Skip to main content

An Efficient Protocol for Peer-to-Peer File Sharing with Mutual Anonymity

  • Conference paper
Grid and Cooperative Computing - GCC 2004 (GCC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3251))

Included in the following conference series:

  • 237 Accesses

Abstract

A fundamental problem in a pure Peer-to-Peer (P2P) file sharing system is how to protect the anonymity of nodes when providing efficient data access services. By seamlessly combining the technologies of multi-proxy and IP multicast together, we propose a multicast-based protocol for efficient file sharing with mutual anonymity in this paper. Furthermore, the proposed protocol can adaptively adjust file distribution and reduce the multicast cost simultaneously. The simulations show that Mapper possesses the merits of scalability, reliability, and high adaptability with high performance.

This work is partially supported by the National 973 Program of China under Grant No. 2002CB312002 and the National High-Tech Research and Development 863 Program of China under Grant No. 2001AA113050.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Milojicic, D., Kalogeraki, S., Lukose, V.R., et al.: Peer to Peer Computing, Technical Report: HPL-2002-57 (March 2002)

    Google Scholar 

  2. Shields, C., Levine, B.N.: A Protocol for Anonymous Communication Over the Internet. In: Proc. 7th ACM Conference on Computer and Communication Security (ACM CCS 2000) (November 2000)

    Google Scholar 

  3. Dingledine, R., Freedman, M.J., Molnar, D.: The free heven project: Distributed anonymous storage service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, p. 67. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Anonymizer, http://www.anonymizer.com/

  5. Gabber, E., Gibbons, P., Kristol, D., et al.: Consistent, yet anonymous, Web access with LPWA. Communications of the ACM 42, 2 (1999)

    Article  Google Scholar 

  6. Reed, M., Syverson, P., Goldschlag, D.: Proxies for anonymous routing. In: 12th Annual Computer Security Applications Conference, December 1995, pp. 95–104. IEEE, Los Alamitos (1995)

    Google Scholar 

  7. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  8. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital pseudonyms. Communications of the ACM 24(2) (1981)

    Google Scholar 

  9. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California (2000)

    Google Scholar 

  10. Scarlata, V., Levine, B.N., Shields, C.: Responder Anonymity and Anonymous Peer-to- Peer File Sharing. In: Proceedings of the IEEE Intl. Conference on Network Protocols (ICNP) 2001 (November 2001)

    Google Scholar 

  11. Shirky, C.: Listening to Napster. In: Oram, A. (ed.) Peer-to-Peer:Harnessing the Benefits of a Disruptive Technology, O’Reilly and Associates, Inc., Sebastopol (2001)

    Google Scholar 

  12. Clips, Gnutella Protocol Specifications, V. 0.4, http://www.clips2.com

  13. American National Standards Institute, American National Standard X9.30.2-1997: Public Key Cryptography for the Financial Services Industry – Part 2: The Secure Hash Algorithm (SHA-1) (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ye, B., Zhou, J., Zhang, Y., Cao, J., Chen, D. (2004). An Efficient Protocol for Peer-to-Peer File Sharing with Mutual Anonymity. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004. GCC 2004. Lecture Notes in Computer Science, vol 3251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30208-7_89

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30208-7_89

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23564-4

  • Online ISBN: 978-3-540-30208-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics