources Repositories.pptx
Dataset Sources Repositories.pptxDataset Sources Repositories.pptx
Dataset Sources Repositories.pptx
 
A basic course on Research data management, part 3: sharing your data
A basic course on Research data management, part 3: sharing your dataA basic course on Research data management, part 3: sharing your data
A basic course on Research data management, part 3: sharing your data
 
From Open Linked Data towards an Ecosystem of Interlinked Knowledge
From Open Linked Data towards an Ecosystem of Interlinked KnowledgeFrom Open Linked Data towards an Ecosystem of Interlinked Knowledge
From Open Linked Data towards an Ecosystem of Interlinked Knowledge
 
FAIR data: LOUD for all audiences
FAIR data: LOUD for all audiencesFAIR data: LOUD for all audiences
FAIR data: LOUD for all audiences
 
lodlam summit session browsable linked data
lodlam summit session browsable linked datalodlam summit session browsable linked data
lodlam summit session browsable linked data
 
Linked Open Data Visualization
Linked Open Data VisualizationLinked Open Data Visualization
Linked Open Data Visualization
 
Open Data Dialog 2013 - Linked Data in Education
Open Data Dialog 2013 - Linked Data in EducationOpen Data Dialog 2013 - Linked Data in Education
Open Data Dialog 2013 - Linked Data in Education
 
5.15.17 Powering Linked Data and Hosted Solutions with Fedora Webinar Slides
5.15.17 Powering Linked Data and Hosted Solutions with Fedora Webinar Slides5.15.17 Powering Linked Data and Hosted Solutions with Fedora Webinar Slides
5.15.17 Powering Linked Data and Hosted Solutions with Fedora Webinar Slides
 

Mehr von Kalman Graffi

LibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewLibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - Overview
Kalman Graffi
 
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia CaseIEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
Kalman Graffi
 
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi
 
Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010
Kalman Graffi
 
Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi
 

Mehr von Kalman Graffi (20)

LibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewLibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - Overview
 
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
 
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
 
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia CaseIEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
 
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
 
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
 
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
 
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
 
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
 
Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010
 
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
 
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
 
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocialQuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
 
LifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social NetworksLifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social Networks
 
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
 
Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010
 
Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010
 
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
 
Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010
 
Cebit 2009 - Kalman Graffi - LifeSocial.KOM - Eine dezentrale Plattform für s...
Cebit 2009 - Kalman Graffi - LifeSocial.KOM - Eine dezentrale Plattform für s...Cebit 2009 - Kalman Graffi - LifeSocial.KOM - Eine dezentrale Plattform für s...
Cebit 2009 - Kalman Graffi - LifeSocial.KOM - Eine dezentrale Plattform für s...
 

Kürzlich hochgeladen

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 

Kürzlich hochgeladen (20)

