LifeSocial - A P2P-Platform for Secure Online Social Networks

576 views

Published on

This is a summary presentation of Dr.-Ing. Kalman Graffi on LifeSocial - the P2P-Platform for Secure Online Social Networks

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
576
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • | | November 19, 2007
  • LifeSocial - A P2P-Platform for Secure Online Social Networks

    1. 1. LifeSocial A P2P-Platform for Secure Online Social Networks
    2. 2. Importance of Online Social Networks (OSN) <ul><li>What are OSNs? </li></ul><ul><ul><li>Web-based community platforms </li></ul></ul><ul><ul><li>Presentation and linking of personal data </li></ul></ul><ul><ul><li>Several hundred Millions of users </li></ul></ul><ul><li>Motivation of involved actors: </li></ul><ul><ul><li>User  entertainment </li></ul></ul><ul><ul><ul><li>Storing and searching for content </li></ul></ul></ul><ul><ul><ul><li>User to user interaction </li></ul></ul></ul><ul><ul><ul><li>Secure storage and communication </li></ul></ul></ul><ul><ul><li>Provider  profit </li></ul></ul><ul><ul><ul><li>High profit (ads for many users) </li></ul></ul></ul><ul><ul><ul><li>Low operational costs (servers,…) </li></ul></ul></ul><ul><ul><ul><li>Controlled service quality </li></ul></ul></ul><ul><li>Our goal: A P2P-platform for OSNs </li></ul><ul><ul><li>that satisfies users and providers </li></ul></ul><ul><ul><li>with high quality apps / plugins </li></ul></ul>Flexible GUI Events Personal information Friends, contacts Social interaction Plugin architecture Photos
    3. 3. Architecture Design <ul><li>Current issues with centralized OSNs </li></ul><ul><ul><li>Lots of operational costs ! </li></ul></ul><ul><ul><li>Rough estimation: 1$ per year per user </li></ul></ul><ul><ul><li>Facebook: 450M users </li></ul></ul><ul><li>Peer-to-peer approach: </li></ul><ul><ul><li>Use capacities of user devices (Moore’s law!) </li></ul></ul><ul><ul><li>Interconnect users with p2p-overlay </li></ul></ul><ul><ul><li>Provide all functionality in a distributed way </li></ul></ul><ul><ul><li>Shift the load and costs to the users </li></ul></ul><ul><li>LifeSocial: </li></ul><ul><ul><li>Researched since end of 2007 </li></ul></ul><ul><ul><li>Ca. 10 diploma / bachelor theses on this topic </li></ul></ul><ul><ul><li>Ca. 20 researcher and student programmers </li></ul></ul>
    4. 4. User View: Rich Functionality <ul><li>Wide set of functionality </li></ul><ul><ul><li>Plugin-based application: </li></ul></ul><ul><ul><ul><li>Profile, Login, Friends, Groups, Mails, Photos, Chat, Whiteboard, Calendar… </li></ul></ul></ul><ul><ul><ul><li>OSGI-based, extendable and flexible </li></ul></ul></ul><ul><ul><li>Flexible GUI </li></ul></ul><ul><ul><ul><li>GUI-Framework like in Eclipse </li></ul></ul></ul><ul><ul><ul><li>Fast and user-friendly performance </li></ul></ul></ul>
    5. 5. Provider View: Monitoring and Management <ul><li>Integrated monitoring and management </li></ul><ul><ul><li>Totally distributed, precise and cheap </li></ul></ul><ul><ul><li>Controls service quality of p2p system </li></ul></ul><ul><li>Monitoring global system statistics </li></ul><ul><ul><li>Statistics on </li></ul></ul><ul><ul><li>Statistical information: avg, min, max, standard dev., sum,... </li></ul></ul><ul><li>Management of system quality </li></ul><ul><ul><li>Following principles of autonomic computing: Automated adaptation of system configuration to meet quality goals </li></ul></ul> See: K. Graffi et al., “Monitoring and Management of Structured Peer-to-Peer Systems” In: IEEE Peer-to-Peer Computing '09 (IEEE P2P’09), September 2009. System … … … Groups Objects in Cache Data retrieval delays Friends CPU / bandwidth usage Number of peers Social Metrics Costs Performance
    6. 6. Architecture Details of LifeSocial <ul><li>GUI Framework: </li></ul><ul><ul><li>Extendable and flexible </li></ul></ul><ul><ul><li>Provides an interface to the Plugins </li></ul></ul><ul><li>Plugins: </li></ul><ul><ul><li>Functionality of online social networks (and more) </li></ul></ul><ul><ul><li>Easy Plugin-to-Plugin communication </li></ul></ul><ul><ul><ul><li>Over shared storage </li></ul></ul></ul><ul><ul><ul><li>Over Plugin ID based messaging </li></ul></ul></ul><ul><li>Information Cache: </li></ul><ul><ul><li>Enables the Plugins to reuse the data </li></ul></ul><ul><ul><li>Hides the asynchronous effects of distributed data storage </li></ul></ul><ul><li>Monitoring and Management: </li></ul><ul><ul><li>Provides statistics on system behavior </li></ul></ul><ul><ul><li>Enables the provider to control the service quality </li></ul></ul><ul><li>Secure Message Dispatcher: </li></ul><ul><ul><li>Provides secure, low-delay Plugin-to-Plugin communication </li></ul></ul><ul><ul><li>Integrate offline messaging feature </li></ul></ul><ul><li>Secure Storage Dispatcher + access control: </li></ul><ul><ul><li>Storage and retrieval of data objects (PAST) </li></ul></ul><ul><ul><li>Replicates data and guarantees their availability </li></ul></ul><ul><li>Structured Peer-to-Peer Overlay </li></ul><ul><ul><li>Connects the nodes and enables inter-peer communication </li></ul></ul> See: K. Graffi et al., “A Distributed Platform for Multimedia Online Communities” In: IEEE International Symposium on Multimedia '08 (IEEE ISM’09), December 2008.
    7. 7. Peer and Plugin Communcation Principles <ul><li>FreePastry – based on Pastry, DHT </li></ul><ul><ul><li>Documents are mapped to peers: </li></ul></ul><ul><ul><ul><li>Every Document-ID has a responsible peer </li></ul></ul></ul><ul><ul><ul><li>Contacted by document owners and requesters </li></ul></ul></ul><ul><ul><li>FreePastry routes to responsible peer </li></ul></ul><ul><ul><li>Add-on PAST manages the data replication </li></ul></ul><ul><li>Plugin-to-Plugin communication </li></ul><ul><ul><li>Over Plugin ID based messaging </li></ul></ul><ul><ul><ul><li>Analog to ports in transport layer </li></ul></ul></ul><ul><ul><li>Over shared storage </li></ul></ul><ul><ul><ul><li>Personal data is NOT stored on user’s device </li></ul></ul></ul><ul><ul><ul><li>Additional fine-grained access control in place </li></ul></ul></ul>Node 1008 queries item 3000 Responsible peer found 1622 1009-1622 2207 2012-2207 2906 2683-2906 3485 2907-3485 2011 1623-2011 709 660-709 659 612-659 2682 2208-2682 611 3486-… 0-611 Responsible for 1008 + 1024 3 Use shortcuts/fingers… 1 2 Responsible for 2207 + 512 Responsible for 3000 1008 710-1008  See: K. Graffi et al., “A Distributed Platform for Multimedia Online Communities” In: IEEE International Symposium on Multimedia '08 (IEEE ISM’09), December 2008. Principle of ID-based routing Example data object Structured p2p overlay
    8. 8. Document Types, Obvious Storage Keys <ul><li>High granularity of stored data objects </li></ul><ul><li>Better load balancing of the resources </li></ul><ul><li>Used for </li></ul><ul><ul><li>Atomic data: profiles, login info, “emails” </li></ul></ul><ul><ul><li>Linked lists: friend lists, groups, multicast </li></ul></ul><ul><li>Allows for complex data structures </li></ul>Profile storage key p = “User_Kalman_Graffi” Name: Kalman Age: 27 University: Technische Universität Darmstadt  See: K. Graffi et al., “A Distributed Platform for Multimedia Online Communities” In: IEEE International Symposium on Multimedia '08 (IEEE ISM’09), December 2008.
    9. 9. Data Positioning in the Network replica replica replica replica replica request responsibility range
    10. 10. Practical Distributed Access Control <ul><li>Mechanism: </li></ul><ul><ul><li>Prepare confidential data </li></ul></ul><ul><ul><ul><li> Start: “SharedItem” </li></ul></ul></ul><ul><ul><li>Symmetrically encrypt objects </li></ul></ul><ul><ul><ul><li> use “object keys” </li></ul></ul></ul><ul><ul><li>Asymmetrically encrypt object keys </li></ul></ul><ul><ul><ul><li> use “user keys” (publicly available) </li></ul></ul></ul><ul><ul><li>Append encrypted object keys to object </li></ul></ul><ul><ul><ul><li> Result: “CryptedItem” </li></ul></ul></ul><ul><li>Features: </li></ul><ul><ul><li>Replicability: </li></ul></ul><ul><ul><ul><li>Every peer may store CryptedItems </li></ul></ul></ul><ul><ul><li>Access control: </li></ul></ul><ul><ul><ul><li>Only privileged users can decrypt it </li></ul></ul></ul><ul><ul><li>Compatibility to FreePastry/PAST: </li></ul></ul><ul><ul><ul><li>Fully distributed, PKI integrated </li></ul></ul></ul><ul><li>How to provide access control in a distributed environment? </li></ul><ul><li>Goal: Assign read-rights on objects to privileged users </li></ul>SharedItem objectID Header Privileged users Payload Signed CryptedItem objectID Key list userID A – key A userID B – key B userID C – key C Byte array containing encrypted SharedItem Pub User A Encrpyted with Pub User B Encrpyted with … Pub User A Pub User B [userID A] = [userID B] = Serialized and encrypted with symmetic key 2 wrap symmetric key with public key 4 5  See: K. Graffi et al., “Practical Security in P2P-based Social Networks” In: IEEE Local Computer Networks '09 (IEEE LCN’09), October 2009. Symmetric Key Symmetric Key extract 1 userIDs are public keys 3
    11. 11. LifeSocial Plugin Overview <ul><li>Everything is a Plugin </li></ul><ul><ul><li>Stand-alone applications (apps) </li></ul></ul><ul><ul><li>Communicate over storage or with messages </li></ul></ul><ul><ul><li>Mandatory or optional </li></ul></ul><ul><ul><li>Implement OSN functionality (and more) </li></ul></ul><ul><li>Traditional OSN functionality </li></ul><ul><ul><li>Login, Profile, Friends, Groups, Search, Photos, Messages, Chat </li></ul></ul><ul><li>Extended OSN functionality </li></ul><ul><ul><li>Multi-chat, Whiteboard, Calendar, Tweets </li></ul></ul><ul><li>Extendability </li></ul><ul><ul><li>Plugins are OSGI-based </li></ul></ul><ul><ul><li>Can be loaded on runtime on demand </li></ul></ul><ul><ul><li>Version updates over the Internet possible </li></ul></ul><ul><ul><li>Planned “Plugin-Store” hosting new Plugins </li></ul></ul><ul><li>Rapid application development </li></ul><ul><ul><li>Plugin interfaces are open and combinable </li></ul></ul><ul><ul><li>Allows for Unix-style reuse of components </li></ul></ul><ul><ul><li>New Plugins can be included in the monitoring and management framework </li></ul></ul> See: K. Graffi et al., “LifeSocial.KOM: A P2P-based Platform for Secure Social Online Networks” submitted to IEEE Networking ‘10, January 2010.
    12. 12. Summary on LifeSocial <ul><li>IT solutions for social networks </li></ul><ul><ul><li>Currently centralized and very costly </li></ul></ul><ul><ul><li>Scales only with high monetary invests </li></ul></ul><ul><li>Distributed, p2p-based platforms </li></ul><ul><ul><li>Data storage is totally distributed </li></ul></ul><ul><ul><li>Costs are shared among the users </li></ul></ul><ul><li>LifeSocial </li></ul><ul><ul><li>Operational prototype </li></ul></ul><ul><ul><li>Secure, reliable storage and messaging </li></ul></ul><ul><ul><li>Monitoring mechanism to observe (and control) the quality of service </li></ul></ul><ul><ul><li>Rich, extendable functionality through Plugin-based architecture </li></ul></ul><ul><ul><li>See videos on www.lifesocial.org </li></ul></ul><ul><li>Analysis of needs: </li></ul><ul><li>Users requirements </li></ul><ul><ul><li>Storing and searching for content </li></ul></ul><ul><ul><li>User to user interaction </li></ul></ul><ul><ul><li>Security </li></ul></ul><ul><li>System provider requirements </li></ul><ul><ul><li>Low operational costs </li></ul></ul><ul><ul><li>Controlled quality of service </li></ul></ul><ul><ul><li>High profit </li></ul></ul><ul><li>Next steps: </li></ul><ul><ul><li>Fine tuning and final consolidation </li></ul></ul><ul><ul><li>Run Internet-wide beta-test </li></ul></ul><ul><ul><li>Deployment </li></ul></ul>
    13. 13. Contact Information KOM Have a look at: www.lifesocial.org www.skynet-project.com www.kom.tu-darmstadt.de

    ×