23
© 2004-5 Ravi Sandh www.list.gmu.edu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]

© 2004-5 Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

Embed Size (px)

Citation preview

Page 1: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

© 2004-5 Ravi Sandhuwww.list.gmu.edu

Security Issues in P2P Systems

Prof. Ravi SandhuLaboratory for Information Security Technology

George Mason University

www.list.gmu.edu

[email protected]

Page 2: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

2

© 2004 Ravi Sandhuwww.list.gmu.edu

Mainframe → Client-Server → P2P

• Mainframe era:• 1970’s• Dumb terminals connected to a big mainframe • Mainframes possibly networked together

• Client-server:• Late 1980’s• Many clients, 1 user per client• Dedicated servers• Single client can access multiple servers• Significant computing resources on client

• Peer-to-Peer (P2P)• Late 1990’s• Each computer is a client and a server• Takes on whatever role is appropriate for a given task at a given time• Harnesses computing and communication power of the entire network

Page 3: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

3

© 2004 Ravi Sandhuwww.list.gmu.edu

P2P versus Client-Server: Idealized View

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 4: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

4

© 2004 Ravi Sandhuwww.list.gmu.edu

No Clear Border

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 5: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

5

© 2004 Ravi Sandhuwww.list.gmu.edu

Hybrid P2P Systems

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 6: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

6

© 2004 Ravi Sandhuwww.list.gmu.edu

P2P Perspective

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 7: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

7

© 2004 Ravi Sandhuwww.list.gmu.edu

Napster

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Page 8: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

8

© 2004 Ravi Sandhuwww.list.gmu.edu

Power Server

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Page 9: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

9

© 2004 Ravi Sandhuwww.list.gmu.edu

Power Server Coordinator

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Page 10: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

10

© 2004 Ravi Sandhuwww.list.gmu.edu

Comparison of Different P2P Models

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Page 11: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

11

© 2004 Ravi Sandhuwww.list.gmu.edu

Taxonomy of Computer Systems

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 12: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

12

© 2004 Ravi Sandhuwww.list.gmu.edu

Taxonomy of P2P Systems

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 13: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

13

© 2004 Ravi Sandhuwww.list.gmu.edu

Classification of P2P Systems

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 14: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

14

© 2004 Ravi Sandhuwww.list.gmu.edu

Taxonomy of P2P Applications

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 15: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

15

© 2004 Ravi Sandhuwww.list.gmu.edu

Taxonomy of P2P Markets

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 16: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

16

© 2004 Ravi Sandhuwww.list.gmu.edu

P2P Markets versus P2P Applications

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 17: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

17

© 2004 Ravi Sandhuwww.list.gmu.edu

P2P System Architecture

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 18: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

18

© 2004 Ravi Sandhuwww.list.gmu.edu

Security Issues in P2P Systems

• Many old issues carry over

• New issues emerge

• Old issues are re-emphasized

Page 19: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

19

© 2004 Ravi Sandhuwww.list.gmu.edu

Security

• Protection against malicious downloaded P2P application code

• Enabling technologies• Java sandboxing• Trusted computing

From THE FUTURE OF PEER-TO-PEER COMPUTING, Loo, CACM Sept 2003

Old issue re-emphasized

Page 20: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

20

© 2004 Ravi Sandhuwww.list.gmu.edu

Security (claimed to be new issues)

• Multi-key encryption• Annonymity requirement for Publius

• Sandboxing

• Digital Rights Management

• Reputation and Accountability

• Firewall Traversal and Hidden Peers

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 21: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

21

© 2004 Ravi Sandhuwww.list.gmu.edu

Annonymity (is this a security issue?)

From Peer-to-Peer Computing, Milojicic et al, HP Laboratories, HPL-2002-57, March 8th, 2002

Page 22: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

22

© 2004 Ravi Sandhuwww.list.gmu.edu

Security in Data Sharing Systems• Availability

• DOS attack, e.g., chosen-victim attack– Use “amplification” mechanism of P2P system

• File availability• File authenticity

• How do I know this is the file I am looking for?• Anonymity

• Lots of work in this area• Need anonymity at all layers of the network stack

• Access Control• DRM• Usage Control

From Open Problems in Data-Sharing Peer-to-PeerSystems, Neil Daswani, Hector Garcia-Molina, and Beverly Yang, LNCS 2572, pp. 1–15, 2003.

Page 23: © 2004-5 Ravi Sandhu  Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University

23

© 2004 Ravi Sandhuwww.list.gmu.edu

Security in Data Sharing Systems(P2P Overlay Networks)

• Routing• Secure nodeId assignment• Robust routing primitives• Ejecting misbehaving nodes

• Storage• Quota architectures• Distributed auditing• Other forms of fairness

• Trust

From A Survey of Peer-to-Peer Security Issues, Dan S.Wallach, LNCS 2609, pp. 42–57, 2003..