Design and Implementation of a Peer-To-Peer Based System to Enable the Share Functionality in a Platform-Independent Cloud Storage Overlay

Total Page:16

File Type:pdf, Size:1020Kb

Design and Implementation of a Peer-To-Peer Based System to Enable the Share Functionality in a Platform-Independent Cloud Storage Overlay Design and Implementation of a Peer-to-Peer based System to enable the Share Functionality in a Platform-independent Cloud Storage Overlay Michael Ammann Jona, Switzerland Student ID: 06-920-805 – Communication Systems Group, Prof. Dr. Burkhard Stiller HESIS T Supervisors: Guilherme Sperb Machado, Prof. Dr. Burkhard Stiller ASTER Date of Submission: January 31, 2013 M University of Zurich Department of Informatics (IFI) Binzmühlestrasse 14, CH-8050 Zurich, Switzerland ifi Master Thesis Communication Systems Group (CSG) Department of Informatics (IFI) University of Zurich Binzmühlestrasse 14, CH-8050 Zürich, Switzerland URL: http://www.csg.uzh.ch/ Abstract Cloud storage services have aroused great interest in modern information technology, providing a simple way of storing and sharing files. However, they are mostly built on centralized architectures and hence subject to drawbacks. Peer-to-Peer (P2P) systems are a good alternative to deal with the limitations of centralized systems in the scope of file sharing, due to shared usage of distributed resources and higher fault tolerance. Therefore, this thesis designs, implements, and evaluates a P2P-based file sharing system to be integrated into PiCsMu, a novel platform-independent cloud storage application. The proposed system features a modular design which relies on well-defined interfaces, high security, as well as a P2P storage concept with good performance. Additional features that try to distinguish this approach from other P2P file sharing systems include an integrated file search and the possibility to privately share files. The results of a qualitative and quantitative evaluation show that the proposed system performs well and as designed. Considering that a download of 750 Megabytes files takes in average 154.65 seconds, the complexity added by the proposed system (4.21 seconds) is minimal. Yet the system still leaves aspects to be optimized. i ii Zusammenfassung Cloud-Speicherdienste haben ein grosses Interesse in der modernen Informationstechno- logie erweckt, denn sie bieten eine einfache Methode an, um Daten zu speichern und zu teilen. Da solche Systeme jedoch meistens auf zentralisierten Architekturen aufbauen, un- terliegen sie auch ihren Nachteilen. Peer-to-Peer (P2P) Systeme stellen eine hervorragende Alternative fur¨ den gemeinsamen Zugriff auf Daten dar, um mit den Limitierungen zen- traler Systeme umzugehen. Das Ziel dieser Arbeit ist das Entwerfen, Implementieren und Auswerten eines P2P Systems fur¨ den gemeinsamen Zugriff auf Daten, welches in PiCsMu, einer neuartigen Cloud-Speicher Anwendung, integriert wird. Das vorgeschlagene System hat einen modularen Entwurf, der auf klar definierten Schnittstellen, hoher Sicherheit und einem leistungsf¨ahigen P2P Speicherkonzept basiert. Eine integrierte Suchfunktion sowie die M¨oglichkeit eines privaten Datenaustausches sind Zusatzfunktionen, die das System von anderen P2P Systemen hervorheben soll. Die Resultate der qualitativen und quanti- tativen Evaluation zeigen, dass das vorgeschlagene System funktioniert und leistungsf¨ahig ist. Der Download von 750 Megabytes grossen Dateien ben¨otigt im Durchschnitt 154.65 Sekunden, wobei die Zeitverl¨angerung mit dem entworfenen System nur 4.21 Sekunden betr¨agt. Die Verl¨angerung ist im Verh¨altnis zur Gesamtzeit minimal. Es besteht jedoch immer noch Potential zur Optimierung. iii iv Acknowledgments I would like to express my appreciation to Prof. Dr. Burkhard Stiller and the Communi- cation Systems Group of the University of Zurich for giving me the opportunity to work on such an interesting topic and be part of their research. I owe my deepest gratitude to my supervisor Guilherme Sperb Machado, whose research, guidance, enthusiasm, and persistent help allowed me to complete this thesis. His work showed me new prospects and again awaken my interest in computer science. In addition, a special thank to Dr. Thomas Bocek for providing TomP2P and for always being up to provide support in case of any problems. Lastly, I am indebted to my family, Karl-Heinz Saxer, Lyn Shepard, and everyone who supported me during this thesis. v vi Contents Abstract i Zusammenfassung iii Acknowledgments v 1 Introduction 1 1.1 Description of Work and Thesis Goals . .3 1.2 ThesisOutline..................................3 2 Terminology and Related Work 5 2.1 Terminology...................................5 2.2 Cloud Storage Services . .6 2.3 A Brief History of Peer-to-Peer File Sharing . .7 2.3.1 Napster . .8 2.3.2 Gnutella.................................8 2.3.3 BitTorrent................................9 2.3.4 Anonymous P2P and Freenet . 11 2.3.5 Comparison . 12 vii viii CONTENTS 3 Design 17 3.1 File Upload and Download Protocol . 17 3.2 Index....................................... 18 3.3 System Architecture . 20 3.3.1 Application . 20 3.3.2 Central Server . 22 3.3.3 Peer-to-Peer Network . 23 3.3.4 Cloud Services . 