Top Banner
© 2004-5 Ravi Sandh www.list.gmu.edu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]
23

© 2004-5 Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

Mar 26, 2015

Download

Documents

Mary Weeks
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

© 2004-5 Ravi Sandhuwww.list.gmu.edu

Security Issues in P2P Systems

Prof. Ravi SandhuLaboratory for Information Security Technology

George Mason University

www.list.gmu.edu

[email protected]

Page 2: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

2

© 2004 Ravi Sandhuwww.list.gmu.edu

Mainframe → Client-Server → P2P

• Mainframe era:• 1970’s• Dumb terminals connected to a big mainframe • Mainframes possibly networked together

• Client-server:• Late 1980’s• Many clients, 1 user per client• Dedicated servers• Single client can access multiple servers• Significant computing resources on client

• Peer-to-Peer (P2P)• Late 1990’s• Each computer is a client and a server• Takes on whatever role is appropriate for a given task at a given time• Harnesses computing and communication power of the entire network

Page 3: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

3

© 2004 Ravi Sandhuwww.list.gmu.edu

P2P versus Client-Server: Idealized View

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 4: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

4

© 2004 Ravi Sandhuwww.list.gmu.edu

No Clear Border

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 5: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

5

© 2004 Ravi Sandhuwww.list.gmu.edu

Hybrid P2P Systems

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 6: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

6

© 2004 Ravi Sandhuwww.list.gmu.edu

P2P Perspective

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 7: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

7

© 2004 Ravi Sandhuwww.list.gmu.edu

Napster

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Page 8: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

8

© 2004 Ravi Sandhuwww.list.gmu.edu

Power Server

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Page 9: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

9

© 2004 Ravi Sandhuwww.list.gmu.edu

Power Server Coordinator

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Page 10: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

10

© 2004 Ravi Sandhuwww.list.gmu.edu

Comparison of Different P2P Models

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Page 11: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

11

© 2004 Ravi Sandhuwww.list.gmu.edu

Taxonomy of Computer Systems

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 12: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

12

© 2004 Ravi Sandhuwww.list.gmu.edu

Taxonomy of P2P Systems

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 13: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

13

© 2004 Ravi Sandhuwww.list.gmu.edu

Classification of P2P Systems

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 14: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

14

© 2004 Ravi Sandhuwww.list.gmu.edu

Taxonomy of P2P Applications

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 15: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

15

© 2004 Ravi Sandhuwww.list.gmu.edu

Taxonomy of P2P Markets

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 16: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

16

© 2004 Ravi Sandhuwww.list.gmu.edu

P2P Markets versus P2P Applications

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 17: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

17

© 2004 Ravi Sandhuwww.list.gmu.edu

P2P System Architecture

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 18: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

18

© 2004 Ravi Sandhuwww.list.gmu.edu

Security Issues in P2P Systems

• Many old issues carry over

• New issues emerge

• Old issues are re-emphasized

Page 19: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

19

© 2004 Ravi Sandhuwww.list.gmu.edu

Security

• Protection against malicious downloaded P2P application code

• Enabling technologies• Java sandboxing• Trusted computing

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Old issue re-emphasized

Page 20: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

20

© 2004 Ravi Sandhuwww.list.gmu.edu

Security (claimed to be new issues)

• Multi-key encryption• Annonymity requirement for Publius

• Sandboxing

• Digital Rights Management

• Reputation and Accountability

• Firewall Traversal and Hidden Peers

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 21: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

21

© 2004 Ravi Sandhuwww.list.gmu.edu

Annonymity (is this a security issue?)

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 22: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

22

© 2004 Ravi Sandhuwww.list.gmu.edu

Security in Data Sharing Systems• Availability

• DOS attack, e.g., chosen-victim attack– Use “amplification” mechanism of P2P system

• File availability• File authenticity

• How do I know this is the file I am looking for?• Anonymity

• Lots of work in this area• Need anonymity at all layers of the network stack

• Access Control• DRM• Usage Control

From Open Problems in Data-Sharing Peer-to-PeerSystems, Neil Daswani, Hector Garcia-Molina, and Beverly Yang, LNCS 2572, pp. 1–15, 2003.

Page 23: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.

23

© 2004 Ravi Sandhuwww.list.gmu.edu

Security in Data Sharing Systems(P2P Overlay Networks)

• Routing• Secure nodeId assignment• Robust routing primitives• Ejecting misbehaving nodes

• Storage• Quota architectures• Distributed auditing• Other forms of fairness

• Trust

From A Survey of Peer-to-Peer Security Issues, Dan S.Wallach, LNCS 2609, pp. 42–57, 2003..