MIT 6 857 - A modified BitTorrent protocol for anonymous peer-to-peer file sharing

Unformatted text preview:

A modified BitTorrent protocol for anonymous peer-to-peer file sharingTural Badirkhanli, Amrik Kochhar, Albert Ni, Kuat YessenovTural Badirkhanli, Amrik Kochhar, Albert Ni, Kuat YessenovOutline BitTorrent – Pros and Cons BitTAKA – Anonymous BitTorrent Simulation Possible ImprovementsBitTorrent Pros Efficient because downloaders also act as uploaders Uploading is enforced via “tit-for-tat” based protocolBitTorrent Cons Anonymity – users learn identifying information about their peersbitTAKA Goals Share files using a protocol fundamentally similar to BitTorrent’sProvide anonymity to users of the bitTAKA network Provide anonymity to users of the bitTAKA network  In particular, users can share the files they want without learning anything about other users of the network Still be “reasonably” efficientProtocol Outline Requires a trusted tracker to mediate traffic Traffic between peers sharing a file is forwarded through a third-party (called a “Forwarder”) a third-party (called a “Forwarder”)AliceBobBitTAKA ProtocolFrankKyleCircuit for “Bob”?Tracker???6857-grades.txtBob: 6857-grades.txt-List of NamesCircuit for “Bob”?-Forwarding Info-“Bob”-Frank_IP Two-way IP to Name mapping maintained by the tracker Any element of this mapping is NEVER learned by any user Incentive for forwarding is maintained by always having forwarding go both waysProtocol ReviewReview of Goals I Still share files using something similar to the BitTorrent protocol In particular –how is tit-for-tat still enforced?In particular –how is tit-for-tat still enforced?Review of Goals II Provide anonymity to users of the bitTAKA network  In particular, can users share the files they want without learning anything about other users of the network?learning anything about other users of the network?Review of Goals III Still be “reasonably” efficient In particular, how do the extra hops affect performance?Flaws Perhaps impractical due to issues with: ScalabilityEfficiencyEfficiency Still need to trust tracker – single point of “trust failure”Potential Practical Improvements Cycle through forwarders before choking a peer Maintain data about each others’ forwarding speeds  Distributing tracker routing information1.Assumption of anonymity changes1.Assumption of anonymity changes2. How to discover new routes?Simulation Designed a basic testing framework in Java, able to simulate dozens of peers locally, and propagate messages Intend to model:•Choking algorithm•Choking algorithm• Network delays• Malicious peers and forwarders Performance


View Full Document

MIT 6 857 - A modified BitTorrent protocol for anonymous peer-to-peer file sharing

Documents in this Course
Load more
Download A modified BitTorrent protocol for anonymous peer-to-peer file sharing
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view A modified BitTorrent protocol for anonymous peer-to-peer file sharing and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view A modified BitTorrent protocol for anonymous peer-to-peer file sharing 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?