Routing in the Dark: Pitch Black

Total Page:16

File Type:pdf, Size:1020Kb

Routing in the Dark: Pitch Black Routing in the Dark: Pitch Black Nathan S. Evans Chris GauthierDickey Christian Grothoff Colorado Research Institute for Security and Privacy Department of Computer Science University of Denver, USA fnatevans,chrisg,[email protected] Abstract 1 Introduction In many networks, such as mobile ad-hoc networks and Fully decentralized and efficient routing algorithms for friend-to-friend overlay networks, direct communication restricted route networks promise to solve crucial problems between nodes is limited to specific neighbors. Often these for a wide variety of networking applications. Efficient de- networks have a small-world topology; while short paths centralized routing is important for sensor and general wire- exist between any pair of nodes in small-world networks, it less networks, peer-to-peer overlay networks and theoreti- is non-trivial to determine such paths with a distributed al- cally even next generation Internet (IP) routing. A number gorithm. Recently, Clarke and Sandberg proposed the first of distributed peer-to-peer routing protocols developed in decentralized routing algorithm that achieves efficient rout- recent years achieve scalable and efficient routing by con- ing in such small-world networks. structing a structured overlay topology [4,5,8, 11, 15]. However, all of these designs are unable to work in real- This paper is the first independent security analysis of world networks with restricted routes. In a restricted route Clarke and Sandberg’s routing algorithm. We show that topology, nodes can only directly communicate with a sub- a relatively weak participating adversary can render the set of other nodes in the network. Such restrictions arise overlay ineffective without being detected, resulting in sig- from a variety of sources, such as physical limitations of nificant data loss due to the resulting load imbalance. We the communications infrastructure (wireless signals, physi- have measured the impact of the attack in a testbed of 800 cal network topology), policies (firewalls) or limitations of nodes using minor modifications to Clarke and Sandberg’s underlying protocols (NAT, IPv6-IPv4 interaction). implementation of their routing algorithm in Freenet. Our Recently, a new routing algorithm for restricted route experiments show that the attack is highly effective, allow- topologies was proposed [13] and implemented in version ing a small number of malicious nodes to cause rapid loss 0.7 of Freenet, an anonymous peer-to-peer file-sharing net- of data on the entire network. work [3]. The proposed algorithm achieves routing in expected O(log n) hops for small-world networks with n We also discuss various proposed countermeasures de- nodes and O(log n) neighbors1 by having nodes swap lo- signed to detect, thwart or limit the attack. While we were cations in the overlay under certain conditions. This sig- unable to find effective countermeasures, we hope that the nificant achievement raises the question of whether the al- presented analysis will be a first step towards the design gorithm is robust enough to become the foundation for the of secure distributed routing algorithms for restricted-route large domain of routing in restricted route networks. topologies. The research presented in this paper shows that any par- ticipating node can severely degrade the performance of the routing algorithm by changing the way it participates in the location swapping aspect of the protocol. Most of 1Given only a constant number of neighbors, the routing cost increases to O(log2 n). 1 the guards in the existing routing implementation are in- scale studies have shown that over 70% of machines are effective or severely limited and in particular fail to re- NATed [1]. liably detect the malicious nodes. Experiments using a In contrast to the DHT designs from Table2, the Freenet Freenet testbed show that a small fraction of malicious routing algorithm achieves expected O(log n) routing in re- nodes can dramatically degenerate routing performance and stricted route topologies under the assumption that the re- cause massive content loss in a short period of time. Our re- stricted network topology has small-world properties. search also illuminates why churn impacts the structure of the overlay negatively, a phenomenon that was observed by 2.2 Small-world networks Freenet users in practice but has, to the best of our knowl- edge, never been explained. A small-world network is informally defined as a net- The paper is structured as follows. Section2 describes work where the average shortest path between any two related work focusing on distributed hash tables and small- nodes is “small” compared to the size of the network, where world networks. Section3 details Freenet’s distributed “small” is generally considered to mean at least logarithmic friend-to-friend (or, as termed by