Abstract
A critical problem in a Peer-to-Peer file sharing system is how to protect the anonymity of agent nodes when providing efficient data access services. Most of existing technique mostly focus on how to provide the initiator anonymity and privacy, but leave the anonymity of the server. Our technique is similar to Onion routing in that it uses a proxy node to hide the identity of the client and the server. But it differs from it in that the proxy node is selected dynamically for each session and not fixed as in Onion routing. The fixed proxy might be convenient to use and is useful when loaded with additional features such as encryption as in Onion routing. However it is a sort of compromise from P2P point of view: we are introducing something similar to a control center that could become a bottleneck in the network. Temporary proxy doesn’t have this problem. And our technique provides caching of a retrieved data item on the reverse path back to the requestor. Caching in our paper is primarily for providing publisher anonymity and security. In this paper, we show a technique to find such proxy and caching, explain the rationale behind the decision, and prove its effectiveness through experimentation.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Workshop on Design Issues in Anonymity and Unobservability, pp. 46–66 (2000), http://citeseer.nj.nec.com/clarke00freenet.html
The Gnutella Protocol Specification v0.41 Document Revision 1.2., http://rfcgnutella.source-forge.net/developer/stable/index.html/
Hildrum, K., Kubiatowicz, J., Rao, S., Zhao, B.Y.: Distributed Object Location in a Dynamic Network. Theory of Computing Systems (2004)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)
Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A Resilient Global-scale Overlay for Service Deployment. IEEE Journal on Selected Areas in Communications (2004)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking (2003)
Daswani, N., Garcia-Molina, H.: Query-flood DoS attacks in gnutella. In: Proceedings of the 9th ACM conference on Computer and communications security table of contents (2002)
Gummadi, P.K., Saroiu, S., Gribble, S.D.: A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. ACM SIGCOMM Computer Communication Review (2002)
Back, A., Möller, U., Stiglic, A.: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245–257. Springer, Heidelberg (2001)
Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, p. 10. Springer, Heidelberg (2001)
Anonymizer, http://www.anonymizer.com/
Gabber, E., Gibbons, P., Kristol, D., Matias, Y., Mayer, A.: Consistent, yet anonymous, Web access with LPWA. Commun. ACM 42(2), 42–47 (1999)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web transactions. ACM Trans. Information and System Security 1(1), 66–92 (1998)
Chaum, D.: Untraceable electronic mail, return addresses, and digitall pseudonyms. Commun. ACM 24(2), 84–90 (1981)
Shields, C., Levine, B.N.: A protocol for anonymous communication over the Internet. In: Proc. 7th ACM Conference on Computer and Communication Security (ACM CCS 2000) (November 2000)
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Cottrell, L.: Frequently asked questions about Mixmaster remailers (2000), http://www.obscura.com/~loki/remailer/mixmaster-faq.html
Zero-Knowledge Systems (2000), http://www.zks.net/
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. Journal of the ACM 45(6), 965–982 (1998)
The Rewebber (2000), http://www.rewebber.de/
Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: a robust, tamper-evident, censorship-resistant, web publishing system. In: Proceedings of the Ninth USENIX Security Symposium, Denver, CO, USA (2000)
Anderson, R.J.: The Eternity service. In: Proceedings of the 1st International Conference on the Theory and Applications of Cryptology (PRAGOCRYPT 1996), Prague, Czech Republic (1996)
Dingledine, R., Freedman, M.J., Molnar, D.: The Free Haven project: distributed anonymous storage service. In: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer, New York (2001)
MUTE: Simple, Anonymous File Sharing, http://mute-net.sourceforge.net/
Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429. Springer, Heidelberg (2002)
Bono, S.C., Soghoian, C.A., Monrose, F.: Mantis: A Lightweight, Server-Anonymity Preserving, Searchable P2P, Information Security Institute of The Johns Hopkins University, Technical Report TR-2004-01-B-ISI-JHU (2004)
Gnutella Developer Forum, http://groups.yahoo.com/group/the_gdf/
Shirky, C.: Listening to Napster. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology. O’Reilly and Associates, Inc., Sebastopol (2001)
Scarlata, V., Levine, B.N., Shields, C.: Responder anonymity and anonymous peer-to-peer file sharing. In: Proc. IEEE Intl. Conference on Network Protocols (ICNP 2001) (November 2001)
Introduction to Newtella, http://www.schnarff.com/gnutelladev/source/newtella/
Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web Caching and Zipf-like Distributions: Evidence and Implications. IEEE INFOCOM (1999)
Sripanidkulchai, K.: The popularity of Gnutella queries and its implications on scalability (January 2004), http://www-2.cs.cmu.edu/~kunwadee/research/p2p/paper.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, B.R., Kim, K.C. (2006). Efficient Caching Strategies for Gnutella-Like Systems to Achieve Anonymity in Unstructured P2P File Sharing. In: Etzion, O., Kuflik, T., Motro, A. (eds) Next Generation Information Technologies and Systems. NGITS 2006. Lecture Notes in Computer Science, vol 4032. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11780991_11
Download citation
DOI: https://doi.org/10.1007/11780991_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35472-7
Online ISBN: 978-3-540-35473-4
eBook Packages: Computer ScienceComputer Science (R0)