Skip to main content

An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 460))

Abstract

A peer-to-peer (P2P) network is a distributed system in which the autonomous peers can leave and join the network at their will and share their resources to perform some functions in a distributed manner. In an unstructured P2P network, there is no centralized administrative entity that controls the operations of the peers, and the resources (i.e., the files) that the peers share are not related to the their topological positions in the network. With the advent of the Internet of Things (IoT), the P2P networks have found increased interest in the research community since the search protocols for these networks can be gainfully utilized in the resource discovery process for the IoT applications. However, there are several challenges in designing an efficient search protocol for the unstructured P2P networks since these networks suffer from problems such as fake content distribution, free riding, whitewashing, poor search scalability, lack of a robust trust model and the absence a of user privacy protection mechanism. Moreover, the peers can join and leave the network frequently, which makes trust management and searching in these networks quite a challenging task. In this chapter, a secure and efficient searching protocol for unstructured P2P networks is proposed that utilizes topology adaptation by constructing an overlay of trusted peers and increases the search efficiency by intelligently exploiting the formation of semantic community structures among the trustworthy peers. It also guarantees that the privacy of the users and data in the network is protected. Extensive simulation results are presented and the performance of the protocol is also compared with those of some of the existing protocols to demonstrate its advantages.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proceedings of the Workshop on New Security Paradigms (NPW 1997), Langdale, Cumbria, United Kingdom, pp. 48–60 (1997)

    Google Scholar 

  2. Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM 2001), Atlanta, Georgia, USA, pp. 310–317 (2001)

    Google Scholar 

  3. Aberer, K.: P-Grid: A Self-Organizing Access Structure for P2P Information Systems. In: Batini, C., Giunchiglia, F., Giorgini, P., Mecella, M. (eds.) CoopIS 2001. LNCS, vol. 2172, pp. 179–194. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Adamic, L.A., Lukose, R.M., Puniyani, A.R., Huberman, B.A.: Search in Poer Law Networks. Physics Review E64, 46135–46143 (2001)

    Google Scholar 

  5. Atzori, L., Lera, A., Morabito, G.: The Internet of Things: A Survey. Computer Networks 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  6. Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted Computing: Providing Security for Peer-to-Peer Networks. In: Proceedings of the 5th IEEE International Conference on Peer-to-Peer Computing (P2P 2005), Konstanz, Germany, pp. 117–124 (2005)

    Google Scholar 

  7. Bandyopadhyay, D., Sen, J.: Internet of Things: Applications and Challenges in Technology and Standardization. Wireless Personal Communications, Special Issue on Distributed and Secure Cloud Clustering (DISC) 58(1), 49–69 (2011)

    Google Scholar 

  8. Barabasi, A.L., Albert, R.: Emergence of Scaling in Random Networks. Science 286, 509–512 (1999)

    Article  MathSciNet  Google Scholar 

  9. Bloom, B.: Space-Time Trade-Offs in Hash Coding with Allowable Errors. Communications of the ACM 13(7), 422–426 (1970)

    Article  MATH  Google Scholar 

  10. Buchegger, S., Boudec, J.Y.L.: The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks. In: Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2003), Sophia-Antipolis, France, pp. 131–140 (2003)

    Google Scholar 

  11. Buchegger, S., Boudec, J.Y.L.: Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks. EPFL Technical Report No: IC/2003/50 (2003)

    Google Scholar 

  12. Cha, B.R., Kim, J.G.: Handling Fake Multimedia Contents Threat with Collective Intelligence in P2P File Sharing Environments. In: Proceedings of the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2010), Fukuoka, Japan, pp. 258–263 (2010)

    Google Scholar 

  13. Chaum, D.: The Dining Cryptographers Problem: Uncontrolled Sender and Recipient Untraceability. Journal of Cryptology 1(1), 65–75 (1998)

    MathSciNet  Google Scholar 

  14. Clarke, I., Miller, S., Hong, T., Sandberg, O., Wiley, B.: Protecting Free Expression Online with FreeNet. IEEE Internet Computing 6(1), 40–49 (2002)

    Article  Google Scholar 

  15. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, p. 46–66. Springer, Heidelberg (2001)

    Google Scholar 

  16. Condie, T., Kamvar, S.D., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. In: Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), Zurich, Switzerland, pp. 53–62 (2004)

    Google Scholar 

  17. Crespo, A., Garcia-Molina, H.: Semantic Overlay Networks for P2P Systems. In: Moro, G., Bergamaschi, S., Aberer, K. (eds.) AP2PC 2004. LNCS (LNAI), vol. 3601, pp. 1–13. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  18. Dellarocas, C.: Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior. In: Proceedings of the 2nd ACM Conference on Electronic Commerce (EC 2000), Minneapolis, MN, USA, pp. 150–157 (2000)

    Google Scholar 

  19. Damiani, E., di Vimecati, D.C., Paraboschi, S., Samarati, P., Violante, F.: Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington DC, USA, pp. 207–216 (2002)