the Freenet authors, in relation to the size of the network. Small world networks “darknet”) routing algorithm for small-world networks. The occur frequently in the real world [17], the most prominent proposed attack is described in Section4, followed by ex- example being social networks [9]. perimental results showing the effects of the attack in Sec- Watts and Strogatz [17] characterized small-world net- tion5. Possible defenses and their limitations are discussed works as an intermediate stage between completely struc- in Section6. tured networks and random networks. According to their definition, small world networks with n nodes have on av- 2 Related Work erage k edges per vertex where n >> k >> log n. They 2.1 Distributed hash tables define a clustering coefficient which captures the amount of structure (clustering) in a given network. Small-world net- A distributed hash table is a data structure that enables works are then networks with a clustering coefficient sig- efficient key-based lookup of data in a peer-to-peer overlay nificantly larger than the coefficients of completely random network. Generally, the participating peers maintain con- networks and with average shortest path lengths close to nections to a relatively small subset of the other participants those of completely random networks. Watts and Strogatz’s in the overlay. Each peer is responsible for storing a sub- work explains why short paths exist in real-world networks. set of the key-value pairs and for routing requests to other Kleinberg [6,7] generalized Watts and Strogatz’ con- peers. In other words, a key property of the use of DHTs in struction of small-world networks and gave sufficient and a peer-to-peer setting is the need to route queries in a net- necessary conditions for the existence of efficient dis- work over multiple hops based on limited knowledge about tributed routing algorithms for these constructions. Klein- which peers exist in the overlay network. Part of the DHT berg’s model for distributed routing algorithms does not in- protocol definition is thus concerned with maintaining the clude the possibility of nodes swapping locations, which is a structure of the network as peers join or leave the overlay. fundamental part of Freenet’s “darknet” routing algorithm. DHT designs can be characterized using the performance metrics given in Table1. Routing in DHTs is generally 3 Freenet’s “darknet” routing algorithm done in a greedy fashion and resembles lookups in skip lists [10]. Table2 summarizes the key properties of various Freenet [3] is a peer-to-peer network where the operator existing DHT designs. The table does not capture properties of each node specifies which other peers are allowed to con- which are hard to quantify, such as fault-tolerance. Given nect to the node [2]. The main reason for this is to obscure a uniform distribution of keys, most existing DHT designs the participation of a node in the network – each node is achieve near perfect load balancing between peers. Hosts only directly visible to the friends of its’ operator. Peer-to- that can provide significantly more resources than others are peer networks that limit connections to friend-to-friend in- usually accommodated by associating multiple locations in teractions are sometimes called darknets. Given that social the overlay with a single host. In some sense, those hosts networks are small-world networks and that small-world are counted as multiple peers. networks arise easily given a certain amount of “random- A major limitation of the DHT designs listed in Ta- ness” in the graph construction, it is realistic to assume that ble2 is that they do not support routing in restricted route Freenet’s darknet is a small-world network. The routing topologies. These DHTs assume that it is generally possi- restrictions imposed on the Freenet overlay could techni- ble for any peer to connect to any other peer. However, fire- cally model arbitrary network limitations; consequently, an walls and network address translation (NAT) make this as- efficient distributed routing algorithm for such a topology sumption unrealistic over the current Internet, where large- should easily generalize to any small-world network. (1) Messages required for each key lookup (2) Messages required for each store operation (3) Messages needed to integrate a new peer (4) Messages needed to manage a peer leaving (5) Number of connections maintained per peer (6) Topology can be adjusted to minimize per-hop latency (yes/no) (7) Connections are symmetric or asymmetric Table 1. Performance metrics for DHTs. Chord [15] Pastry [12] Kademlia [8] CAN [11] RSG [5] (1) O(log n) O(log n) O(log n) O(n−d) O(log n) (2) O(log n) O(log n) O(log n) O(n−d) O(log n) (3) O(log2 n) O(log n) O(log n) O(d + n−d) O(log n) (4) O(log2 n) O(1) O(1) O(d) O(log n) (5) O(log n) O(log n) O(log n) O(d) O(1) (6) no yes yes yes no (7) asymmetric asymmetric symmetric symmetric asymmetric Table 2.
Recommended publications
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Gnutella and Freenet
    Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes [email protected] University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although traditional network file systems like NFS provide a reliable way for users on a LAN to pool and share data, Internet-wide file sharing is still in its infancy. Software developers and researchers are struggling to find new ways to reliably, efficiently and securely share data across wide area networks that are plagued by high latency, bottlenecks, and unreliable or malicious nodes. This paper will focus on decentralized file sharing networks that allow free Internet-wide participation with generic content. A decentralized network has no central authority, which means that it can operate with freely running nodes alone (peer-to-peer, or P2P). Much of the current research into file sharing focuses on such systems, after the repeated failure of commercially-oriented networks such as Napster™ and Morpheus™ demonstrated that centralized and purely multimedia-based systems were unsuitable for long-term use by the general Internet public. Building a useful decentralized file sharing network is no small feat, but an effective system will be a remarkable accomplishment for the modern Internet. A robust, massive content distribution network will have a multitude of uses. The huge amount of accessible data (already into hundreds of terabytes on existing networks) and enormous transfer capacity at little or no cost to individual participants demonstrates the value of such a system, which may soon become a core Internet technology akin to the World Wide Web. Such large, anonymous networks seem quite natural for the Internet, as they demonstrate the epitome of pooling resources for the mutual benefit of all users.
    [Show full text]
  • Agchain: a Blockchain-Based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets
    AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets Mengjie Chen Daoyuan Wu∗ The Chinese University of Hong Kong The Chinese University of Hong Kong [email protected] [email protected] Xiao Yi Jianliang Xu The Chinese University of Hong Kong Hong Kong Baptist University [email protected] [email protected] ABSTRACT policies and delist the apps as they wish. For example, Mobile app markets are emerging with the popularity of 13.7% (1,146) of the 8,359 popular apps we measured smartphones. However, they fall short in several aspects, in late 2018 have been delisted (by either the market including no transparent app listing, no world-wide app ac- or developers themselves) after one year in late 2019. cess, and even insecure app downloading. To address these P2: No world-wide and even censored access. Secondly, problems, we propose a novel blockchain-based gateway, many apps on Google Play and Apple Store are avail- AGChain, to bridge end users and app markets so that ex- able only in certain countries. Moreover, Google Play isting app markets could still provide services while users itself is being censored in some regions, causing no enjoy permanent, distributed, and secure app delegation from easy app access for the users in those affected areas. AGChain. To this end, we identify two previously underesti- P3: No enough security guarantee. Thirdly, we find that a mated challenges and propose mechanisms to significantly significant portion of third-party Android app markets reduce gas costs in our smart contract and make IPFS (Inter- do not provide secure app downloading.
    [Show full text]
  • A Blockchain-Based Spatial Data Trading Frame
    A Blockchain-Based Spatial Data Trading Framework liu hui Beijing Normal University WeiPeng Tai Anhui University of Technology Yaofei Wang Beijing Normal University Wang Shenling ( [email protected] ) Beijing Normal University Research Keywords: spatial data, data trading, data pricing, Blockchain Posted Date: January 23rd, 2021 DOI: https://doi.org/10.21203/rs.3.rs-150049/v1 License: This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License 1 Liu et al. 2 3 4 5 6 RESEARCH 7 8 9 A Blockchain-Based Spatial Data Trading Frame- 10 11 12 work 13 1,2 14 Hui Liu 2 1 1* 15 , WeiPeng Tai , Yaofei Wang and Shenling Wang 16 17 *Correspondence: [email protected] 18 1School of Artificial Intelligence, Abstract Beijing Normal University, Beijing, 19 China With the increasing utilization of space related data, the demand for spatial big 20 Full list of author information is data sharing and trading is growing rapidly, which promotes the emergence of 21 available at the end of the article spatial data market. However, in conventional data markets, both data buyers and 22 data sellers have to use a centralized trading platform which might be dishonest. 23 Blockchain is a decentralized distributed data storage technology, which uses the 24 traceability and unforgeability to confirm and record each transaction, can solve 25 the disadvantages of the centralized data market, however, it also introduces the 26 problems of security and privacy. 27 To address this issue,in this paper,we propose a blockchain-based spatial data 28 29 trading framework with Trusted Execution Environment to provide a trusted de- 30 centralized platform, including data storage, data query, data pricing and security 31 computing.
    [Show full text]
  • The Gnunet System Christian Grothoff
    The GNUnet System Christian Grothoff To cite this version: Christian Grothoff. The GNUnet System. Networking and Internet Architecture [cs.NI]. Université de Rennes 1, 2017. tel-01654244 HAL Id: tel-01654244 https://hal.inria.fr/tel-01654244 Submitted on 3 Dec 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License 1 Th`esed'habilitation `adiriger des recherches Universit´eede Rennes 1 Mention: Informatique The GNUnet System Christian Grothoff Soutenue le 10 octobre 2017 devant le jury compos´ede Messieurs les Professeurs: Anne-Marie Kermarrec (Universit´ede Rennes 1) Tanja Lange (Technische Universiteit Eindhoven) George Danezis (University College London) Joe Cannataci (University of Groningen) Saddek Bensalem (University of Grenoble) Au vu des rapports de Messieurs les Professeurs: Tanja Lange (Technische Universiteit Eindhoven) George Danezis (University College London) Saddek Bensalem (University of Grenoble) Revision 1.0 2 Abstract GNUnet is an alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Our goal is to replace the old inse- cure Internet protocol stack. Starting from an application for secure publication of files, it has grown to include all kinds of basic protocol components and ap- plications towards the creation of a GNU internet.
    [Show full text]
  • Measuring I2P Censorship at a Global Scale
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • BMG CASE • Linda Wright Legal Editor, Lexisnexis Canada Inc
    Editor-in-Chief: Professor Michael A. Geist, Canada Research Chair in Internet and E-Commerce Law University of Ottawa, Faculty of Law VOLUME 6, NUMBER 5 Cited as (2005-06) 6 I.E.C.L.C. JULY 2005 • AN OVERVIEW OF THE BMG CASE • Linda Wright Legal Editor, LexisNexis Canada Inc. Editor’s note: The BMG v. John Doe case has the Federal Court of Appeal, in the appeal from the generated enormous interest in both the legal com- lower level decision issued by Judge von Fincken- munity and the general public. The editor-in-chief stein, were delivered on May 19, 2005. asked lawyers involved in both sides of the case to provide their perspective on the recent decision and THE FACTS its implications. Thanks to Linda Wright for prepar- ing an excellent overview on the trial and appellate The lower level court had denied a motion brought decisions. by a number of corporations in the recording industry business. These plaintiffs had sought disclosure by BMG Canada Inc. v. John Doe, [2004] F.C.J. No. certain ISPs of the identity of customers said to be 525 (QL), [2004] 3 F.C.R. 241; app’l dismissed, guilty of copyright infringement by trading in music [2005] F.C.J. No. 858 (C.A) (QL). The reasons of downloaded from the Internet. The plaintiffs could not identify these Internet users because they operated under pseudonyms related to software. The plaintiffs sought relief by relying on Federal Court Rules, • In This Issue • 1998, SOR/98-106, Rules 233 and 238. The plaintiffs said that each of these unidentified defendants had AN OVERVIEW OF THE BMG CASE downloaded in excess of 1,000 songs onto home Linda Wright........................................................37 computers.
    [Show full text]
  • A Distributed Content Addressable Network for Open Educational Resources
    DOI: 10.33965/celda2019_201911C063 16th International Conference on Cognition and Exploratory Learning in Digital Age (CELDA 2019) A DISTRIBUTED CONTENT ADDRESSABLE NETWORK FOR OPEN EDUCATIONAL RESOURCES Stephen Downes National Research Council Canada, Ottawa, Ontario, Canada ABSTRACT We introduce Content Addressable Resources for Education (CARE) as a method for addressing issues of scale, access, management and distribution that currently exist for open educational resources (OER) as they are currently developed in higher education. CARE is based on the concept of the distributed web (dweb) and, using (for example) the Interplanetary File System (IPFS) provides a means to distributed OER in such a way that they cannot be blocked or paywalled, can be associated with each other (for example, as links in a single site, or as newer versions of existing resources) creating what is essentially an open resource graph (ORG), and when accessed through applications such as Beaker Browser, can be cloned and edited by any user to create and share new resources. KEYWORDS Open Educational Resources, Distributed Web, Dat, Interplanetary File System, Open Resource Graph, Content-based Addressing 1. INTRODUCTION The distributed web potentially solves issues proponents of decentralization have long sought to address. One challenge is traffic, which overloads a single server. A second issue is latency, or the lag created by accessing resources half a world away. Additionally, some resources may be subject to national policies creating the need to differentiate access. And finally, if the centralized source is unavailable for some reason, then access for the entire world is disrupted. For the World Wide Web, many of these challenges are addressed with Content Distribution Networks (CDN).
    [Show full text]
  • Music & the Internet MUMT
    Music & the Internet MUMT 301 Ichiro Fujinaga Schulich School of Music McGill University Friday, 30 September, 11 Plan • Music distribution • Copyright • Javascript • Final project ideas: • History of the recording industry in the age of the Internet • Statistical analysis of music sales • Study of international music copyright laws Friday, 30 September, 11 Music Distribution • Music stores (buy to own) • Physical LP, CD, DVD, etc. are shipped • Music tracks delivered online • Music streaming via subscription • Music locker (cloud based) (USA only) • Amazon (cloud player) • Google (Music Beta: up to 20k songs) • Apple: iCloud (5GB free) • iTunes Match ($25/year) Friday, 30 September, 11 Online Music Stores • Physical media are delivered • Amazon.com • Barnes & Noble • Borders (bankrupt 2011/02) • Books-a-Million (BAMM) Friday, 30 September, 11 Amazon vs. Barnes vs. BAMM Amazon Barnes & Noble BAMM 1500.0 1125.0 750.0 375.0 0 Revenue ($100M) Net Income ($M) Employee (100s) Friday, 30 September, 11 Barnes/BAMM/Borders/Amazon Friday, 30 September, 11 Music tracks delivered online (buy to own) • MP3 stores (MP3 downloads) • iTunes • Amazon MP3 (2007/09–; 2008/01– first w/o DRM) • the four majors: EMI, Sony BMG, Universal, & Warner • 2008: 3M songs (256kbps) • hp://www.7digital.com/ (API access) • hp://www.dance-tunes.com/ (plus radio) • MP3 stores via subscripon • hp://www.emusic.com • Record labels • hp://www.armadamusic.com/ • sells CDs directly • downloads via iTunes or other download services • beatport.com • hp://awal.com/ (hp://awal.com/services/distribuon/)
    [Show full text]
  • A Practitioner's View on Distributed Storage Systems
    Technology Innovation Management Review June 2021 (Volume 11, Issue 6) A Practitioner’s View on Distributed Storage Systems: Overview, Challenges and Potential Solutions Michel Legault Filecoin is a decentralized storage market - think of it like Airbnb for cloud storage - where anybody with extra hard drive space can sell it on the network. Juan Benet, Founder/CEO of Protocol Labs and creator of IPFS This paper provides an overview on how content can be managed with a blockchain or other distributed ledger technology (DLT), and what challenges need to be addressed in managing this content as part of transactions. Transactions on a blockchain may require supporting documents, for example, photos, reference documents, or actual contracts. As DLTs becoming an increasingly popular method to complete transactions and share information, several issues are arising that need to be addressed, such as: Where should this electronic content in documents be stored? Will the storage system have the features and functionality to properly manage this content through the “information lifecycle”, including the retention and disposition of business records based on legal and regulatory requirements? The paper presents an overview of the emerging technology involved with distributed storage systems. It presents five solutions currently available, including their designs, how they secure and store files, and whether or not these files can be deleted in order to meet record disposition requirements and regulations. The discussion points out the need for alignment between multiple stakeholders and consortium members in a distributed ledger-based community with shared ecosystem scaling objectives. The challenges of scaling include the need to protect personal and sensitive information, especially when this information should normally be disposed after a record’s retention period has ended.
    [Show full text]
  • Effects of Shared Bandwidth on Anonymity of the I2P Network Users
    Effects of Shared Bandwidth on Anonymity of the I2P Network Users Khalid Shahbar A. Nur Zincir-Heywood Faculty of Computer Science Dalhousie University Halifax, Canada {Shahbar, Zincir}@ cs.dal.ca Abstract—In this paper, we studied the effects of sharing the browsing to websites by using outproxy, the I2P network is bandwidth on the I2P network on the anonymity level it provides designed to work better and more anonymously when to the users. To this end, we explored what could be achieved by accessing the resources within the I2P network. The services a potential attacker on the I2P Network in terms of application (applications) that I2P supports are not limited to browsing and user profiling. In both cases, the effect of bandwidth [10] [23], it supports multiple other services such as file participation has been been analyzed. To achieve this, we used a sharing, Internet Relay Chat, E-mail etc. machine learning based approach to analyze the flows extracted from the traffic generated by the applications and the users. Our I2P network is a decentralized network, there is no central results show that profiling the users and applications on the I2P server managing the network. The network database is stored network is possible. The amount of shared bandwidth has an in “netDb” [11]. The netDb contains “routerInfo” and effect on the accuracy of profiling the users and the applications. “leaseSet”. The rounterInfo contains the required information Furthermore, applications that do not use the shared clients to contact a router. The leaseSet contains the required tunnels increases the possibility to profile the behavior of the information to reach to a destination.
    [Show full text]
  • A Secure Data Sharing Platform Using Blockchain and Interplanetary File System
    sustainability Article A Secure Data Sharing Platform Using Blockchain and Interplanetary File System Muqaddas Naz 1, Fahad A. Al-zahrani 2, Rabiya Khalid 1, Nadeem Javaid 1,*, Ali Mustafa Qamar 3,4, Muhammad Khalil Afzal 5 and Muhammad Shafiq 6,* 1 Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan; [email protected] (M.N.); [email protected] (R.K.) 2 Computer Engineering Department, Umm AlQura University, Mecca 24381, Saudi Arabia; [email protected] 3 Department of Computer Science, College of Computer, Qassim University, Buraydah 51452, Saudi Arabia; [email protected] 4 School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad 44000, Pakistan 5 Department of Computer Science, COMSATS University Islamabad, Wah Cantonment 47040, Pakistan; [email protected] 6 Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Korea * Correspondence: [email protected] (N.J.); shafi[email protected] (M.S.) Received: 16 November 2019; Accepted: 3 December 2019; Published: 10 December 2019 Abstract: In a research community, data sharing is an essential step to gain maximum knowledge from the prior work. Existing data sharing platforms depend on trusted third party (TTP). Due to the involvement of TTP, such systems lack trust, transparency, security, and immutability. To overcome these issues, this paper proposed a blockchain-based secure data sharing platform by leveraging the benefits of interplanetary file system (IPFS). A meta data is uploaded to IPFS server by owner and then divided into n secret shares. The proposed scheme achieves security and access control by executing the access roles written in smart contract by owner.
    [Show full text]