25 3.4 DistributedHashTable............................. 25 3.4.1 Storage Concept using a Distributed Hash Table . 26 3.4.2 Enabling a Content-Based Search . 27 3.5 Privacy and Secure Data Exchange . 29 3.5.1 Cryptography . 30 3.6 ShareFunctionality............................... 32 3.6.1 PublicSharing ............................. 32 3.6.2 Share Notification . 33 3.6.3 Private Sharing . 34 4 Implementation 37 4.1 An Overview of the P2P Code Architecture . 37 4.2 Data Exchange using Beans . 38 4.3 File-Sharing Protocols . 38 4.4 Asynchronous and Non-Blocking Communication . 40 4.4.1 Interacting with the DHT using Futures . 41 4.4.2 Asynchronous Callbacks and Event Handling . 42 4.5 Implementing Security Measures . 44 4.6 File Search Functionality . 46 4.6.1 Keyword Generation . 47 4.6.2 Fast Similarity Search . 48 CONTENTS ix 5 Evaluation 49 5.1 Testbed and Evaluation Setup . 49 5.1.1 Test Cases . 50 5.2 Qualitative Evaluation . 50 5.2.1 Code Coverage using JUnit Tests . 50 5.2.2 Functional Testing . 53 5.3 Quantitative Evaluation . 54 5.4 Additional Issues and Problems . 58 6 Summary and Conclusions 61 Bibliography 69 Abbreviations 71 Glossary 73 List of Figures 75 List of Tables 77 List of Listings 79 A Installation Guidelines 83 B Contents of the CD 85 x CONTENTS Chapter 1 Introduction Modern Information Technology (IT) strives to provide computing as a utility. Utility computing is a concept based on delivering services and resources (e.g., processing, stor- age, software) to end-users while hiding their internal mechanisms. The acquisition of these offerings should be possible at minimal costs, having the advantage of being pur- chasable from private users to large IT companies. As an example, developers can easily launch new Internet services without the need to primarily invest a large amount of money in infrastructure. Thus, organizations are able to first deploy services and later check if the demands meet predictions, e.g., number of users simultaneously accessing the service [21]. Multiple distributed technologies such as cluster, grid, and cloud computing have emerged from this paradigm. They allow access to large amounts of computing power in a fully virtualized manner, by aggregating resources and offering a single system view [25]. Cloud computing (or simply cloud) has been one of the most used buzzwords in IT over recent years. The name emerged as a metaphor for the Internet, which has been typically represented as a cloud symbol in network diagrams [59]. The symbol is an abstraction for the complex underlying mechanisms. A variety of cloud providers (i.e., companies offering cloud computing) have been incorporated over the last couple of years, including big names such as Amazon, Google, and Microsoft. They offer cloud services that can be classified into three types: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) [59]. Well-known examples of cloud services are, among others, Amazon Web Services [1], Google Picasa [9], or Microsoft Office 365 [11]. Section 2.2 introduces cloud services relevant for this thesis. In the scope of SaaS, cloud providers offer applications with a specific purpose and responsibility. Consequently, data that is uploaded to the services is restricted by the corresponding cloud providers' data validation process. For example, Google Picasa only allows hosting images of a certain file type, resolution, and size. Machado et al. [42] investigated on how to bypass the data validation process of cloud providers to store arbitrary data without restrictions. By applying different encoders (i.e., Steganography-related, FileFormatHeader-related, Appending-related) data is transformed to a form accepted by the cloud provider. A weak data validation process does not recognize this change in data. Therefore, it is possible to upload any kind of data to a cloud service without violating the service-specific restrictions being noticed by the cloud provider, causing impacts in security, accounting, and charging. 1 2 CHAPTER 1. INTRODUCTION On the basis of the idea presented by Machado et al., its authors created a Platform- independent Cross Storage System for Multi-Usage (PiCsMu) [15]. PiCsMu is a proto- typical cloud-based overlay (i.e., network on top of another network) offering file type independent cloud storage using file type dependent cloud services. By applying encod- ing, the application can store arbitrary files on any cloud service. The way PiCsMu stores files is divided into three major steps: (1) fragmentation, (2) encoding, and (3) upload. Step (1) splits the file to be uploaded into multiple file parts. In the scope of (2), each file part is encoded specific to the service the file part will be uploaded. Finally, step (3) uploads all encoded file parts to their corresponding cloud service. Advantages of this method are discussed in Section 2.2; and the individual steps are explained in more detail in Section 3.1. In order to retrieve the file, the reversed process is applied. PiCsMu itself does not store data, but index data (i.e., index data, this is data about data), which con- tains information about the upload process, such as (1) number and order of fragmented file parts, (2) applied encoders, and (3) used cloud services.
