1 collusive piracy prevention in p2p content delivery networks source: ieee transactions on...

19
1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong Lou, and Ka i Hwang Speaker: Shu-Fen Chiou ( 邱邱邱 )

Upload: deborah-mckenzie

Post on 18-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

1

Collusive Piracy Prevention inP2P Content Delivery Networks

Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009Authors: Xiaosong Lou, and Kai HwangSpeaker: Shu-Fen Chiou ( 邱淑芬 )

Page 2: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

2

Introduction Distributed P2P network Application: File sharing Roles:

Peers: Normal users. Colluders: Pay but share files illegally. Pirates: Not pay and want to get files illegally. Transaction Server: Give the copyright when

users paying the money. Private Key Generator (PKG) Distribution agent (also called bootstrap

server): Peers ask several peers as their agent.

Page 3: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

3

解決的問題 問題 : 在 P2P 檔案分享的環境中,會有不想付費的使

用者 (pirate) 想得到檔案。也會有已付費取得檔案的使用者 (colluder) 非法分享檔案。

本篇論文主要要解決 pirate 的問題,要使得當 pirate要取得檔案時一定不會拿到完整正確的檔案,另外也盡量偵測並避免 colluder 的問題。

Page 4: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

4

Requirements

Peer endpoint address is forgery proof.

Authorization tokens cannot be shared by peers.

Pirates cannot poison legitimate clients.

Stolen private key are useless to pirates.

),,),,(( StTp s

Page 5: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

5

Copyright-protected P2P Networks

Page 6: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

6

Mechanisms for Copyright Protection

Mechanism Protocol Requirements

Secure file Indexing

File index format is modified to include token and IBS signature.

Peer Authorization Protocol (PAP)

Peer sends digital receipt to bootstrap agent and obtain an authorization token. The token must be refreshed periodically.

Proactive Content

Poisoning

The token and IBS signature check all download request and responses. Sending clean or poisoned content, accordingly.

Random Collusion

Prevention

Distribution agents randomly recruit decoys to probe for colluders. Collusion reports are weighted against client trust rates.

Page 7: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

7

Secure file Indexing

signature sPeer':

Timestamp:

Token:

addressendpoint sPeer':

id File:

),,),,((),(

S

t

T

p

StTpp

s

s

Page 8: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

8

Protected peer joining process

{Bootstrap address, Ek(digital_rceipt, Bootstrap_Agent_session_key)}

Ek(digital_rceipt)

Algorithm 1: Token Generation

Page 9: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

9

Token GenerationCustomer peer

Bootstrap agent PKG

Check receiptλ= Decrypt(Receipt)p = Observe(requestor)

Token T = OwnerSign(f, p, ts)Reply = {k, p, ts, T}

Request private key

k

{Encrypt(Reply)}

Generate k

Decrypt(Reply)

Page 10: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

10

Observe requester

Bootstrap server ask peer’s router to get its real endpoint to check whether correct with digital receipt.

Page 11: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

11

Proactive Content Poisoning

Algorithm 2: Peer Authorization Protocol

Page 12: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

12

Peer Authorization Protocol

Input: T = token, ts = timestamp, S = peer signature, and φ(λ, p) = file index for file at endpoint pOutput: Peer authorization statusTrue: authorization grantedFalse: authorization deniedProcedures :01: Parse (input) = {T, ts, S, φ(λ, p) }// Check all credentials from a input request02: p = Observe(requestor);// detect peer endpoint address p 03: if {Match (S, p) fails}, //Fake endpoint address p detected return false;04: endif05: if {Match(T, ts, K) fails}, return false; // Invalid or expired token detected 06: endif07: return true;

Page 13: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

13

Random Collusion Prevention

ij

Collusion vector C={ci}Trust vector T={ti}/1 ii ct

ic0

j

ij

ijijj

cj

r

njirtcc

ifcolluder a is

ratecondition is

,1 allfor },min{ rateCollusion

2.51,2.5}1min{1.6

1 ratecondition get we, probe torecuir

6.1

1

0

5.2

j

ij

j

i

i

c

rji

c

t

c

e.g.

Page 14: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

14

Security analysis Peer endpoint address is forgery proof

IP spoofing: Pirate will not receive file. Intercept the token: Observe().

Authorization tokens cannot be shared by peers

T = OwnerSign(f, p, ts) Pirates cannot poison legitimate clients

File index Stolen private key are useless to pirates

Endpoint address is public key. Observe().

),,),,(( StTp s

Page 15: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

15

Experimental results•εis collusive rate•chunk poisoning rate δ as the probability of a pirate to receive a poisoned chunk.•1000 pirates

Page 16: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

16

Conclusions

Our protection scheme gives higher priority to satisfy honest clients.

This system is fair to the majority of honest clients who enjoy P2P content delivery services.

Page 17: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

17

本篇之優缺點及可能研究方向 優點 :

Pirates 在 P2P 檔案分享中是一個很重要的議題。沒有辦法完全杜絕 pirates 的情形下,利用檔案分享時是將檔案分割成很多小片段傳輸,而 pirates 是無法收到一份成功的檔案。

安全和模擬分析很完整。

Page 18: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

18

本篇之優缺點及可能研究方向 缺點:

若 Bootstrap agents (Distributed agents)也是共謀者,那麼也有可能會讓 peers 認為此 pirate 是合法的。

Observe 這個方式是否真可實行,抱持著懷疑的態度。

Page 19: 1 Collusive Piracy Prevention in P2P Content Delivery Networks Source: IEEE Transactions on Computers, vol. 58, no. 7, pp. 970-983, 2009 Authors: Xiaosong

19

本篇之優缺點及可能研究方向 可能研究方向:

針對 pirates 的問題進行研究,加入之前讀得 reputation 相關的論文,研究是否也能達到可以偵測出 pirates 及 colluders 並避免 pirates 不會得到正確的檔案。