the darknet and the future of content distribution by shruthi b krishnan
Post on 20-Dec-2015
224 views
TRANSCRIPT
The Darknet and the Future of Content
Distributionby by
Shruthi B KrishnanShruthi B Krishnan
AgendaAgenda
IntroductionIntroduction What is darknet?What is darknet? Features of darknetFeatures of darknet Evolution of darknetEvolution of darknet Introducing content into darknetIntroducing content into darknet Methods of policingMethods of policing ConclusionsConclusions
IntroductionIntroduction
Copying or distributing content in digital format is Copying or distributing content in digital format is easiereasier
Legal vs. illegal distribution of contentLegal vs. illegal distribution of content Terms usedTerms used
• ObjectsObjects
• UsersUsers
• HostsHosts
What is darknet?What is darknet? Darknet is a collection of networks and technologies used to Darknet is a collection of networks and technologies used to
share digital contentshare digital content AssumptionsAssumptions
• Any widely distributed object is available to some users in a form that Any widely distributed object is available to some users in a form that permits copyingpermits copying
• Users copy available and interesting objects Users copy available and interesting objects • Users have high-bandwidth channelsUsers have high-bandwidth channels
Infrastructure requirementsInfrastructure requirements Input facilitiesInput facilities Transmission facilitiesTransmission facilities Output facilitiesOutput facilities Search mechanisms/ database Search mechanisms/ database Caching mechanismCaching mechanism
Target infrastructure requirements to fight darknetTarget infrastructure requirements to fight darknet
Evolution of darknet –Evolution of darknet –Early Small-World networksEarly Small-World networks
““Sneaker net” of floppy disks and tapesSneaker net” of floppy disks and tapes LimitationsLimitations
• LatencyLatency
• Lack of search enginesLack of search engines Interconnected Small-World networksInterconnected Small-World networks
Evolution of darknet – contdEvolution of darknet – contdCentral Internet ServersCentral Internet Servers
Internet displaced sneaker net – reduced latency and Internet displaced sneaker net – reduced latency and powerful search mechanismspowerful search mechanisms
Centralized storage and searchCentralized storage and search Efficient for legal online commerceEfficient for legal online commerce Poor support for illegal object distributionPoor support for illegal object distribution
Evolution of darknet – contdEvolution of darknet – contdPeer-to-peer networks (Napster)Peer-to-peer networks (Napster)
Distributed storage of objects – injection, storage, Distributed storage of objects – injection, storage, distribution & consumption of objects done by usersdistribution & consumption of objects done by users
Centralized database for searching – became the legal Centralized database for searching – became the legal targettarget
Evolution of darknet – contdEvolution of darknet – contdPeer-to-peer networks (Gnutella)Peer-to-peer networks (Gnutella)
Distributed object storage and distributed databaseDistributed object storage and distributed database To reach any host on Gnutella darknet, a peer needs To reach any host on Gnutella darknet, a peer needs
one or few participating peer-IP addressesone or few participating peer-IP addresses Open protocolOpen protocol
Fully distributed darknetsFully distributed darknets
How robust are they?How robust are they? Free ridingFree riding
• Downloading objects without sharing themDownloading objects without sharing them• Some users sacrifice their resources, free-riders Some users sacrifice their resources, free-riders
don’tdon’t Lack of anonymityLack of anonymity
• Server end-points can be determinedServer end-points can be determined
Fully distributed darknets –Fully distributed darknets –AttacksAttacks
Introducing content into Introducing content into darknet –darknet –
Conditional Access systemsConditional Access systems
Subscribers are given access to objects based Subscribers are given access to objects based on a service contracton a service contract
Customers have no access to channels they are Customers have no access to channels they are not entitled tonot entitled to
Can freely use channels subscribed forCan freely use channels subscribed for
Introducing content into Introducing content into darknet (contd) –darknet (contd) –
DRM systemsDRM systems
Client obtainsClient obtains• Encrypted contentEncrypted content• License specifying how to useLicense specifying how to use
BOBE-strong vs. BOBE-weak systemsBOBE-strong vs. BOBE-weak systems
RenewabilityRenewability
Introducing content into Introducing content into darknet (contd) –darknet (contd) –
using softwareusing software
Mainly used to secure computer programsMainly used to secure computer programs
Bind software to a host – program won’t work on an Bind software to a host – program won’t work on an unlicensed machineunlicensed machine
Machine id should not be virtualizableMachine id should not be virtualizable
Code to perform bind-checks should be resistant to Code to perform bind-checks should be resistant to tamperingtampering
Policing hosts – Policing hosts – WatermarkingWatermarking
Embeds an indelible, invisible mark on contentEmbeds an indelible, invisible mark on content
Concerns about the robustness of the Concerns about the robustness of the embedding layerembedding layer
Key managementKey management
Watermark detectors in software or hardwareWatermark detectors in software or hardware
Policing hosts (contd) – Policing hosts (contd) – FingerprintingFingerprinting
Supplier marks the object with an individualized Supplier marks the object with an individualized mark identifying the purchasermark identifying the purchaser
If shared on darknet, purchaser is identifiedIf shared on darknet, purchaser is identified
No key-distribution neededNo key-distribution needed
ExpensiveExpensive
Collusion attacksCollusion attacks
ConclusionConclusion
Technological implicationsTechnological implications• Even strong DRM systems can failEven strong DRM systems can fail
• Watermark detectors have not made an impactWatermark detectors have not made an impact
Competition to legal commerceCompetition to legal commerce
Evidence that darknet will continue to existEvidence that darknet will continue to exist
Questions….Questions….