    Google Scholar 

  20. de Mello, E.R., van Moorsel, A., da Silva Fraga, J.: Evaluation of P2P Search Algorithms for Discovering Trust Paths. In: Wolter, K. (ed.) EPEW 2007. LNCS, vol. 4748, pp. 112–124. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  21. Desmed, Y.G.: Threshold Cryptography. European Transactions on Telecommunications 5(4), 449–457 (1994)

    Article  Google Scholar 

  22. Dingledine, R., Freedman, M.J., Molnar, D.: Accountability Measures for Peer-to-Peer Systems. In: Peer-to-Peer: Harnessing the Power of Disruptive Technologies, ch. 16. O’Reilly and Associates (2000)

    Google Scholar 

  23. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  24. Ganeriwal, S., Srivastava, M.B.: Reputation-Based Framework for High Integrity Sensor Networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), Washington DC, USA, pp. 66–77 (2004)

    Google Scholar 

  25. Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-Based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks (TOSN) 4(3), Article No. 15 (2008)

    Google Scholar 

  26. Gkantsidis, C., Mihail, M., Saberi, A.: Hybrid Search Schemes for Unstructured Peer-to-Peer Networks. In: IEEE INFOCOM (2005)

    Google Scholar 

  27. Goel, S., Robson, M., Pole, M., Sirer, E.: Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Cornell University, CIS Technical Report TR2003-1890 (2003)

    Google Scholar 

  28. Goldschlag, D., Reed, M., Syverson, P.: Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM 42(2), 39–41 (1999)

    Article  Google Scholar 

  29. Guo, L., Yang, S., Guo, L., Shen, K., Lu, W.: Trust-Aware Adaptive P2P Overlay Topology Based on Super-Peer-Partition. In: Proceedings of the 6th International Conference on Grid and Cooperative Computing (GCC 2007), Urumchi, Xinjiang, China, pp. 117–124 (2007)

    Google Scholar 

  30. Hsiao, H.C., Liao, H., Huang, C.C.: Resolving the Topology Mismatch Problem in Unstructured Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 20(11), 1668–1681 (2009)

    Article  Google Scholar 

  31. Huang-Fu, C.C., Lin, Y.B., Rao, H.: IP2P: A Peer-to-Peer System for Mobile Devices. IEEE Wireless Communications 16(2), 30–36 (2009)

    Article  Google Scholar 

  32. Joung, Y.J., Lin, Z.W.: On the Self-Organization of a Hybrid Peer-to-Peer System. Journal of Network and Computer Applications 33(2), 183–202 (2010)

    Article  Google Scholar 

  33. Jsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)

    MathSciNet  Google Scholar 

  34. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen Trust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th International Conference on World Wide Web (WWW 2003), Budapest, Hungary, pp. 640–651 (2003)

    Google Scholar 

  35. Leighotn, F.T., Rao, S.: An Approximate Max-Flow Min-Cut Theorem for Uniform Multicommodity Flow Problem with Applications to Approximate Algorithms. In: Proceedings of the 29th IEEE Symposium on Foundations of Computer Science (FOCS 1988), pp. 422–431 (1988)

    Google Scholar 

  36. Li, X., Wang, J.: A Global Trust Model of P2P Network Based on Distance-Weighted Recommendation. In: Proceedings of IEEE International Conference of Networking, Architecture, and Storage (NAS 2009), Zhang Jia Jie, Hunan, China, pp. 281–284 (2009)

    Google Scholar 

  37. Li, Z., Xie, G., Li, Z.: Efficient and Scalable Consistency Maintenance for Heterogeneous Peer-to-Peer Systems. IEEE Transactions on Parallel and Distributed Systems 19(12), 1695–1708 (2008)

    Article  MathSciNet  Google Scholar 

  38. Lin, T., Lin, P., Wang, H., Chen, C.: Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 20(5), 654–666 (2009)

    Article  Google Scholar 

  39. Lu, Y., Wang, W., Xu, D., Bhargava, B.: Trust-Based Privacy Preservation for Peer-to-Peer Data Sharing. IEEE Transaction on Systems Man and Cybernetics (Special issues based on best papers in Secure Knowledge Management Conference) 36(3), 498–502 (2006)

    Google Scholar 

  40. Martinez-Yelmo, I., Bikfalvi, A., Cuevas, R., Guerrero, C., Garcia, J.: H-P2PSIP: Interconnection of P2PSIP Domains for Global Multimedia Services Based on a Hierarchical DHT Overlay Network. Computer Networks 53(4), 556–568 (2009)

    Article  MATH  Google Scholar 

  41. Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content Addressable Network. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), San Diego, California, USA, pp. 161–172 (2001)

    Google Scholar 

  42. Reed, M., Syverson, P., Goldschlag, D.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications. Special Issue on Copyright and Privacy Protection 16(4), 482–494 (1998)

    Google Scholar 

  43. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and Systems Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  44. Risson, J., Moors, T.: Survey of Research Towards Robust Peer-to-Peer Networks. Computer Networks 50(7), 3485–3521 (2006)

    Article  MATH  Google Scholar 

  45. Santucci, G.: From Internet of Data to Internet of Things. In: Proceedings of the 4th International Conference on Future of Internet Technology, Seoul, Korea (2009)

    Google Scholar 

  46. Scarlata, V., Levine, B., Shields, C.: Responder Anonymity and Anonymous Peer-to-Peer File Sharing. In: Proceedings of IEEE International Conference on Network Protocols (ICNP 2001), Riverside, CA, USA, p. 272 (2001)

    Google Scholar 

  47. Schafer, J., Malinks, K., Hanacek, P.: Peer-to-Peer Networks Security. In: Proceedings of the 3rd International Conference on Internet Monitoring and Protection (ICIMP 2008), Bucharest, Romania, pp. 74–79 (2008)

    Google Scholar 

  48. Schlosser, M.T., Condie, T.E., Kamvar, S.D., Kamvar, A.D.: Simulating a P2P File-Sharing Network. In: Proceedings of the 1st Workshop on Semantics in P2P and Grid Computing, Budapest, Hungary (2002)

    Google Scholar 

  49. Sen, J.: A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 100–108. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  50. Sen, J.: Secure and User-Privacy Preserving Searching in Peer-to-Peer Networks. International Journal of Communication Networks and Information Security (IJCNIS) 4(1), 29–40 (2012)

    Google Scholar 

  51. Shafer, G.: A Mathematical Theory of Evidence. Princeton University (1976)

    Google Scholar 

  52. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  53. Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A Protocol for Scalable Anonymous Communication. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 53–65 (2002)

    Google Scholar 

  54. Sit, E., Morris, R.: Security Considerations for Peer-to-Peer Distributed Hash Tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261–269. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  55. Tain, H., Zou, S., Wang, W., Cheng, S.: Constructing Efficient Peer-to-Peer Overlay Topologies by Adaptive Connection Establishment. Computer Communication 29(17), 3567–3579 (2006)

    Article  Google Scholar 

  56. Tang, X., Xu, J., Lee, W.C.: Analysis of TTL-Based Consistency in Unstructured Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 9(12), 1683–1694 (2008)

    Article  Google Scholar 

  57. Tang, Y., Wang, H., Dou, W.: Trust Based Incentive in P2P Network. In: Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, Beijing, China, pp. 302–305 (2004)

    Google Scholar 

  58. Vazirani, V.V.: Approximation Algorithms. Springer, Berlin (2001)

    Google Scholar 

  59. Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: A Robust, Tamper-Evident, Censorship-Resistant, Web Publishing System. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, pp. 59–72 (2000)

    Google Scholar 

  60. Xiao, L., Liu, Y., Lionel, M.N.: Improving Unstructured Peer-to-Peer Systems by Adaptive Connection Establishment. IEEE Transaction on Computers 54(9), 1091–1103 (2005)

    Article  Google Scholar 

  61. Xie, C., Chen, G., Vandenberg, A., Pan, Y.: Analysis of Hybrid P2P Overlay Network Topology. Computer Communications 31(2), 190–200 (2008)

    Article  Google Scholar 

  62. Xiong, L., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer E-Commerce Communities. In: Proceedings of the 4th IEEE/ACM Conference on E-Commerce (CEC 2003), Newport Beach, California, USA, pp. 228–229 (2003)

    Google Scholar 

  63. Xioreng, L., Liu, L.: Peer-Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)

    Article  Google Scholar 

  64. Xiao, L., Xu, Z., Zhang, X.: Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 14(9), 829–840 (2003)

    Article  Google Scholar 

  65. Yang, M., Yang, Y.: An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing. IEEE Transactions on Computers 59(9), 1158–1171 (2010)

    Article  Google Scholar 

  66. Zhang, R., Hu, Y.C.: Assisted Peer-to-Peer Search with Partial Indexing. IEEE Transactions on Parallel and Distributed Systems 18(8), 1146–1158 (2007)

    Article  Google Scholar 

  67. Zhu, Z., Kalnis, P., Bakiras, S.: DCMP: A Distributed Cycle Minimization Protocol for Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 19(3), 363–377 (2008)

    Article  Google Scholar 

  68. Zhuge, H., Chen, X., Sun, X.: Preferential Walk: Towards Efficient and Scalable Search in Unstructured Peer-to-Peer Networks. In: Proceedings of the 14th International Conference on World Wide Web (WWW 2005), Chiba, Japan, pp. 882–883 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaydip Sen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Sen, J. (2013). An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks. In: Bessis, N., Xhafa, F., Varvarigou, D., Hill, R., Li, M. (eds) Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence. Studies in Computational Intelligence, vol 460. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34952-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34952-2_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34951-5

  • Online ISBN: 978-3-642-34952-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics