the darknet and the future of content distribution by shruthi b krishnan

17
The Darknet and the Future of Content Distribution by by Shruthi B Krishnan Shruthi B Krishnan

Post on 20-Dec-2015

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

The Darknet and the Future of Content

Distributionby by

Shruthi B KrishnanShruthi B Krishnan

Page 2: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

AgendaAgenda

IntroductionIntroduction What is darknet?What is darknet? Features of darknetFeatures of darknet Evolution of darknetEvolution of darknet Introducing content into darknetIntroducing content into darknet Methods of policingMethods of policing ConclusionsConclusions

Page 3: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

IntroductionIntroduction

Copying or distributing content in digital format is Copying or distributing content in digital format is easiereasier

Legal vs. illegal distribution of contentLegal vs. illegal distribution of content Terms usedTerms used

• ObjectsObjects

• UsersUsers

• HostsHosts

Page 4: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

What is darknet?What is darknet? Darknet is a collection of networks and technologies used to Darknet is a collection of networks and technologies used to

share digital contentshare digital content AssumptionsAssumptions

• Any widely distributed object is available to some users in a form that Any widely distributed object is available to some users in a form that permits copyingpermits copying

• Users copy available and interesting objects Users copy available and interesting objects • Users have high-bandwidth channelsUsers have high-bandwidth channels

Infrastructure requirementsInfrastructure requirements Input facilitiesInput facilities Transmission facilitiesTransmission facilities Output facilitiesOutput facilities Search mechanisms/ database Search mechanisms/ database Caching mechanismCaching mechanism

Target infrastructure requirements to fight darknetTarget infrastructure requirements to fight darknet

Page 5: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Evolution of darknet –Evolution of darknet –Early Small-World networksEarly Small-World networks

““Sneaker net” of floppy disks and tapesSneaker net” of floppy disks and tapes LimitationsLimitations

• LatencyLatency

• Lack of search enginesLack of search engines Interconnected Small-World networksInterconnected Small-World networks

Page 6: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Evolution of darknet – contdEvolution of darknet – contdCentral Internet ServersCentral Internet Servers

Internet displaced sneaker net – reduced latency and Internet displaced sneaker net – reduced latency and powerful search mechanismspowerful search mechanisms

Centralized storage and searchCentralized storage and search Efficient for legal online commerceEfficient for legal online commerce Poor support for illegal object distributionPoor support for illegal object distribution

Page 7: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Evolution of darknet – contdEvolution of darknet – contdPeer-to-peer networks (Napster)Peer-to-peer networks (Napster)

Distributed storage of objects – injection, storage, Distributed storage of objects – injection, storage, distribution & consumption of objects done by usersdistribution & consumption of objects done by users

Centralized database for searching – became the legal Centralized database for searching – became the legal targettarget

Page 8: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Evolution of darknet – contdEvolution of darknet – contdPeer-to-peer networks (Gnutella)Peer-to-peer networks (Gnutella)

Distributed object storage and distributed databaseDistributed object storage and distributed database To reach any host on Gnutella darknet, a peer needs To reach any host on Gnutella darknet, a peer needs

one or few participating peer-IP addressesone or few participating peer-IP addresses Open protocolOpen protocol

Page 9: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Fully distributed darknetsFully distributed darknets

How robust are they?How robust are they? Free ridingFree riding

• Downloading objects without sharing themDownloading objects without sharing them• Some users sacrifice their resources, free-riders Some users sacrifice their resources, free-riders

don’tdon’t Lack of anonymityLack of anonymity

• Server end-points can be determinedServer end-points can be determined

Page 10: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Fully distributed darknets –Fully distributed darknets –AttacksAttacks

Page 11: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Introducing content into Introducing content into darknet –darknet –

Conditional Access systemsConditional Access systems

Subscribers are given access to objects based Subscribers are given access to objects based on a service contracton a service contract

Customers have no access to channels they are Customers have no access to channels they are not entitled tonot entitled to

Can freely use channels subscribed forCan freely use channels subscribed for

Page 12: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Introducing content into Introducing content into darknet (contd) –darknet (contd) –

DRM systemsDRM systems

Client obtainsClient obtains• Encrypted contentEncrypted content• License specifying how to useLicense specifying how to use

BOBE-strong vs. BOBE-weak systemsBOBE-strong vs. BOBE-weak systems

RenewabilityRenewability

Page 13: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Introducing content into Introducing content into darknet (contd) –darknet (contd) –

using softwareusing software

Mainly used to secure computer programsMainly used to secure computer programs

Bind software to a host – program won’t work on an Bind software to a host – program won’t work on an unlicensed machineunlicensed machine

Machine id should not be virtualizableMachine id should not be virtualizable

Code to perform bind-checks should be resistant to Code to perform bind-checks should be resistant to tamperingtampering

Page 14: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Policing hosts – Policing hosts – WatermarkingWatermarking

Embeds an indelible, invisible mark on contentEmbeds an indelible, invisible mark on content

Concerns about the robustness of the Concerns about the robustness of the embedding layerembedding layer

Key managementKey management

Watermark detectors in software or hardwareWatermark detectors in software or hardware

Page 15: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Policing hosts (contd) – Policing hosts (contd) – FingerprintingFingerprinting

Supplier marks the object with an individualized Supplier marks the object with an individualized mark identifying the purchasermark identifying the purchaser

If shared on darknet, purchaser is identifiedIf shared on darknet, purchaser is identified

No key-distribution neededNo key-distribution needed

ExpensiveExpensive

Collusion attacksCollusion attacks

Page 16: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

ConclusionConclusion

Technological implicationsTechnological implications• Even strong DRM systems can failEven strong DRM systems can fail

• Watermark detectors have not made an impactWatermark detectors have not made an impact

Competition to legal commerceCompetition to legal commerce

Evidence that darknet will continue to existEvidence that darknet will continue to exist

Page 17: The Darknet and the Future of Content Distribution by Shruthi B Krishnan

Questions….Questions….