Skip to main content

Measuring Freenet in the Wild: Censorship-Resilience under Observation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8555))

Abstract

Freenet, a fully decentralized publication system designed for censorship-resistant communication, exhibits long delays and low success rates for finding and retrieving content. In order to improve its performance, an in-depth understanding of the deployed system is required. Therefore, we performed an extensive measurement study accompanied by a code analysis to identify bottlenecks of the existing algorithms and obtained a realistic user model for the improvement and evaluation of new algorithms.

Our results show that 1) the current topology control mechanisms are suboptimal for routing and 2) Freenet is used by several tens of thousands of users who exhibit uncharacteristically long online times in comparison to other P2P systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Clarke, I., Hong, T.W., Miller, S.G., Sandberg, O., Wiley, B.: Protecting free expression online with freenet. IEEE Internet Computing (2002)

    Google Scholar 

  3. Clarke, I., Sandberg, O., Toseland, M., Verendel, V.: Private communication through a network of trusted connections: The dark freenet (2010)

    Google Scholar 

  4. Vasserman, E.Y., Jansen, R., Tyra, J., Hopper, N., Kim, Y.: Membership-concealing overlay networks. In: CCS (2009)

    Google Scholar 

  5. Sandberg, O.: Distributed routing in small-world networks. In: Workshop on Algorithm Engineering and Experiments, ALENEX 2006 (2006)

    Google Scholar 

  6. Kleinberg, J.: The small-world phenomenon: An algorithmic perspective. In: Symposium on Theory of Computing (2000)

    Google Scholar 

  7. Roos, S., Strufe, T.: A contribution to darknet routing. In: INFOCOM (2013)

    Google Scholar 

  8. Evans, N.S., GauthierDickey, C., Grothoff, C.: Routing in the dark: Pitch black. In: ACSAC (2007)

    Google Scholar 

  9. Schiller, B., Roos, S., Hoefer, A., Strufe, T.: Attack resistant network embeddings for darknets. In: SRDSW (2011)

    Google Scholar 

  10. Tian, G., Duan, Z., Baumeister, T., Dong, Y.: A traceback attack on freenet. In: INFOCOM (2013)

    Google Scholar 

  11. Cramer, C., Kutzner, K., Fuhrmann, T.: Bootstrapping locality-aware p2p networks. In: ICON (2004)

    Google Scholar 

  12. Mittal, P., Borisov, N.: Shadowwalker: peer-to-peer anonymous communication using redundant structured topologies. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 161–172. ACM (2009)

    Google Scholar 

  13. Isdal, T., Piatek, M., Krishnamurthy, A., Anderson, T.E.: Privacy-preserving p2p data sharing with oneswarm. In: SIGCOMM (2010)

    Google Scholar 

  14. Mittal, P., Caesar, M., Borisov, N.: X-vine: Secure and pseudonymous routing using social networks. arXiv preprint arXiv:1109.0971 (2011)

    Google Scholar 

  15. Krishna Gummadi, P., Saroiu, S., Gribble, S.D.: A measurement study of napster and gnutella as examples of peer-to-peer file sharing systems. Computer Communication Review (2002)

    Google Scholar 

  16. Sen, S., Wang, J.: Analyzing peer-to-peer traffic across large networks. IEEE/ACM Transactions on Networking (2004)

    Google Scholar 

  17. Bhagwan, R., Savage, S., Voelker, G.M.: Understanding availability. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 256–267. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., Zhang, X.: Measurements, analysis, and modeling of bittorrent-like systems. In: IMC (2005)

    Google Scholar 

  19. Pouwelse, J., Garbacki, P., Epema, D.H.J., Sips, H.J.: The bittorrent P2P file-sharing system: Measurements and analysis. In: van Renesse, R. (ed.) IPTPS 2005. LNCS, vol. 3640, pp. 205–216. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  20. Krishna Gummadi, P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: SOSP (2003)

    Google Scholar 

  21. Stutzbach, D., Rejaie, R.: Understanding churn in peer-to-peer networks. In: IMC (2006)

    Google Scholar 

  22. Rhea, S., Geels, D., Roscoe, T., Kubiatowicz, J.: Handling churn in a dht. Computer Science (2003)

    Google Scholar 

  23. Bustamante, F., Qiao, Y.: Friendships that last: Peer lifespan and its role in p2p protocols. In: Web Content Caching and Distribution, pp. 233–246 (2004)

    Google Scholar 

  24. Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  25. Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: USENIX Security Symposium (2004)

    Google Scholar 

  26. Mane, S., Mopuru, S., Mehra, K., Srivastava, J.: Network size estimation in a peer-to-peer network. University of Minnesota, MN, Tech. Rep. (2005)

    Google Scholar 

  27. Schneider, F., Feldmann, A., Krishnamurthy, B., Willinger, W.: Understanding online social network usage from a network perspective. In: IMC (2009)

    Google Scholar 

  28. Wolinsky, D.I., Syta, E., Ford, B.: Hang with your buddies to resist intersection attacks. In: CCS (2013)

    Google Scholar 

  29. Hefeeda, M., Saleh, O.: Traffic modeling and proportional partial caching for peer-to-peer systems. IEEE/ACM Trans. Netw. (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Roos, S., Schiller, B., Hacker, S., Strufe, T. (2014). Measuring Freenet in the Wild: Censorship-Resilience under Observation. In: De Cristofaro, E., Murdoch, S.J. (eds) Privacy Enhancing Technologies. PETS 2014. Lecture Notes in Computer Science, vol 8555. Springer, Cham. https://doi.org/10.1007/978-3-319-08506-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08506-7_14

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08505-0

  • Online ISBN: 978-3-319-08506-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics