Framework for Preserving Security
and Privacy in Peer-to-Peer
Content Distribution Systems
Amna Qureshi, David Megías and Helena Rifà-Pous
KISON-IN3
1
11th February, 2015UOC Research Showcase
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
• Introduction
• State-of-the-Art
• Secure and Privacy-Preserving Content Distribution Framework
• Experimental and Simulation Results
• Conclusions and Future Work
Outline
2
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
• Multimedia producers
o Protection of copyright
3
Introduction
Content Protection
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
• End users
o Protection of user-related information
Privacy Protection
Introduction
4
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Copyright Infringement in P2P Content Distribution Systems
• Conflict between content providers and end users:
o Reconciliation of user privacy with content protection.
• Trade-off between watermarking properies:
o Robustness, transparency and capacity.
• Harmonization between accountability and anonymity:
o Revocable privacy for an end user.
• Merging collusion-resistant fingerprinting and secure embedding scheme.
• Computational and distribution efficiency:
o Low computational and communicational burdens for the content providers and the end
users.
5
Introduction
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Research Challenges
6
State-of-the-Art
Security Properties for Content Providers
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Copyright
protection
Data
privacy
Traceablity
Data
integrity
Copy
prevention
Resistance
against
attacks
User privacy
Protection of real
identity
Unlinkability
Resistance
against de-
anonymization
attacks
Data privacy
Available to
authorized users
only
Protection
against
malicious
attacks
Privacy Properties for End users
7
State-of-the-Art
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
P2P
Systems
Content
Protection
Privacy
Protection
Revocable
PrivacyCopyright
Protection
Traceability User Data
Megías
(2014)
Yes Yes Yes Yes Yes
Megías & Domingo-Ferrer
(2014)
Yes Yes Yes Yes Yes
Domingo-Ferrer & Megías
(2013)
Yes Yes Yes Yes Yes
P2P
Systems
Robustness and Security against Attacks
Signal
Processing
Attacks
Collusion Attacks
Communication
AttacksContent Protection
Systems
Privacy
Protection
Systems
Megías
(2014)
Yes Yes Yes Yes
Megías & Domingo-Ferrer
(2014)
Yes Yes Yes Yes
Comparative Analysis of Secure and Privacy-Preserving P2P Content Distribution Systems
8
Security and Privacy-Preserving Content
Distribution Framework
Overview of the Framework
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
P2P
network
Trust
infrastructures
Building
blocks
Hybrid P2P Public key support Embedding domain
Trusted third
parties with limited
services
Embedding algorithm
Collusion-resistant
fingerprinting codes
Public key
cryptosystem
PseudoTrust model
9
Security and Privacy-Preserving Content
Distribution Framework
Overview of the Framework
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Parties
involved
Merchant
General
assumptions
Security
assumptions
Assumptions
Design
requirements
Threat
model
Buyer
Super peer
Monitor
Judge
Certification
authority
Security
requirements
Privacy
requirements
Watermarking
attacks
Collusion attacks
Framing attacks
Communication
attacks
10
Protocols of the Framework
File Partitioning Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Merchant Multimedia
content
DWT
Transform
Approximation coefficients
Detail coefficients
Monitor
Fingerprint
generation
Embed fingerprint into
approximation coefficients
Base file
Supplementary file
11
Protocols of the Framework
Base File Distribution Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
9. Buyer decrypts
EK*pBi(BF) using
secret key
Merchant
Monitor
Buyer
4. fi Generation
5. fi Encryption with K*pBi
7. Embedding EK*pBi (f)
into EK*pBi (X)
EK*pBi (X)
EKpB(X)EKpB(f) => EK*pBi(BF)
EK*pBi (f)
10. Fingerprinted BF
12
Protocols of the Framework
Supplementary File Distribution Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Merchant
Certification
Authority
P2P Network
Pseudonyms
and
signed
certificate
acquisation
13
