Abstract
Anonymity has been one of the most challenging issues in Ad Hoc environment such as P2P systems. In this paper, we propose an anonymous protocol called Random Walk based Anonymous Protocol (RWAP), in decentralized P2P systems. We evaluate RWAP by comprehensive trace driven simulations. Results show that RWAP significantly reduces traffic cost and encryption overhead compared with existing approaches.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anonymity, http://freehaven.net/anonbib/topic.html
FIPS-197: Advanced Encryption Standard, National Institute of Standards and Technology (NIST), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Gnutella, http://gnutella.wego.com/
Gnutella Protocol Development, http://rfc-gnutella.sourceforge.net/index.html
The Gnutella Protocol Spedification v0.4, http://www.clip2.com/GnutellaProtocol04.pdf
KaZaA, http://www.kazaa.com
Napster, http://www.napster.com
Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web Caching and Zipf-like Distributions: Evidence and Implications. In: Proceedings of IEEE INFOCOM (1999)
Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making Gnutella-like P2P Systems Scalable. In: Proceedings of ACM SIGCOMM (2003)
Cohen, E., Shenker, S.: Replication Strategies in Unstructured Peer-to-peer Networks. In: Proceedings of ACM SIGCOMM (2002)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)
Gkantsidis, C., Mihail, M., Saberi, A.: Random Walks in Peer-to-Peer Networks. In: Proceedings of IEEE INFOCOM (2004)
Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, SOSP (2003)
Jia, W., Xuan, D., Tu, W., Lin, L., Zhao, W.: Distributed Admission Control for Anycast Flows. IEEE Transactions on Parallel and Distributed Systems, TPDS (2004)
Law, C., Siu, K.-Y.: Distributed Construction of Random Expander Networks. In: Proceedings of IEEE INFOCOM (2003)
Liu, Y., Liu, X., Xiao, L., Ni, L.M., Zhang, X.: Location-Aware Topology Matching in Unstructured P2P Systems. In: Proceedings of IEEE INFOCOM (2004)
Lv, Q., Cao, P., Edith, C., Li, K., Shenker, S.: Search and Replication in Unstructured Peer-to-Peer Networks. In: Proceedings of International Conference on Supercomputing (ICS 2002). ACM, New York (2002)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security (1998)
Rennhard, Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. In: Proceedings of ACM workshop on Privacy in the Electronic Society (2002)
Scarlata, V., Levine, B.N., Shields, C.: Responder Anonymity and Anonymous Peer-to-Peer File Sharing. In: Proceedings of the 9th International Conference of Network Protocol, ICNP (2001)
Shields, C., Levine, B.N.: A Protocol for Anonymous Communication over the Internet. In: Proceedings of 7th ACM Conference on Computer and Communication Security, ACM CCS (2000)
Xiao, L., Xu, Z., Zhang, X.: Low-cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Han, J., Liu, Y., Lu, L., Hu, L., Patil, A. (2005). A Random Walk Based Anonymous Peer-to-Peer Protocol Design. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_17
Download citation
DOI: https://doi.org/10.1007/11534310_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28102-3
Online ISBN: 978-3-540-31868-2
eBook Packages: Computer ScienceComputer Science (R0)