Abstract
This paper presents Clouds, a peer-to-peer protocol that guarantees both anonymity and censorship resistance in semantic overlay networks. The design of such a protocol needs to meet a number of challenging goals: enabling the exchange of encrypted messages without assuming previously shared secrets, avoiding centralised infrastructures, like trusted servers or gateways, and guaranteeing efficiency without establishing direct connections between peers. Anonymity is achieved by cloaking the identity of protocol participants behind groups of semantically close peers. Censorship resistance is guaranteed by a cryptographic protocol securing the anonymous communication between the querying peer and the resource provider. Although we instantiate our technique on semantic overlay networks to exploit their retrieval capabilities, our framework is general and can be applied to any unstructured overlay network. Experimental results demonstrate the security properties of Clouds under different attacks and show the message overhead and retrieval effectiveness of the protocol.
Work partially supported by the initiative for excellence and by Emmy Noether program of the German federal government and by Miur project SOFT: “Security Oriented Formal Techniques”.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Singh, A., Gedik, B., Liu, L.: Agyaat: Mutual Anonymity over Structured P2P Networks. Emerald Internet Research Journal (2006)
Aberer, K., Cudré-Mauroux, P., Hauswirth, M., Van Pelt, T.: GridVine: Building Internet-Scale Semantic Overlay Networks. In: McIlraith, S.A., Plexousakis, D., van Harmelen, F. (eds.) ISWC 2004. LNCS, vol. 3298, pp. 107–121. Springer, Heidelberg (2004)
Castro, M., Druschel, P., Ganesh, A.J., Rowstron, A.I.T., Wallach, D.S.: Secure Routing for Structured Peer-to-Peer Overlay Networks. In: Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, OSDI (2002)
Chaum, D.L.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology (1988)
Clarke, I., Miller, S., Hong, T., Sandberg, O., Wiley, B.: Protecting Free Expression Online with Freenet. IEEE Internet Computing (2002)
Crespo, A., Garcia-Molina, H.: Semantic Overlay Networks for P2P Systems. In: Proceedings of the International Workshop on Agents and Peer-to-Peer Computing, AP2PC (2004)
Datar, M.: Butterflies and Peer-to-Peer Networks. In: Möhring, R.H., Raman, R. (eds.) ESA 2002. LNCS, vol. 2461, p. 310. Springer, Heidelberg (2002)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the USENIX Security Symposium (2004)
Dolev, S., Ostrobsky, R.: Xor-Trees for Efficient Anonymous Multicast and Reception. ACM Transactions on Information and System Security (TISSEC) (2000)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Endsuleit, R., Mie, T.: Censorship-Resistant and Anonymous P2P Filesharing. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES) (2006)
Fiat, A., Saia, J.: Censorship Resistant Peer-to-Peer Content Addressable Networks. In: Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA) (2002)
Freedman, M.J., Sit, E., Cates, J., Morris, R.: Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 121. Springer, Heidelberg (2002)
Goldschlag, D., Reed, M., Syverson, P.: Onion Routing. Communications of the ACM (CACM) (1999)
Han, J., Liu, Y., Xiao, L., Ni, L.: A Mutual Anonymous Peer-to-peer Protocol Design. In: Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS) (2005)
Hersh, W., Buckley, C., Leone, T.J., Hickam, D.: OHSUMED: An interactive retrieval evaluation and new large test collection for research. In: Proceedings of the Annual International ACM SIGIR Conference (1994)
King, I., Ng, C.H., Sia, K.C.: Distributed content-based visual information retrieval system on peer-to-peer networks. ACM Transactions on Information Systems (2002)
Loser, A., Wolpers, M., Siberski, W., Nejdl, W.: Semantic Overlay Clusters within Super-Peer Networks. In: Proceedings of the International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P) (2003)
Waldman, A.R.M., Cranor, L.: Publius: A Robust, Tamper-Evident, Censorship-Resistant, Web Publishing System. In: Proceedings of the USENIX Security Symposium (2000)
Raftopoulou, P., Petrakis, E.G.M.: iCluster: A Self-organizing Overlay Network for P2P Information Retrieval. In: Macdonald, C., Ounis, I., Plachouras, V., Ruthven, I., White, R.W. (eds.) ECIR 2008. LNCS, vol. 4956, pp. 65–76. Springer, Heidelberg (2008)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM) (2001)
Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security (TISSEC) (1998)
Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer Based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the International Workshop on Privacy in the Electronic Society (WPES) (2002)
Schmitz, C.: Self-Organization of a Small World by Topic. In: Proceedings of the International Workshop on Peer-to-Peer Knowledge Management (P2PKM) (2004)
Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P 5: A Protocol for Scalable Anonymous Communication. IEEE Security and Privacy (2002)
Shields, C., Levine, B.N.: A Protocol for Anonymous Communication over the Internet. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2000)
Singh, A., Ngan, T., Druschel, P., Wallach, D.S.: Eclipse attacks on overlay networks: Threats and defenses. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1–12 (2006)
Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, IJUFKS (2002)
Tsai, H., Harwood, A.: A scalable anonymous server overlay network. In: International Conference on Advanced Information Networking and Applications (AINA) (2006)
Waldman, M., Mazières, D.: Tangler: a Censorship-Resistant Publishing System Based on Document Entanglements. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2001)
Wu, L., Faloutsos, C., Sycara, K.P., Payne, T.R.: FALCON: Feedback Adaptive Loop for Content-Based Retrieval. In: Proceedings of the VLDB Conference (2000)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM), pp. 267–278 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Backes, M., Hamerlik, M., Linari, A., Maffei, M., Tryfonopoulos, C., Weikum, G. (2009). Anonymity and Censorship Resistance in Unstructured Overlay Networks. In: Meersman, R., Dillon, T., Herrero, P. (eds) On the Move to Meaningful Internet Systems: OTM 2009. OTM 2009. Lecture Notes in Computer Science, vol 5870. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05148-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-05148-7_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05147-0
Online ISBN: 978-3-642-05148-7
eBook Packages: Computer ScienceComputer Science (R0)