Protocols of the Framework
Traitor-Tracing and Dispute Resolution Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Merchant
Monitor
Judge
Certification
Authority
Multimedia
content
Collusion
attack
Set of
colluders
14
Security and Privacy-Preserving Content
Distribution Framework
Security Analysis of BF Distribution Protocol
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
• Buyer frameproofness
• Non-repudiation
• Revocable privacy
• Anonymity
• Traceability
• Collusion resistance
• Unlinkability
Security Analysis of SF Distribution Protocol
• Impersonation
• Man-in-the-middle attack
• Replay attack
• Leakage of a secret number
used in pseudo-idenity
generation
15
Security and Privacy-Preserving Content
Distribution Framework
Security against Collusion Attacks
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
No. of
Colluders
No. of Colluders Detected for Attacks in the
Framework for a Video File
U Average Minimum Maximum Median
2 2 2 2 2
3 3 3 3 3
4 4 4 4 4
5 5 4 4 5
16
Experimental and Simulation Results
Details of Audio Files
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Loopy
Music
Huge
wav
Aasan
Nai
Yahan
Duration
(min:secs)
00:10 00:17 03:34
Original Size
(MB)
0.89 2.97 36.01
Base File
Size (MB)
0.52 0.88 9.80
Supplement-
ary File Size
(MB)
1.79 5.94 72.16
ODG Value -0.48 -0.98 -1.20
Details of Video Files
Traffic Dragon Breaking
Bad
Duration
(min:secs)
00:10 23:00 50:00
Original Size
(MB)
0.19 51.10 305.00
Base File
Size (MB)
0.08 9.21 11.80
Supplement-
ary File Size
(MB)
0.18 69.40 216.00
PSNR Value
(dB)
44.00 42.00 41.00
17
Experimental and Simulation Results
Robusntess of an Audio File
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Robustness of a Video File
Attacks Parameters BER NC
Re-
quantization
16-8-16
bits
0.07 0.951
Re-sampling
44.1-22.05-
44.1 KHz
0.11 0.902
MP3
Compression
256 kbps 0.09 0.912
AWGN 18 dB 0.13 0.882
Attacks Parameters BER NC
Median
filter
[3 x 3] 0.09 0.912
Re-sizing
320-640-320
pixels
0.06 0.972
H.264
Compression
768 kbps 0.09 0.912
AWGN 20 dB 0.14 0.856
18
Experimental and Simulation Results
Computational Time of Audio Files
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Computational Time of Video Files
CPU Time in secs
Process Loopy
Music
Huge
Wav
Aasan
Nai
Yahan
Fingerprint
generation
6.01 6.01 6.01
Base file
generation
14.08 31.15 181.39
Supplementary
file
generation
0.03 0.18 1.19
Total time 20.13 37.34 188.60
CPU Time in secs
Process Traffic Dragon Breaking
Bad
Fingerprint
generation
6.01 6.01 6.01
Base file
generation
14.08 31.15 181.39
Supplementary
file
generation
0.03 0.18 1.19
Total time 20.13 37.34 188.60
19
Experimental and Simulation Results
CommunicationTime of an Audio File
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Communication Time of a Video File
Communication time in secs
File
name
BF
delivery
SF
delivery
File
Recon-
struction
Total
time
Loopy
Music
8.01 10.00 3.89 21.90
Communication time in secs
File
name
BF
delivery
SF
delivery
File
Recon-
struction
Total
time
Break-
ing Bad
184.00 657.29 595.05 1436.34
Cryptographic Algorithms
CPU time in
secs
Public-key cryptography 5.73
Anonymous key exchange 9.62
AES encryption/decryption 1.89
Total 17.24
Cryptographic Costs of an Audio File Cryptographic Costs of a Video File
Cryptographic Algorithms
CPU time in
secs
Public-key cryptography 8.80
Anonymous key exchange 9.62
AES encryption/decryption 0.11
Total 18.53
20
Conclusions and Future Work
Conclusions
Future Work
• A P2P content distribution system which allows efficient distribution of large-sized
content while preserving the security and privacy of content providers and end
users.
• The security and performance analysis demonstrates the security and efficiency
of the proposed framework.
• The framework is able to resolve the problems of piracy tracing, buyer
frameproofness, collusion resistance, accountability, dispute resolution and
buyer’s privacy.
• Reduce the size of the base file through losless compression techniques.
• Develop a prototype of the proposed framework and test it in a real-world scenario.
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
21
Thank you!
Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution
Systems
Framework for preserving security and privacy in peer-to-peer content distribution systems

Framework for preserving security and privacy in peer-to-peer content distribution systems

  • 1.
    Framework for PreservingSecurity and Privacy in Peer-to-Peer Content Distribution Systems Amna Qureshi, David Megías and Helena Rifà-Pous KISON-IN3 1 11th February, 2015UOC Research Showcase Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems
  • 2.
    • Introduction • State-of-the-Art •Secure and Privacy-Preserving Content Distribution Framework • Experimental and Simulation Results • Conclusions and Future Work Outline 2 Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems
  • 3.
    • Multimedia producers oProtection of copyright 3 Introduction Content Protection Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems • End users o Protection of user-related information Privacy Protection
  • 4.
    Introduction 4 Framework for PreservingSecurity and Privacy in Peer-to-Peer Content Distribution Systems Copyright Infringement in P2P Content Distribution Systems
  • 5.
    • Conflict betweencontent providers and end users: o Reconciliation of user privacy with content protection. • Trade-off between watermarking properies: o Robustness, transparency and capacity. • Harmonization between accountability and anonymity: o Revocable privacy for an end user. • Merging collusion-resistant fingerprinting and secure embedding scheme. • Computational and distribution efficiency: o Low computational and communicational burdens for the content providers and the end users. 5 Introduction Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Research Challenges
  • 6.
    6 State-of-the-Art Security Properties forContent Providers Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Copyright protection Data privacy Traceablity Data integrity Copy prevention Resistance against attacks User privacy Protection of real identity Unlinkability Resistance against de- anonymization attacks Data privacy Available to authorized users only Protection against malicious attacks Privacy Properties for End users
  • 7.
    7 State-of-the-Art Framework for PreservingSecurity and Privacy in Peer-to-Peer Content Distribution Systems P2P Systems Content Protection Privacy Protection Revocable PrivacyCopyright Protection Traceability User Data Megías (2014) Yes Yes Yes Yes Yes Megías & Domingo-Ferrer (2014) Yes Yes Yes Yes Yes Domingo-Ferrer & Megías (2013) Yes Yes Yes Yes Yes P2P Systems Robustness and Security against Attacks Signal Processing Attacks Collusion Attacks Communication AttacksContent Protection Systems Privacy Protection Systems Megías (2014) Yes Yes Yes Yes Megías & Domingo-Ferrer (2014) Yes Yes Yes Yes Comparative Analysis of Secure and Privacy-Preserving P2P Content Distribution Systems
  • 8.
    8 Security and Privacy-PreservingContent Distribution Framework Overview of the Framework Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems P2P network Trust infrastructures Building blocks Hybrid P2P Public key support Embedding domain Trusted third parties with limited services Embedding algorithm Collusion-resistant fingerprinting codes Public key cryptosystem PseudoTrust model
  • 9.
    9 Security and Privacy-PreservingContent Distribution Framework Overview of the Framework Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Parties involved Merchant General assumptions Security assumptions Assumptions Design requirements Threat model Buyer Super peer Monitor Judge Certification authority Security requirements Privacy requirements Watermarking attacks Collusion attacks Framing attacks Communication attacks
  • 10.
    10 Protocols of theFramework File Partitioning Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Merchant Multimedia content DWT Transform Approximation coefficients Detail coefficients Monitor Fingerprint generation Embed fingerprint into approximation coefficients Base file Supplementary file
  • 11.
    11 Protocols of theFramework Base File Distribution Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems 9. Buyer decrypts EK*pBi(BF) using secret key Merchant Monitor Buyer 4. fi Generation 5. fi Encryption with K*pBi 7. Embedding EK*pBi (f) into EK*pBi (X) EK*pBi (X) EKpB(X)EKpB(f) => EK*pBi(BF) EK*pBi (f) 10. Fingerprinted BF
  • 12.
    12 Protocols of theFramework Supplementary File Distribution Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Merchant Certification Authority P2P Network Pseudonyms and signed certificate acquisation
  • 13.
    13 Protocols of theFramework Traitor-Tracing and Dispute Resolution Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Merchant Monitor Judge Certification Authority Multimedia content Collusion attack Set of colluders
  • 14.
    14 Security and Privacy-PreservingContent Distribution Framework Security Analysis of BF Distribution Protocol Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems • Buyer frameproofness • Non-repudiation • Revocable privacy • Anonymity • Traceability • Collusion resistance • Unlinkability Security Analysis of SF Distribution Protocol • Impersonation • Man-in-the-middle attack • Replay attack • Leakage of a secret number used in pseudo-idenity generation
  • 15.
    15 Security and Privacy-PreservingContent Distribution Framework Security against Collusion Attacks Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems No. of Colluders No. of Colluders Detected for Attacks in the Framework for a Video File U Average Minimum Maximum Median 2 2 2 2 2 3 3 3 3 3 4 4 4 4 4 5 5 4 4 5
  • 16.
    16 Experimental and SimulationResults Details of Audio Files Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Loopy Music Huge wav Aasan Nai Yahan Duration (min:secs) 00:10 00:17 03:34 Original Size (MB) 0.89 2.97 36.01 Base File Size (MB) 0.52 0.88 9.80 Supplement- ary File Size (MB) 1.79 5.94 72.16 ODG Value -0.48 -0.98 -1.20 Details of Video Files Traffic Dragon Breaking Bad Duration (min:secs) 00:10 23:00 50:00 Original Size (MB) 0.19 51.10 305.00 Base File Size (MB) 0.08 9.21 11.80 Supplement- ary File Size (MB) 0.18 69.40 216.00 PSNR Value (dB) 44.00 42.00 41.00
  • 17.
    17 Experimental and SimulationResults Robusntess of an Audio File Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Robustness of a Video File Attacks Parameters BER NC Re- quantization 16-8-16 bits 0.07 0.951 Re-sampling 44.1-22.05- 44.1 KHz 0.11 0.902 MP3 Compression 256 kbps 0.09 0.912 AWGN 18 dB 0.13 0.882 Attacks Parameters BER NC Median filter [3 x 3] 0.09 0.912 Re-sizing 320-640-320 pixels 0.06 0.972 H.264 Compression 768 kbps 0.09 0.912 AWGN 20 dB 0.14 0.856
  • 18.
    18 Experimental and SimulationResults Computational Time of Audio Files Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Computational Time of Video Files CPU Time in secs Process Loopy Music Huge Wav Aasan Nai Yahan Fingerprint generation 6.01 6.01 6.01 Base file generation 14.08 31.15 181.39 Supplementary file generation 0.03 0.18 1.19 Total time 20.13 37.34 188.60 CPU Time in secs Process Traffic Dragon Breaking Bad Fingerprint generation 6.01 6.01 6.01 Base file generation 14.08 31.15 181.39 Supplementary file generation 0.03 0.18 1.19 Total time 20.13 37.34 188.60
  • 19.
    19 Experimental and SimulationResults CommunicationTime of an Audio File Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems Communication Time of a Video File Communication time in secs File name BF delivery SF delivery File Recon- struction Total time Loopy Music 8.01 10.00 3.89 21.90 Communication time in secs File name BF delivery SF delivery File Recon- struction Total time Break- ing Bad 184.00 657.29 595.05 1436.34 Cryptographic Algorithms CPU time in secs Public-key cryptography 5.73 Anonymous key exchange 9.62 AES encryption/decryption 1.89 Total 17.24 Cryptographic Costs of an Audio File Cryptographic Costs of a Video File Cryptographic Algorithms CPU time in secs Public-key cryptography 8.80 Anonymous key exchange 9.62 AES encryption/decryption 0.11 Total 18.53
  • 20.
    20 Conclusions and FutureWork Conclusions Future Work • A P2P content distribution system which allows efficient distribution of large-sized content while preserving the security and privacy of content providers and end users. • The security and performance analysis demonstrates the security and efficiency of the proposed framework. • The framework is able to resolve the problems of piracy tracing, buyer frameproofness, collusion resistance, accountability, dispute resolution and buyer’s privacy. • Reduce the size of the base file through losless compression techniques. • Develop a prototype of the proposed framework and test it in a real-world scenario. Framework for Preserving Security and Privacy in Peer-to-Peer Content Distribution Systems
  • 21.
    21 Thank you! Framework forPreserving Security and Privacy in Peer-to-Peer Content Distribution Systems