Abstract
A peer-to-peer (P2P) network is a distributed system in which the autonomous peers can leave and join the network at their will and share their resources to perform some functions in a distributed manner. In an unstructured P2P network, there is no centralized administrative entity that controls the operations of the peers, and the resources (i.e., the files) that the peers share are not related to the their topological positions in the network. With the advent of the Internet of Things (IoT), the P2P networks have found increased interest in the research community since the search protocols for these networks can be gainfully utilized in the resource discovery process for the IoT applications. However, there are several challenges in designing an efficient search protocol for the unstructured P2P networks since these networks suffer from problems such as fake content distribution, free riding, whitewashing, poor search scalability, lack of a robust trust model and the absence a of user privacy protection mechanism. Moreover, the peers can join and leave the network frequently, which makes trust management and searching in these networks quite a challenging task. In this chapter, a secure and efficient searching protocol for unstructured P2P networks is proposed that utilizes topology adaptation by constructing an overlay of trusted peers and increases the search efficiency by intelligently exploiting the formation of semantic community structures among the trustworthy peers. It also guarantees that the privacy of the users and data in the network is protected. Extensive simulation results are presented and the performance of the protocol is also compared with those of some of the existing protocols to demonstrate its advantages.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proceedings of the Workshop on New Security Paradigms (NPW 1997), Langdale, Cumbria, United Kingdom, pp. 48–60 (1997)
Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM 2001), Atlanta, Georgia, USA, pp. 310–317 (2001)
Aberer, K.: P-Grid: A Self-Organizing Access Structure for P2P Information Systems. In: Batini, C., Giunchiglia, F., Giorgini, P., Mecella, M. (eds.) CoopIS 2001. LNCS, vol. 2172, pp. 179–194. Springer, Heidelberg (2001)
Adamic, L.A., Lukose, R.M., Puniyani, A.R., Huberman, B.A.: Search in Poer Law Networks. Physics Review E64, 46135–46143 (2001)
Atzori, L., Lera, A., Morabito, G.: The Internet of Things: A Survey. Computer Networks 54(15), 2787–2805 (2010)
Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted Computing: Providing Security for Peer-to-Peer Networks. In: Proceedings of the 5th IEEE International Conference on Peer-to-Peer Computing (P2P 2005), Konstanz, Germany, pp. 117–124 (2005)
Bandyopadhyay, D., Sen, J.: Internet of Things: Applications and Challenges in Technology and Standardization. Wireless Personal Communications, Special Issue on Distributed and Secure Cloud Clustering (DISC) 58(1), 49–69 (2011)
Barabasi, A.L., Albert, R.: Emergence of Scaling in Random Networks. Science 286, 509–512 (1999)
Bloom, B.: Space-Time Trade-Offs in Hash Coding with Allowable Errors. Communications of the ACM 13(7), 422–426 (1970)
Buchegger, S., Boudec, J.Y.L.: The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks. In: Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2003), Sophia-Antipolis, France, pp. 131–140 (2003)
Buchegger, S., Boudec, J.Y.L.: Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks. EPFL Technical Report No: IC/2003/50 (2003)
Cha, B.R., Kim, J.G.: Handling Fake Multimedia Contents Threat with Collective Intelligence in P2P File Sharing Environments. In: Proceedings of the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2010), Fukuoka, Japan, pp. 258–263 (2010)
Chaum, D.: The Dining Cryptographers Problem: Uncontrolled Sender and Recipient Untraceability. Journal of Cryptology 1(1), 65–75 (1998)
Clarke, I., Miller, S., Hong, T., Sandberg, O., Wiley, B.: Protecting Free Expression Online with FreeNet. IEEE Internet Computing 6(1), 40–49 (2002)
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, p. 46–66. Springer, Heidelberg (2001)
Condie, T., Kamvar, S.D., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. In: Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), Zurich, Switzerland, pp. 53–62 (2004)
Crespo, A., Garcia-Molina, H.: Semantic Overlay Networks for P2P Systems. In: Moro, G., Bergamaschi, S., Aberer, K. (eds.) AP2PC 2004. LNCS (LNAI), vol. 3601, pp. 1–13. Springer, Heidelberg (2005)
Dellarocas, C.: Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior. In: Proceedings of the 2nd ACM Conference on Electronic Commerce (EC 2000), Minneapolis, MN, USA, pp. 150–157 (2000)
Damiani, E., di Vimecati, D.C., Paraboschi, S., Samarati, P., Violante, F.: Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington DC, USA, pp. 207–216 (2002)
de Mello, E.R., van Moorsel, A., da Silva Fraga, J.: Evaluation of P2P Search Algorithms for Discovering Trust Paths. In: Wolter, K. (ed.) EPEW 2007. LNCS, vol. 4748, pp. 112–124. Springer, Heidelberg (2007)
Desmed, Y.G.: Threshold Cryptography. European Transactions on Telecommunications 5(4), 449–457 (1994)
Dingledine, R., Freedman, M.J., Molnar, D.: Accountability Measures for Peer-to-Peer Systems. In: Peer-to-Peer: Harnessing the Power of Disruptive Technologies, ch. 16. O’Reilly and Associates (2000)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Ganeriwal, S., Srivastava, M.B.: Reputation-Based Framework for High Integrity Sensor Networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), Washington DC, USA, pp. 66–77 (2004)
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-Based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks (TOSN) 4(3), Article No. 15 (2008)
Gkantsidis, C., Mihail, M., Saberi, A.: Hybrid Search Schemes for Unstructured Peer-to-Peer Networks. In: IEEE INFOCOM (2005)
Goel, S., Robson, M., Pole, M., Sirer, E.: Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Cornell University, CIS Technical Report TR2003-1890 (2003)
Goldschlag, D., Reed, M., Syverson, P.: Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM 42(2), 39–41 (1999)
Guo, L., Yang, S., Guo, L., Shen, K., Lu, W.: Trust-Aware Adaptive P2P Overlay Topology Based on Super-Peer-Partition. In: Proceedings of the 6th International Conference on Grid and Cooperative Computing (GCC 2007), Urumchi, Xinjiang, China, pp. 117–124 (2007)
Hsiao, H.C., Liao, H., Huang, C.C.: Resolving the Topology Mismatch Problem in Unstructured Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 20(11), 1668–1681 (2009)
Huang-Fu, C.C., Lin, Y.B., Rao, H.: IP2P: A Peer-to-Peer System for Mobile Devices. IEEE Wireless Communications 16(2), 30–36 (2009)
Joung, Y.J., Lin, Z.W.: On the Self-Organization of a Hybrid Peer-to-Peer System. Journal of Network and Computer Applications 33(2), 183–202 (2010)
Jsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen Trust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th International Conference on World Wide Web (WWW 2003), Budapest, Hungary, pp. 640–651 (2003)
Leighotn, F.T., Rao, S.: An Approximate Max-Flow Min-Cut Theorem for Uniform Multicommodity Flow Problem with Applications to Approximate Algorithms. In: Proceedings of the 29th IEEE Symposium on Foundations of Computer Science (FOCS 1988), pp. 422–431 (1988)
Li, X., Wang, J.: A Global Trust Model of P2P Network Based on Distance-Weighted Recommendation. In: Proceedings of IEEE International Conference of Networking, Architecture, and Storage (NAS 2009), Zhang Jia Jie, Hunan, China, pp. 281–284 (2009)
Li, Z., Xie, G., Li, Z.: Efficient and Scalable Consistency Maintenance for Heterogeneous Peer-to-Peer Systems. IEEE Transactions on Parallel and Distributed Systems 19(12), 1695–1708 (2008)
Lin, T., Lin, P., Wang, H., Chen, C.: Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 20(5), 654–666 (2009)
Lu, Y., Wang, W., Xu, D., Bhargava, B.: Trust-Based Privacy Preservation for Peer-to-Peer Data Sharing. IEEE Transaction on Systems Man and Cybernetics (Special issues based on best papers in Secure Knowledge Management Conference) 36(3), 498–502 (2006)
Martinez-Yelmo, I., Bikfalvi, A., Cuevas, R., Guerrero, C., Garcia, J.: H-P2PSIP: Interconnection of P2PSIP Domains for Global Multimedia Services Based on a Hierarchical DHT Overlay Network. Computer Networks 53(4), 556–568 (2009)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content Addressable Network. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), San Diego, California, USA, pp. 161–172 (2001)
Reed, M., Syverson, P., Goldschlag, D.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications. Special Issue on Copyright and Privacy Protection 16(4), 482–494 (1998)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and Systems Security 1(1), 66–92 (1998)
Risson, J., Moors, T.: Survey of Research Towards Robust Peer-to-Peer Networks. Computer Networks 50(7), 3485–3521 (2006)
Santucci, G.: From Internet of Data to Internet of Things. In: Proceedings of the 4th International Conference on Future of Internet Technology, Seoul, Korea (2009)
Scarlata, V., Levine, B., Shields, C.: Responder Anonymity and Anonymous Peer-to-Peer File Sharing. In: Proceedings of IEEE International Conference on Network Protocols (ICNP 2001), Riverside, CA, USA, p. 272 (2001)
Schafer, J., Malinks, K., Hanacek, P.: Peer-to-Peer Networks Security. In: Proceedings of the 3rd International Conference on Internet Monitoring and Protection (ICIMP 2008), Bucharest, Romania, pp. 74–79 (2008)
Schlosser, M.T., Condie, T.E., Kamvar, S.D., Kamvar, A.D.: Simulating a P2P File-Sharing Network. In: Proceedings of the 1st Workshop on Semantics in P2P and Grid Computing, Budapest, Hungary (2002)
Sen, J.: A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 100–108. Springer, Heidelberg (2011)
Sen, J.: Secure and User-Privacy Preserving Searching in Peer-to-Peer Networks. International Journal of Communication Networks and Information Security (IJCNIS) 4(1), 29–40 (2012)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University (1976)
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)
Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A Protocol for Scalable Anonymous Communication. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 53–65 (2002)
Sit, E., Morris, R.: Security Considerations for Peer-to-Peer Distributed Hash Tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261–269. Springer, Heidelberg (2002)
Tain, H., Zou, S., Wang, W., Cheng, S.: Constructing Efficient Peer-to-Peer Overlay Topologies by Adaptive Connection Establishment. Computer Communication 29(17), 3567–3579 (2006)
Tang, X., Xu, J., Lee, W.C.: Analysis of TTL-Based Consistency in Unstructured Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 9(12), 1683–1694 (2008)
Tang, Y., Wang, H., Dou, W.: Trust Based Incentive in P2P Network. In: Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, Beijing, China, pp. 302–305 (2004)
Vazirani, V.V.: Approximation Algorithms. Springer, Berlin (2001)
Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: A Robust, Tamper-Evident, Censorship-Resistant, Web Publishing System. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, pp. 59–72 (2000)
Xiao, L., Liu, Y., Lionel, M.N.: Improving Unstructured Peer-to-Peer Systems by Adaptive Connection Establishment. IEEE Transaction on Computers 54(9), 1091–1103 (2005)
Xie, C., Chen, G., Vandenberg, A., Pan, Y.: Analysis of Hybrid P2P Overlay Network Topology. Computer Communications 31(2), 190–200 (2008)
Xiong, L., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer E-Commerce Communities. In: Proceedings of the 4th IEEE/ACM Conference on E-Commerce (CEC 2003), Newport Beach, California, USA, pp. 228–229 (2003)
Xioreng, L., Liu, L.: Peer-Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)
Xiao, L., Xu, Z., Zhang, X.: Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 14(9), 829–840 (2003)
Yang, M., Yang, Y.: An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing. IEEE Transactions on Computers 59(9), 1158–1171 (2010)
Zhang, R., Hu, Y.C.: Assisted Peer-to-Peer Search with Partial Indexing. IEEE Transactions on Parallel and Distributed Systems 18(8), 1146–1158 (2007)
Zhu, Z., Kalnis, P., Bakiras, S.: DCMP: A Distributed Cycle Minimization Protocol for Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 19(3), 363–377 (2008)
Zhuge, H., Chen, X., Sun, X.: Preferential Walk: Towards Efficient and Scalable Search in Unstructured Peer-to-Peer Networks. In: Proceedings of the 14th International Conference on World Wide Web (WWW 2005), Chiba, Japan, pp. 882–883 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Sen, J. (2013). An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks. In: Bessis, N., Xhafa, F., Varvarigou, D., Hill, R., Li, M. (eds) Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence. Studies in Computational Intelligence, vol 460. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34952-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-34952-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34951-5
Online ISBN: 978-3-642-34952-2
eBook Packages: EngineeringEngineering (R0)