Abstract
P2P networks provide a basic form of anonymity. The anonymity, however, breaks down at download/upload time because the IP address of the host from which the data is downloaded (or to which it is uploaded) can be known to the outside. We propose a technique to provide anonymity for both the client and the server node. A random node along the path between the client and the server node is selected as an agent node and works as a proxy: the client will see it as the server and the server looks at it as the client, hence protecting the identity of the client and the server from each other.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The Freenet Project, http://freenet.sourceforge.net/
The Gnutella Protocol Specification v0.41 Document Revision 1.2, http://rfc.gnutella.sourceforge.net/developer/stable/index.html/
Hildrum, K., Kubiatowicz, J., Rao, S., Zhao, B.Y.: Distributed Object Location in a Dynamic Network, Theory of Computing Systems (2004)
Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A Resilient Global-scale Overlay for Service Deployment. IEEE Journal on Selected Areas in Communications (2004)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable content-addressable network. In: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications table of contents (2001)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking (2003)
Daswani, N., Garcia-Molina, H.: Query-flood DoS attacks in gnutella. In: Proceedings of the t e 9th ACM conference on Computer and communications security table of contents (2002)
Gummadi, P.K., Saroiu, S., Gribble, S.D.: A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. ACM SIGCOMM Computer Communication Review (2002)
MUTE: Simple, Anonymous File Sharing, http://mute-net.sourceforge.net/
Bono, S.C., Soghoian, C.A., Monrose, F.: Mantis: A Lightweight, Server-Anonymity Preserving, Searchable P2P, Information Security Institute of The Johns Hopkins University, Technical Report TR-2004-01-B-ISI-JHU (2004)
Reed, M.G., Syverson, P.F.: Onion Routing. In: Proceeding of AIPA 1999 (1999)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)
Reiter, M.K., Rubin, A.D.: Crowds: anonymity for Web transactions. In: ACM Transactions on Information and System Security, TISSEC 1998 (1998)
Gnutella Developer Forum, http://groups.yahoo.com/group/the_gdf/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, B.R., Kim, K.C. (2005). Anonymous Communication Systems in P2P Network with Random Agent Nodes. In: Zhuge, H., Fox, G.C. (eds) Grid and Cooperative Computing - GCC 2005. GCC 2005. Lecture Notes in Computer Science, vol 3795. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11590354_97
Download citation
DOI: https://doi.org/10.1007/11590354_97
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30510-1
Online ISBN: 978-3-540-32277-1
eBook Packages: Computer ScienceComputer Science (R0)