Skip to main content

Anonymity and Censorship Resistance in Unstructured Overlay Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5870))

Abstract

This paper presents Clouds, a peer-to-peer protocol that guarantees both anonymity and censorship resistance in semantic overlay networks. The design of such a protocol needs to meet a number of challenging goals: enabling the exchange of encrypted messages without assuming previously shared secrets, avoiding centralised infrastructures, like trusted servers or gateways, and guaranteeing efficiency without establishing direct connections between peers. Anonymity is achieved by cloaking the identity of protocol participants behind groups of semantically close peers. Censorship resistance is guaranteed by a cryptographic protocol securing the anonymous communication between the querying peer and the resource provider. Although we instantiate our technique on semantic overlay networks to exploit their retrieval capabilities, our framework is general and can be applied to any unstructured overlay network. Experimental results demonstrate the security properties of Clouds under different attacks and show the message overhead and retrieval effectiveness of the protocol.

Work partially supported by the initiative for excellence and by Emmy Noether program of the German federal government and by Miur project SOFT: “Security Oriented Formal Techniques”.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Singh, A., Gedik, B., Liu, L.: Agyaat: Mutual Anonymity over Structured P2P Networks. Emerald Internet Research Journal (2006)

    Google Scholar 

  2. Aberer, K., Cudré-Mauroux, P., Hauswirth, M., Van Pelt, T.: GridVine: Building Internet-Scale Semantic Overlay Networks. In: McIlraith, S.A., Plexousakis, D., van Harmelen, F. (eds.) ISWC 2004. LNCS, vol. 3298, pp. 107–121. Springer, Heidelberg (2004)

    Google Scholar 

  3. Castro, M., Druschel, P., Ganesh, A.J., Rowstron, A.I.T., Wallach, D.S.: Secure Routing for Structured Peer-to-Peer Overlay Networks. In: Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, OSDI (2002)

    Google Scholar 

  4. Chaum, D.L.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology (1988)

    Google Scholar 

  5. Clarke, I., Miller, S., Hong, T., Sandberg, O., Wiley, B.: Protecting Free Expression Online with Freenet. IEEE Internet Computing (2002)

    Google Scholar 

  6. Crespo, A., Garcia-Molina, H.: Semantic Overlay Networks for P2P Systems. In: Proceedings of the International Workshop on Agents and Peer-to-Peer Computing, AP2PC (2004)

    Google Scholar 

  7. Datar, M.: Butterflies and Peer-to-Peer Networks. In: Möhring, R.H., Raman, R. (eds.) ESA 2002. LNCS, vol. 2461, p. 310. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the USENIX Security Symposium (2004)

    Google Scholar 

  9. Dolev, S., Ostrobsky, R.: Xor-Trees for Efficient Anonymous Multicast and Reception. ACM Transactions on Information and System Security (TISSEC) (2000)

    Google Scholar 

  10. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Endsuleit, R., Mie, T.: Censorship-Resistant and Anonymous P2P Filesharing. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES) (2006)

    Google Scholar 

  12. Fiat, A., Saia, J.: Censorship Resistant Peer-to-Peer Content Addressable Networks. In: Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA) (2002)

    Google Scholar 

  13. Freedman, M.J., Sit, E., Cates, J., Morris, R.: Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 121. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Goldschlag, D., Reed, M., Syverson, P.: Onion Routing. Communications of the ACM (CACM) (1999)

    Google Scholar 

  15. Han, J., Liu, Y., Xiao, L., Ni, L.: A Mutual Anonymous Peer-to-peer Protocol Design. In: Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS) (2005)

    Google Scholar 

  16. Hersh, W., Buckley, C., Leone, T.J., Hickam, D.: OHSUMED: An interactive retrieval evaluation and new large test collection for research. In: Proceedings of the Annual International ACM SIGIR Conference (1994)

    Google Scholar 

  17. King, I., Ng, C.H., Sia, K.C.: Distributed content-based visual information retrieval system on peer-to-peer networks. ACM Transactions on Information Systems (2002)

    Google Scholar 

  18. Loser, A., Wolpers, M., Siberski, W., Nejdl, W.: Semantic Overlay Clusters within Super-Peer Networks. In: Proceedings of the International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P) (2003)

    Google Scholar 

  19. Waldman, A.R.M., Cranor, L.: Publius: A Robust, Tamper-Evident, Censorship-Resistant, Web Publishing System. In: Proceedings of the USENIX Security Symposium (2000)

    Google Scholar 

  20. Raftopoulou, P., Petrakis, E.G.M.: iCluster: A Self-organizing Overlay Network for P2P Information Retrieval. In: Macdonald, C., Ounis, I., Plachouras, V., Ruthven, I., White, R.W. (eds.) ECIR 2008. LNCS, vol. 4956, pp. 65–76. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  21. Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM) (2001)

    Google Scholar 

  22. Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security (TISSEC) (1998)

    Google Scholar 

  23. Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer Based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the International Workshop on Privacy in the Electronic Society (WPES) (2002)

    Google Scholar 

  24. Schmitz, C.: Self-Organization of a Small World by Topic. In: Proceedings of the International Workshop on Peer-to-Peer Knowledge Management (P2PKM) (2004)

    Google Scholar 

  25. Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P 5: A Protocol for Scalable Anonymous Communication. IEEE Security and Privacy (2002)

    Google Scholar 

  26. Shields, C., Levine, B.N.: A Protocol for Anonymous Communication over the Internet. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2000)

    Google Scholar 

  27. Singh, A., Ngan, T., Druschel, P., Wallach, D.S.: Eclipse attacks on overlay networks: Threats and defenses. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1–12 (2006)

    Google Scholar 

  28. Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, IJUFKS (2002)

    Google Scholar 

  29. Tsai, H., Harwood, A.: A scalable anonymous server overlay network. In: International Conference on Advanced Information Networking and Applications (AINA) (2006)

    Google Scholar 

  30. Waldman, M., Mazières, D.: Tangler: a Censorship-Resistant Publishing System Based on Document Entanglements. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2001)

    Google Scholar 

  31. Wu, L., Faloutsos, C., Sycara, K.P., Payne, T.R.: FALCON: Feedback Adaptive Loop for Content-Based Retrieval. In: Proceedings of the VLDB Conference (2000)

    Google Scholar 

  32. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM), pp. 267–278 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Backes, M., Hamerlik, M., Linari, A., Maffei, M., Tryfonopoulos, C., Weikum, G. (2009). Anonymity and Censorship Resistance in Unstructured Overlay Networks. In: Meersman, R., Dillon, T., Herrero, P. (eds) On the Move to Meaningful Internet Systems: OTM 2009. OTM 2009. Lecture Notes in Computer Science, vol 5870. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05148-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05148-7_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05147-0

  • Online ISBN: 978-3-642-05148-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics