Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 2/2011

01-06-2011 | Review

Security and privacy issues in P2P streaming systems: A survey

Published in: Peer-to-Peer Networking and Applications | Issue 2/2011

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the other ‘side’ properties that transform an experimental application into a service. Research on security for P2P streaming started to flourish, but no comprehensive security analysis over the current P2P solutions has yet been attempted. There are no best practices in system design, no (widely) accepted attack models, no measurement-based studies on security threats to P2P streaming, nor even general surveys investigating specific security aspects for these systems. This paper addresses this last aspect. Starting from existing analyses and security models in the related literature, we give an overview on security and privacy considerations for P2P streaming systems. Our analysis emphasizes two major facts: (i) the Byzantine–Altruistic–Rational (BAR) model offers stronger security guarantees compared to other approaches, at the cost of higher complexity and overhead; and (ii) the general perception (not necessarily the truth, but a commonplace belief) that it is necessary to sacrifice accuracy or performance in order to tolerate faults or misbehaviors, is not always true.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
3
A volume-threat is a subtle form of DoS attack: the attacker does not need attack directly any peer or the source, it just needs to inject in the network, which is already loaded because of the very popular live event streamed, enough dummy traffic to cause a packet loss rate that the streaming application cannot cope with.
 
Literature
2.
go back to reference Alvisi L, Doumen J, Guerraoui R, Koldehofe B, Li H, van Renesse R, Tredan G (2007) How robust are gossip-based communication protocols? SIGOPS Oper Syst Rev 41(5):14–18CrossRef Alvisi L, Doumen J, Guerraoui R, Koldehofe B, Li H, van Renesse R, Tredan G (2007) How robust are gossip-based communication protocols? SIGOPS Oper Syst Rev 41(5):14–18CrossRef
3.
go back to reference Bianchi G, Bonola M, Falletta V, Proto FS, Teofili S (2008) The sparta pseudonym and authorization system. Sci Comput Program 74(1–2):23–33MathSciNet Bianchi G, Bonola M, Falletta V, Proto FS, Teofili S (2008) The sparta pseudonym and authorization system. Sci Comput Program 74(1–2):23–33MathSciNet
4.
go back to reference Camenisch J, Lysyanskaya A (2001) An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Proc of the int conference on the theory and application of cryptographic techniques (EUROCRYPT ’01). London, UK, Springer-Verlag, pp 93–118 Camenisch J, Lysyanskaya A (2001) An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Proc of the int conference on the theory and application of cryptographic techniques (EUROCRYPT ’01). London, UK, Springer-Verlag, pp 93–118
5.
go back to reference Carra D, Lo Cigno R, Biersack EW (2007) Graph based analysis of mesh overlay streaming systems. IEEE J Sel Areas Commun 25:1667–1677CrossRef Carra D, Lo Cigno R, Biersack EW (2007) Graph based analysis of mesh overlay streaming systems. IEEE J Sel Areas Commun 25:1667–1677CrossRef
6.
go back to reference Carra D, Lo Cigno R, Biersack EW (2008) Stochastic graph processes for performance evaluation of content delivery applications in overlay networks. IEEE Trans Parallel Distrib Syst 19:247–261CrossRef Carra D, Lo Cigno R, Biersack EW (2008) Stochastic graph processes for performance evaluation of content delivery applications in overlay networks. IEEE Trans Parallel Distrib Syst 19:247–261CrossRef
7.
go back to reference Ciullo D, Mellia M, Meo M, Leonardi E (2008) Understanding P2P-TV systems through real measurements. In: Proc of the IEEE global telecommunications conference (GLOBECOM’08) Ciullo D, Mellia M, Meo M, Leonardi E (2008) Understanding P2P-TV systems through real measurements. In: Proc of the IEEE global telecommunications conference (GLOBECOM’08)
8.
