Ozone: Framework for Securing Peer to Peer Network

Post on 07-Apr-2017

173 views 2 download

transcript

Framework for Securing Peer to Peer Network

By Hrishikesh Kale

Amol JagtapAbhinav KadamPravin Kalbhor

Guided ByMr. Tejas Lagad, Product Manager, Symantec

Prof. Rajesh Ingale, HOD Computer Department, PICT

Sponsored By

•Worms and Viruses

•Data sniffing

•Corrupted data sharing

To develop a framework for building a secured peer to peer network for file sharing application. This P2P network will enable the peers to search and securely download a specific file.

Ozone Ozone

Underlying Network(JXTA)

User

Shared Folders

Database

P2P Network

DEMO

APPLICATION

Certificate Authority

OzoneFramework

Tamper ProofingIndexing and SearchingPeer Rating

Certifying the peer by assigning Digital certificate.

File ownership preservation. Use of third party CA and PKI infrastructure.

Initialize or Reinstall the Certificate Authority

Issue Certificate

Key Store

P2P Network

Peer

<Peer Certificate> <Peer ID> urn:jxta:uuid-SAMPLE PEER ID 472

</PeerID> <Public Key> </Public Key> </Peer Certificate>

Peer Certificate

Private Key of CA

Public Key of Peer

<Peer Certificate> </Peer Certificate> <Item Details>

< Relative File paths> </Relative File paths> < File Checksums > </ File Checksums > < /Item Details >

Item Certificate

Private Key of Peer

Case 1: Creating Certificates

Certificate AuthorityPeer A

Private | Public Key pair Private | Public Key pair

Peer A Peer B

Saint anger.mp3

Case 2: Sharing data Public Key CA

Saint anger.mp3

Peer B Peer C

Saint anger.mp3

Case 3: Ownership preservation Public Key CA

Saint anger.mp3

Peer B Peer C

Saint anger.mp3

Case 4: Tamper proofing Public Key CA

Index database Index Access Permissions Keyword search

Item rating Peer rating Cascaded Rating

Rating

ShareFolder UploadDownload

TamperProofing

Index Cryptics

Database

GUI

Commercial Viability

Build a secured P2P network

Secure standalone applications

[1] Mastering JXTA By Joseph D. Gradecki [2] Security Programming CookBook for C and C++ By Matt Meissier, John Viega [3] Malicious Threats of Peer-to-Peer Networking

By Eric Chien, Symantec Security Response. [4] The Stanford Peers

http://infolab.stanford.edu/peers/

References

Demo Application