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 

IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Social Networks

  • 1. HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks P2PCS as part of CTS 2014 May 21, 2014 Jens Janiuk Alexander Mäcker Kalman Graffi Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 1
  • 2. 1 Introduction 2 Distributed List Concept 3 Access Control in Distributed List Read and Write Access Key Distribution 4 Evaluation HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 2
  • 3. Introduction Online Social Networks (OSNs) Facebook, Google+, Twitter, . . .heavily used nowadays HEINZ NIXDORF INSTITUTE (semi-) public user profiles communication collaboration: sharing and searching user generated content University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 3
  • 4. Introduction Online Social Networks (OSNs) Facebook, Google+, Twitter, . . .heavily used nowadays HEINZ NIXDORF INSTITUTE (semi-) public user profiles communication collaboration: sharing and searching user generated content Current approaches are centralized full access to data: massive data-mining censorship single point of failure, scalability high operational costs University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 3
  • 5. Introduction Decentralized Approaches For OSNs Peer-to-Peer based OSNs address drawbacks DHT-based solution (e.g. PeerSoN, LifeSocial) users build a structured P2P overlay key-based routing DHT: get, put joining and leaving replication HEINZ NIXDORF INSTITUTE University of Paderborn 0x11 0x1A 0x53 0xCB 0xA1 0x13 0xD1 Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 4
  • 6. 1 Introduction 2 Distributed List Concept 3 Access Control in Distributed List Read and Write Access Key Distribution 4 Evaluation HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 5
  • 7. Distributed List Concept Motivation For Distributed Data Structures HEINZ NIXDORF INSTITUTE University of Paderborn DHT operations (get, put) on single items do not match OSN applications Functionalities operate on collection of items guestbooks/ wall entries photo albums message history, . . . Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 6
  • 8. 0x11 HEINZ NIXDORF INSTITUTE University of Paderborn 0x1A 0x53 0xCB 0xA1 0xD1 Distributed List Concept Storage Organization Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 7
  • 9. A) List ^= DHT item + single get to retrieve list - overloaded peers - no parallelization 0x11 HEINZ NIXDORF INSTITUTE University of Paderborn 0x1A 0x53 0xCB 0xA1 0xD1 Distributed List Concept Storage Organization Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 7
  • 10. A) List ^= DHT item + single get to retrieve list - overloaded peers - no parallelization B) List element ^= DHT item + parallelization + overloading less probable - many messages HEINZ NIXDORF INSTITUTE University of Paderborn 0x11 0x1A 0x53 0xCB 0xA1 0xD1 Distributed List Concept Storage Organization Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 7
  • 11. Distributed List Concept Storage Organization A) List ^= DHT item + single get to retrieve list - overloaded peers - no parallelization B) List element ^= DHT item + parallelization + overloading less probable - many messages HEINZ NIXDORF INSTITUTE University of Paderborn 0x11 0x1A 0x53 0xCB 0xA1 0xD1 C) Partition list into buckets, store buckets in DHT + splitsize gives tradeoff between A) and B) i-th element has id=hash(listname + bi=splitsizec) Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 7
  • 12. Distributed List Concept Remote Operations Operations on list by put/get functionalities inefficient whole buckets are sent through network, e.g., set(i): retrieve bucket, send back bucket contains(item): retrieve (several) bucket(s) HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 8
  • 13. Distributed List Concept Remote Operations Operations on list by put/get functionalities inefficient whole buckets are sent through network, e.g., set(i): retrieve bucket, send back bucket contains(item): retrieve (several) bucket(s) Introduce Remote Operations use lookup function to issue commands message contains request, possibly some data + less traffic HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 8
  • 14. 1 Introduction 2 Distributed List Concept 3 Access Control in Distributed List Read and Write Access Key Distribution 4 Evaluation HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 9
  • 15. Access Control in Distributed List Example User Alice has friends Bob and Carol Alice Bob Carol HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
  • 16. Access Control in Distributed List Example User Alice has friends Bob and Carol Alice has guestbook/ wall for friends (distributed list) Alice Bob Carol HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
  • 17. User Alice has friends Bob and Carol Alice has guestbook/ wall for friends (distributed list) Only Alice and friends can read wall Alice HEINZ NIXDORF INSTITUTE University of Paderborn Dave Access Control in Distributed List Example Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
  • 18. Access Control in Distributed List Example User Alice has friends Bob and Carol Alice has guestbook/ wall for friends (distributed list) Only Alice and friends can read wall Only Alice and friends may create new entries Alice Bob Carol HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
  • 19. Access Control in Distributed List Example User Alice has friends Bob and Carol Alice has guestbook/ wall for friends (distributed list) Only Alice and friends can read wall Only Alice and friends may create new entries Alice HEINZ NIXDORF INSTITUTE University of Paderborn Dave Bob Carol Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
  • 20. Access Control in Distributed List Example User Alice has friends Bob and Carol Alice has guestbook/ wall for friends (distributed list) Only Alice and friends can read wall Only Alice and friends may create new entries Only author can modify existing entry Alice HEINZ NIXDORF INSTITUTE University of Paderborn Dave Bob Carol Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 10
  • 21. Access Control in Distributed List Using Cryptographic Means Restrict read access encrypt elements with common symmetric key Restrict changing elements HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 11