go back to reference Conner W, Nahrstedt K (2007) Securing peer-to-peer media streaming systems from selfish and malicious behavior. In: MDS ’07: Proc of the 4th on Middleware doctoral symposium. ACM, New York, pp 1–6CrossRef Conner W, Nahrstedt K (2007) Securing peer-to-peer media streaming systems from selfish and malicious behavior. In: MDS ’07: Proc of the 4th on Middleware doctoral symposium. ACM, New York, pp 1–6CrossRef
9.
go back to reference Conner W, Nahrstedt K, Gupta I (2006) Preventing DoS attacks in peer-to-peer media streaming systems. In: Proc of the 13th annual conference on multimedia computing and networking (MMCN’06), San Jose Conner W, Nahrstedt K, Gupta I (2006) Preventing DoS attacks in peer-to-peer media streaming systems. In: Proc of the 13th annual conference on multimedia computing and networking (MMCN’06), San Jose
10.
go back to reference Dabek F et al (2001) Building Peer-to-Peer Systems with Chord, a Distributed Lookup Service. In: Proc of the 8th workshop on hot topics in operating systems (HotOS), Schloss Elmau Dabek F et al (2001) Building Peer-to-Peer Systems with Chord, a Distributed Lookup Service. In: Proc of the 8th workshop on hot topics in operating systems (HotOS), Schloss Elmau
11.
go back to reference Dhungel P, Hei X, Ross KW, Saxena N (2007) The pollution attack in P2P live video streaming: measurement results and defenses. In: Proc of the 2007 workshop on peer-to-peer streaming and IP-TV (P2P-TV’07). ACM, New York, pp 323–328CrossRef Dhungel P, Hei X, Ross KW, Saxena N (2007) The pollution attack in P2P live video streaming: measurement results and defenses. In: Proc of the 2007 workshop on peer-to-peer streaming and IP-TV (P2P-TV’07). ACM, New York, pp 323–328CrossRef
12.
go back to reference Dolev D, Hoch EN, van Renesse R (2007) Self-stabilizing and byzantine-tolerant overlay network. In: Tovar E, Tsigas P, Fouchal H (eds) Proc of the 11th int conference on principles of distributed systems (OPODIS’07), LNCS, vol 4878. Guadeloupe, French West Indies. Springer, New York, pp 343–357 Dolev D, Hoch EN, van Renesse R (2007) Self-stabilizing and byzantine-tolerant overlay network. In: Tovar E, Tsigas P, Fouchal H (eds) Proc of the 11th int conference on principles of distributed systems (OPODIS’07), LNCS, vol 4878. Guadeloupe, French West Indies. Springer, New York, pp 343–357
13.
go back to reference Han K, Pei G, Ravindran B, Jensen E (2008) Real-time, byzantine-tolerant information dissemination in unreliable and untrustworthy distributed systems. In: Proc of the IEEE int conference on communications (ICC’08). pp 1727–1731 Han K, Pei G, Ravindran B, Jensen E (2008) Real-time, byzantine-tolerant information dissemination in unreliable and untrustworthy distributed systems. In: Proc of the IEEE int conference on communications (ICC’08). pp 1727–1731
14.
go back to reference Haridasan M, van Renesse R (2006) Defense against intrusion in a live streaming multicast system. In: Proc of the 6th IEEE int conference on peer-to-peer computing (P2P’06). IEEE Computer Society, Cambridge, pp 185–192CrossRef Haridasan M, van Renesse R (2006) Defense against intrusion in a live streaming multicast system. In: Proc of the 6th IEEE int conference on peer-to-peer computing (P2P’06). IEEE Computer Society, Cambridge, pp 185–192CrossRef
15.
go back to reference Haridasan M, van Renesse R (2008) SecureStream: an intrusion-tolerant protocol for live-streaming dissemination. Comput Commun 31(3):563–575CrossRef Haridasan M, van Renesse R (2008) SecureStream: an intrusion-tolerant protocol for live-streaming dissemination. Comput Commun 31(3):563–575CrossRef
16.
go back to reference Jelasity M, Montresor A, Babaoglu O (2009) T-Man: gossip-based fast overlay topology construction. Elsevier Comput Networks 53:2321–2339CrossRefMATH Jelasity M, Montresor A, Babaoglu O (2009) T-Man: gossip-based fast overlay topology construction. Elsevier Comput Networks 53:2321–2339CrossRefMATH
18.
go back to reference Jesi G (2006) Secure Gossiping Techniques and Components. PhD thesis, University of Bologna, Dept of Computer Science Jesi G (2006) Secure Gossiping Techniques and Components. PhD thesis, University of Bologna, Dept of Computer Science
19.
go back to reference Kermarrec A-M, van Steen M (2007) Gossiping in distributed systems. SIGOPS Oper Syst Rev 41(5):2–7CrossRef Kermarrec A-M, van Steen M (2007) Gossiping in distributed systems. SIGOPS Oper Syst Rev 41(5):2–7CrossRef
20.
go back to reference Leonardi E, Mellia M, Horvath A, Muscariello L, Niccolini S, Rossi D (2008) Building a cooperative P2P-TV application over a wise network: the approach of the European FP-7 strep NAPA-WINE. IEEE Commun Mag 46(4):20–22CrossRef Leonardi E, Mellia M, Horvath A, Muscariello L, Niccolini S, Rossi D (2008) Building a cooperative P2P-TV application over a wise network: the approach of the European FP-7 strep NAPA-WINE. IEEE Commun Mag 46(4):20–22CrossRef
21.
go back to reference Li HC, Clement A, Wong EL, Napper J, Roy I, Alvisi L, Dahlin M (2006) BAR gossip. In: Proc of the 7th SIGOPS symposium on operating systems design and implementation (OSDI’06). USENIX Association, Seattle, WA Li HC, Clement A, Wong EL, Napper J, Roy I, Alvisi L, Dahlin M (2006) BAR gossip. In: Proc of the 7th SIGOPS symposium on operating systems design and implementation (OSDI’06). USENIX Association, Seattle, WA
23.
go back to reference Magharei N, Rejaie R (2007) PRIME: peer-to-peer receiver-driven mesh-based streaming. In: Proc of the 26th IEEE int conference on computer communications (INFOCOM’07). IEEE, pp 1415–1423 Magharei N, Rejaie R (2007) PRIME: peer-to-peer receiver-driven mesh-based streaming. In: Proc of the 26th IEEE int conference on computer communications (INFOCOM’07). IEEE, pp 1415–1423
24.
go back to reference Magharei N, Rejaie R, Guo Y (2007) Mesh or multiple-tree: a comparative study of live P2P streaming approaches. In: Proc of the 26th IEEE int conference on computer communications (INFOCOM’07), pp 1424–1432 Magharei N, Rejaie R, Guo Y (2007) Mesh or multiple-tree: a comparative study of live P2P streaming approaches. In: Proc of the 26th IEEE int conference on computer communications (INFOCOM’07), pp 1424–1432
25.
go back to reference Martin J-P (2007) Leveraging altruism in cooperative services. Technical Report TR-2007-76, Microsoft Research, Cambridge Martin J-P (2007) Leveraging altruism in cooperative services. Technical Report TR-2007-76, Microsoft Research, Cambridge
26.
go back to reference Rowstron A, Druschel P (2001) Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Proc of the 18th int conf on distributed Systems Platforms, Heidelberg Rowstron A, Druschel P (2001) Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Proc of the 18th int conf on distributed Systems Platforms, Heidelberg
27.
go back to reference Seedorf J, Burger E (2009) Application-layer traffic optimization (ALTO) problem statement. RFC 5693, IETF Seedorf J, Burger E (2009) Application-layer traffic optimization (ALTO) problem statement. RFC 5693, IETF
28.
go back to reference Seibert J, Zage D, Fahmy S, Nita-Rotaru C (2007) Experimental comparison of peer-to-peer streaming overlays: an application perspective. Technical Report CSD TR 07-020, Purdue University Seibert J, Zage D, Fahmy S, Nita-Rotaru C (2007) Experimental comparison of peer-to-peer streaming overlays: an application perspective. Technical Report CSD TR 07-020, Purdue University
29.
go back to reference Seibert J, Zage D, Nita-Rotaru C (2008) Won’t you be my neighbor? Neighbor selection attacks in mesh-based peer-to-peer streaming. Technical Report, Purdue University Seibert J, Zage D, Nita-Rotaru C (2008) Won’t you be my neighbor? Neighbor selection attacks in mesh-based peer-to-peer streaming. Technical Report, Purdue University
30.
go back to reference Shetty S, Galdames P, Tavanapong W, Cai Y (2006) Detecting malicious peers in overlay multicast streaming. In: Proc of the 31st IEEE conference on local computer networks (LCN’06), Florida Shetty S, Galdames P, Tavanapong W, Cai Y (2006) Detecting malicious peers in overlay multicast streaming. In: Proc of the 31st IEEE conference on local computer networks (LCN’06), Florida
31.
go back to reference Silverston T, Fourmaux O (2006) Source vs data-driven approach for live P2P streaming. In: Proc of the int conference on networking, int conference on systems and int conference on mobile communications and learning technologies (ICNICONSMCL ’06), IEEE Computer Society, Washington, DC, p 99CrossRef Silverston T, Fourmaux O (2006) Source vs data-driven approach for live P2P streaming. In: Proc of the int conference on networking, int conference on systems and int conference on mobile communications and learning technologies (ICNICONSMCL ’06), IEEE Computer Society, Washington, DC, p 99CrossRef
32.
go back to reference Singh A, Castro M, Druschel P, Rowstron A (2004) Defending against eclipse attacks on overlay networks. In: Proc of the 11th workshop on ACM SIGOPS European workshop, p 21 Singh A, Castro M, Druschel P, Rowstron A (2004) Defending against eclipse attacks on overlay networks. In: Proc of the 11th workshop on ACM SIGOPS European workshop, p 21
33.
go back to reference Singh K, Schulzrinne H (2005) Peer-to-peer internet telephony using SIP. In: Proc of the int workshop on network and operating systems support for digital audio and video (NOSSDAV’05). ACM, Stevenson, pp 63–68CrossRef Singh K, Schulzrinne H (2005) Peer-to-peer internet telephony using SIP. In: Proc of the int workshop on network and operating systems support for digital audio and video (NOSSDAV’05). ACM, Stevenson, pp 63–68CrossRef
34.
go back to reference Wallach DS (2003) A survey of peer-to-peer security issues. In: Okada M, Pierce BC, Scedrov A, Tokuda H, Yonezawa A (eds) Proc of the Mext-NSF-JSPS int symposium on software security—theories and systems (ISSS’02), LNCS, vol 2609. Springer, Tokyo, pp 42–57 Wallach DS (2003) A survey of peer-to-peer security issues. In: Okada M, Pierce BC, Scedrov A, Tokuda H, Yonezawa A (eds) Proc of the Mext-NSF-JSPS int symposium on software security—theories and systems (ISSS’02), LNCS, vol 2609. Springer, Tokyo, pp 42–57
35.
go back to reference Yang J, Li Y, Huang B, Ming J (2008) Preventing DDoS attacks based on credit model for P2P streaming system. In: ATC ’08: Proc of the 5th international conference on autonomic and trusted computing. Springer, Berlin, pp 13–20 Yang J, Li Y, Huang B, Ming J (2008) Preventing DDoS attacks based on credit model for P2P streaming system. In: ATC ’08: Proc of the 5th international conference on autonomic and trusted computing. Springer, Berlin, pp 13–20
36.
go back to reference Yang S, Jin H, Li B, Liao X (2009) A modeling framework of content pollution in Peer-to-Peer video streaming systems. Comput Networks 53(15):2703–2715CrossRefMATH Yang S, Jin H, Li B, Liao X (2009) A modeling framework of content pollution in Peer-to-Peer video streaming systems. Comput Networks 53(15):2703–2715CrossRefMATH
37.
go back to reference Zhang X, Liu J, Li B, Yum Y-S (2005) CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming. In: Proc of the 24th IEEE int conference on computer communications (INFOCOM’05), vol 3, pp 2102–2111 Zhang X, Liu J, Li B, Yum Y-S (2005) CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming. In: Proc of the 24th IEEE int conference on computer communications (INFOCOM’05), vol 3, pp 2102–2111
38.
go back to reference Zhou M, Liu J (2005) A hybrid overlay network for video-on-demand. In: Proc of the IEEE int conference on communications (ICC’08), pp 1309–1311 Zhou M, Liu J (2005) A hybrid overlay network for video-on-demand. In: Proc of the IEEE int conference on communications (ICC’08), pp 1309–1311
Metadata
Title
Security and privacy issues in P2P streaming systems: A survey
Publication date
01-06-2011
Published in
Peer-to-Peer Networking and Applications / Issue 2/2011
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-010-0070-6

Other articles of this Issue 2/2011

Peer-to-Peer Networking and Applications 2/2011 Go to the issue

Premium Partner