Recommended publications
  • Anonsocialmix: Anonymous P2P File Sharing Over Social Networks
    AnonSocialMix: Anonymous P2P File Sharing Over Social Networks Student Name: Rajdeep Mukherjee IIIT-D-MTech-CS-GEN-MT15051 July, 2017 Indraprastha Institute of Information Technology New Delhi Thesis Committee Dr. Sambuddho Chakravarty, IIIT Delhi (Advisor) Dr. Tanmoy Chakraborty, IIIT Delhi (Internal Examiner) Dr. Vinay Joseph Ribeiro, IIT Delhi (External Examiner) Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, in Information Security Category ©2017 IIIT-D MTech-CS-GEN-17-MT15051 All rights reserved Certificate This is to certify that the thesis titled “AnonSocialMix: Anonymous P2P File Sharing Over Social Networks" submitted by Rajdeep Mukherjee for the partial fulfillment of the requirements for the degree of Master of Technology in Computer Science & Engineering is a record of the bonafide work carried out by him under my guidance and supervision in the Security and Privacy group at Indraprastha Institute of Information Technology, Delhi. This work has not been submitted anywhere else for the reward of any other degree. Dr.Sambuddho Chakravarty Indraprastha Institute of Information Technology, New Delhi 2 Abstract Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveil- lance, more and more Internet users are getting attracted towards the facilities for anonymous communication. Extensive research has been conducted over the years towards the design and development of several anonymous P2P file sharing protocols and systems. Size of the Anonymity Set plays a crucial role in determining the degree of anonymity being provided by such networks.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • BEST PRACTICE GUIDE for CLOUD and AS-A-SERVICE PROCUREMENTS Executive Summary 1 Introduction
    BEST PRACTICE GUIDE FOR CLOUD AND AS-A-SERVICE PROCUREMENTS Executive Summary 1 Introduction Specific Models and Understanding Cloud Procurement Service Models Data EXECUTIVE SUMMARY Breach Notification Personnel Security While private companies rapidly move systems and Vendors share blame, too. Lots of cloud providers are new to Encryption applications to the cloud, public agencies still struggle to adopt public sector business, having grown up selling to consumers Audits Operations hosted services that could save money and provide better value. and private firms. These companies don’t always understand Hybrid Cloud Environments legitimate demands that make government contracting Preparation for Migrating Yet states and localities have much to gain from the different from selling to other markets. Failure to accommodate Workloads to the Cloud technology industry’s “as-a-service” revolution. Many unique government requirements can be a deal-breaker for jurisdictions face huge legacy system replacement challenges. agencies charged with protecting the public’s interests. Conclusion They’re also under pressure to provide new classes of digital services. The cloud can offer a better path toward All too often, government and industry aren’t on the same page Workgroup Members modernization — there’s no hardware to buy, you’re always when it comes to cloud services. They may not even speak the and Contributors on the latest version of the software and system capacity same language. can be adjusted almost instantly based on your needs. Appendix 1 Bridging the Gap Model Terms and Conditions Templates So why is government lagging behind? The fact is that These pressures led us to release the first version of this guide Software-as-a-Service governments often struggle to buy cloud-based services because two years ago.
    [Show full text]
  • Peer-To-Peer Systems and Massively Multiplayer Online Games
    Peer-to-Peer Systems and Massively Multiplayer Online Games Speaker: Jehn-Ruey Jiang CSIE Department National Central University P2P Systems Client/Server Architecture GET /index.html HTTP/1.0 HTTP/1.1 200 OK ... Server Clients 3/66 Peer-to-Peer Architecture Gateway Server Peers 4/66 The architectures Server-based architecture Client-Server / Server-Cluster Problems: Limited resources All loads are centered on the server Server-based architecture has low scalability. The setup and maintenance cost is high. Peer-to-Peer (P2P) architecture Advantages: Distributing loads to all users Users consume and provide resources P2P architecture has high scalability. The setup and maintenance cost is low. The Client Side Today‟s clients can perform more roles than just forwarding users requests Today‟s clients have: more computing power more storage space Thin client Fat client 6/66 Evolution at the Client Side DEC‟S VT100 IBM PC PC @ 4-core 4GHz @ 4.77MHz No storage 300GB HD 360k diskettes „70 „80 2008 7/66 What Else Has Changed? The number of home PCs is increasing rapidly Most of the PCs are “fat clients” As the Internet usage grow, more and more PCs are connecting to the global net Most of the time PCs are idle How can we use all this? Peer-to-Peer (P2P) 8/66 What is peer-to-peer (P2P)? “Peer-to-peer is a way of structuring distributed applications such that the individual nodes have symmetric roles. Rather than being divided into clients and servers each with quite distinct roles, in P2P applications a node may act as both
    [Show full text]
  • Software As a Service
    Software as a Service Haojie Hang Ogheneovo Dibie Executive Summary • In this presentation, we go through the Software as a Service Methodology, examine its benefits and drawbacks and talk about two state-of-art SaaS systems– Amazon Web Service and Google App Engine • We also look into Service Oriented Architecture powering SaaS applications and its impact on modern web 2.0 applications • Finally, we examine hybrids of traditional and SaaS applications Overview • What is Software as a Service (SaaS) • Background o Brief history o Concept o Big picture o Related terms • Computing Today o SasS is everywhere o The SaaS Market • Benefits of SaaS • Drawbacks of SaaS o Robustness o Privacy o Security o Reliability • Service Oriented Architectures (SOA) o Guiding principles of SOA • Case studies o Amazon Web Services (AWS) o Google App Engine • Influence of SOA on Web 2.0 development o Zend Framework • Hybrids of Traditional and SaaS applications o Dropbox o Microsoft Office • Summary • References What is SaaS? • Definition: Software as a Service (SaaS), a.k.a. on- demand software, is a software delivery model in which software and its associated data are hosted centrally and accessed using a thin-client, usually a web browser over the internet. – Wikipedia • Simply put, SaaS is a method for delivering software that provides remote access to software as a web- based service. The software service can be purchased with a monthly fee and pay as you go. What is SaaS? • Where does the term SaaS come from? o The SAAS acronym allegedly first appeared
    [Show full text]
  • A Fog Storage Software Architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein
    A Fog storage software architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein To cite this version: Bastien Confais, Adrien Lebre, Benoît Parrein. A Fog storage software architecture for the Internet of Things. Advances in Edge Computing: Massive Parallel Processing and Applications, IOS Press, pp.61-105, 2020, Advances in Parallel Computing, 978-1-64368-062-0. 10.3233/APC200004. hal- 02496105 HAL Id: hal-02496105 https://hal.archives-ouvertes.fr/hal-02496105 Submitted on 2 Mar 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. November 2019 A Fog storage software architecture for the Internet of Things Bastien CONFAIS a Adrien LEBRE b and Benoˆıt PARREIN c;1 a CNRS, LS2N, Polytech Nantes, rue Christian Pauc, Nantes, France b Institut Mines Telecom Atlantique, LS2N/Inria, 4 Rue Alfred Kastler, Nantes, France c Universite´ de Nantes, LS2N, Polytech Nantes, Nantes, France Abstract. The last prevision of the european Think Tank IDATE Digiworld esti- mates to 35 billion of connected devices in 2030 over the world just for the con- sumer market. This deep wave will be accompanied by a deluge of data, applica- tions and services.
    [Show full text]
  • 04. Peer-To-Peer Applications
    Internet Technology 04. Peer-to-Peer Applications Paul Krzyzanowski Rutgers University Spring 2016 February 15, 2016 CS 352 © 2013-2016 Paul Krzyzanowski 1 Peer-to-Peer (P2P) Application Architectures • No reliance on a central server • Machines (peers) communicate with each other • Pools of machines (peers) provide the service • Goals client server – Robustness • Expect that some systems may be down – Self-scalability • The system can handle greater workloads as more peers are added peers February 15, 2016 CS 352 © 2013-2016 Paul Krzyzanowski 2 Peer-to-Peer networking “If a million people use a web site simultaneously, doesn’t that mean that we must have a heavy-duty remote server to keep them all happy? No; we could move the site onto a million desktops and use the Internet for coordination. Could amazon.com be an itinerant horde instead of a fixed central command post? Yes.” – David Gelernter The Second Coming – A Manifesto See http://edge.org/conversation/the-second-coming-a-manifesto February 15, 2016 CS 352 © 2013-2016 Paul Krzyzanowski 3 Peer to Peer applications • P2P targets diverse solutions – Cooperative computation – Communications (e.g., Skype) – Exchanges, digital currency (bitcoin) – DNS (including multicast DNS) – Content distribution (e.g., BitTorrent) – Storage distribution • P2P can be a distributed server – Lots of machines spread across multiple datacenters Today, we’ll focus on file distribution February 15, 2016 CS 352 © 2013-2016 Paul Krzyzanowski 4 Four key primitives • Join/Leave – How do you join a P2P system?
    [Show full text]
  • CERBERUS FTP SERVER 8.0] User Manual for Cerberus FTP Server 8.0
    V.8 Cerberus, LLC Grant Averett [CERBERUS FTP SERVER 8.0] User manual for Cerberus FTP Server 8.0. It contains detailed steps and help on configuring Cerberus FTP Server. CONTENTS Introduction .............................................................................................................................................. 11 Description ........................................................................................................................................... 11 Guide .................................................................................................................................................... 11 Minimum System Requirements .............................................................................................................. 12 Hardware Requirements ...................................................................................................................... 12 Operating Systems ................................................................................................................................ 12 Cerberus FTP Server 5.0, 6.0, and 7.0 ............................................................................................... 12 Cerberus FTP Server 8.0 and higher ................................................................................................. 12 Installation ................................................................................................................................................ 13 Upgrading an Existing Installation ............................................................................................................
    [Show full text]
  • Model to Implement Virtual Computing Labs Via Cloud Computing Services
    S S symmetry Article Model to Implement Virtual Computing Labs via Cloud Computing Services Washington Luna Encalada 1,2,* ID and José Luis Castillo Sequera 3 ID 1 Department of Informatics and Electronics, Polytechnic School of Chimborazo, Riobamba 060155, EC, Ecuador 2 Department of Doctorate in Systems Engineering and Computer Science, National University of San Marcos, Lima 15081, Peru; [email protected] 3 Department of Computer Sciences, Higher Polytechnic School, University of Alcala, 28871 Alcala de Henares, Spain; [email protected] * Correspondence: [email protected]; Tel.: +593-032-969-472 Academic Editor: Yunsick Sung Received: 1 May 2017; Accepted: 3 July 2017; Published: 13 July 2017 Abstract: In recent years, we have seen a significant number of new technological ideas appearing in literature discussing the future of education. For example, E-learning, cloud computing, social networking, virtual laboratories, virtual realities, virtual worlds, massive open online courses (MOOCs), and bring your own device (BYOD) are all new concepts of immersive and global education that have emerged in educational literature. One of the greatest challenges presented to e-learning solutions is the reproduction of the benefits of an educational institution’s physical laboratory. For a university without a computing lab, to obtain hands-on IT training with software, operating systems, networks, servers, storage, and cloud computing similar to that which could be received on a university campus computing lab, it is necessary to use a combination of technological tools. Such teaching tools must promote the transmission of knowledge, encourage interaction and collaboration, and ensure students obtain valuable hands-on experience.
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • Privacy by Design and the Emerging Personal Data Ecosystem
    Privacy by Design and the Emerging Personal Data Ecosystem Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Foreword by Shane Green CEO of Personal October 2012 Acknowledgements The Information and Privacy Commissioner of Ontario, Canada, would like to gratefully acknowledge the contributions of the following individuals whose efforts were invaluable in the drafting of this paper: Michelle Chibba, Director of Policy and Special Projects, IPC, and Policy Department staff; Josh Galper, Chief Policy Officer and General Counsel, Personal; Drummond Reed, Respect Network; Alan Mitchell, Strategy Director, Ctrl-Shift; Claire Hopkins, Marketing and Communications Director, Ctrl-Shift; and Liz Brandt, CEO, Ctrl-Shift. We also appreciate the opportunity to co-launch this paper with the Society for Worldwide Interbank Financial Telecommunication (SWIFT) and acknowledge their contribution to the case study section. We would especially like to thank Peter Vander Auwera, Innovation Leader, SWIFT, and Pierre Blum, Senior Product Manager, SWIFT. 416-326-3333 2 Bloor Street East 1-800-387-0073 Suite 1400 Fax: 416-325-9195 Toronto, Ontario TTY (Teletypewriter): 416-325-7539 Information and Privacy Commissioner M4W 1A8 Website: www.ipc.on.ca Ontario, Canada Canada Privacy by Design: www.privacybydesign.ca TABLE OF CONTENTS Foreword ............................................................................. 1 Introduction ......................................................................... 3 The Personal Data Ecosystem ...............................................
    [Show full text]