  • 22. Access Control in Distributed List Using Cryptographic Means Restrict read access encrypt elements with common symmetric key Restrict changing elements sign elements with author’s private key (+nonce) storing peer verifies signatures Restrict adding elements HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 11
  • 23. Access Control in Distributed List Using Cryptographic Means Restrict read access encrypt elements with common symmetric key Restrict changing elements sign elements with author’s private key (+nonce) storing peer verifies signatures Restrict adding elements bucket signed with common key of Alice and friends HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 11
  • 24. 1 Introduction 2 Distributed List Concept 3 Access Control in Distributed List Read and Write Access Key Distribution 4 Evaluation HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 12
  • 25. Access Control in Distributed List Key Distribution by Groups Bootstrap security (Graffi et al. IEEE LCN 2009) derive private key from user name and password derive public key = identifier of user HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 13
  • 26. Access Control in Distributed List Key Distribution by Groups Bootstrap security (Graffi et al. IEEE LCN 2009) derive private key from user name and password derive public key = identifier of user Create and store a group item asymmetric key pair (eG; dG), symmetric key SG stored encrypted for each member HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 13
  • 27. 1 Introduction 2 Distributed List Concept 3 Access Control in Distributed List Read and Write Access Key Distribution 4 Evaluation HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 14
  • 28. Evaluation Impact on Traffic Simulation of 1000 list operations each bucket stored at different node elements of size 1 kB Operation A B get(i) 0:5 0:93 add(item) 0:375 0:053 remove(i) 0:125 0:017 HEINZ NIXDORF INSTITUTE University of Paderborn Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 15
  • 29. Simulation of 1000 list operations each bucket stored at different node elements of size 1 kB traffic considerably reduced Operation A B get(i) 0:5 0:93 add(item) 0:375 0:053 remove(i) 0:125 0:017 HEINZ NIXDORF INSTITUTE University of Paderborn 0 200 400 600 800 1000 0 50000 150000 250000 operations traffic (kB) remote ops, splitsize=10, consolidation remote ops, splitsize=inf remote ops, splitsize=10 no remote ops, splitsize=inf 0 200 400 600 800 1000 0 2000 6000 10000 operations traffic (kB) remote ops, splitsize=10, consolidation remote ops, splitsize=inf remote ops, splitsize=10 no remote ops, splitsize=inf Evaluation Impact on Traffic Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 15
  • 30. Simulation of 1000 list operations each bucket stored at different node elements of size 1 kB traffic considerably reduced traffic depends on splitsize Operation A B get(i) 0:5 0:93 add(item) 0:375 0:053 remove(i) 0:125 0:017 HEINZ NIXDORF INSTITUTE University of Paderborn 0 200 400 600 800 1000 0 10000 30000 operations traffic (kB) splitsize=1, no consolidation splitsize=5, no consolidation splitsize=20, no consolidation splitsize=100, no consolidation 0 200 400 600 800 1000 0 2000 4000 6000 operations traffic (kB) splitsize=1, no consolidation splitsize=5, no consolidation splitsize=20, no consolidation splitsize=100, no consolidation Evaluation Impact on Traffic Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 15
  • 31. Summary HEINZ NIXDORF INSTITUTE University of Paderborn Distributed datastructures are useful for OSNs Buckets and remote operations allow flexible, efficient list functionalities Access control fundamental in OSNs Cryptographic approaches and groups to control access to list Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 16
  • 32. Thank you for your attention! HEINZ NIXDORF INSTITUTE University of Paderborn Alexander Mäcker Heinz Nixdorf Institute & Department of Computer Science University of Paderborn Address: Fürstenallee 11 33102 Paderborn Germany E-mail: amaecker@upb.de Web: http://www.p2pframework.com Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 17
  • 33. Remote Write Access HEINZ NIXDORF INSTITUTE University of Paderborn 1) C requests item from S; possibly sends hash of its own version of item 2) S replies with current version of item or ACK 3) C performs following steps perform change locally compute signature send back signature, command and old hash 4) C compares hashes; either performs changes locally and stores or back to step 2 Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 18
  • 34. Consolidation of Distributed List 1) Initiating node computes B0k and B0k +1 and signatures Sig(B0k HEINZ NIXDORF INSTITUTE University of Paderborn ), Sig(B0k +1). Signatures sent to nodes Sk and Sk+1 storing Bk and Bk+1. Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19
  • 35. Consolidation of Distributed List 1) Initiating node computes B0k and B0k +1 and signatures Sig(B0k HEINZ NIXDORF INSTITUTE University of Paderborn ), Sig(B0k +1). k k 00Signatures sent to nodes Sk and Sk1 storing Bk and Bk1. ++2) Sk and Sk1 compute Band B++1. Cancel if differ from received ones. Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19
  • 36. Consolidation of Distributed List 1) Initiating node computes B0k and B0k +1 and signatures Sig(B0k HEINZ NIXDORF INSTITUTE University of Paderborn ), Sig(B0k +1). k k 00Signatures sent to nodes Sk and Sk1 storing Bk and Bk1. ++2) Sk and Sk1 compute Band B++1. Cancel if differ from received ones. 3) Sk+1 notifies Sk . Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19
  • 37. 1) Initiating node computes B0k and B0k +1 and signatures Sig(B0k HEINZ NIXDORF INSTITUTE University of Paderborn ), Sig(B0k +1). k k 00Signatures sent to nodes Sk and Sk1 storing Bk and Bk1. ++2) Sk and Sk1 compute Band B++1. Cancel if differ from received ones. 3) Sk+1 notifies Sk . 4) On reception of notification, Sk+1 stores B0k and notifies Sk+1. Consolidation of Distributed List Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19
  • 38. Consolidation of Distributed List 1) Initiating node computes B0k and B0k +1 and signatures Sig(B0k HEINZ NIXDORF INSTITUTE University of Paderborn ), Sig(B0k +1). k k 00Signatures sent to nodes Sk and Sk1 storing Bk and Bk1. ++2) Sk and Sk1 compute Band B++1. Cancel if differ from received ones. 3) Sk+1 notifies Sk . 4) On reception of notification, Sk+1 stores B0k and notifies Sk+1. 5) On reception of notification, Sk stores B0k +1 after checking that B0k is stored as expected. Secure Distributed Data Structures for Peer-to-Peer-based Social Networks Alexander Mäcker 19