Abstract
Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTorrent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content.
Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, USENIX 2004, San Diego, California, USA. USENIX (August 2004)
Manils, P., Chaabane, A., Le Blond, S., Kaafar, M.A., Castelluccia, C., Legout, A., Dabbous, W.: Compromising Tor Anonymity Exploiting P2P Information Leakage. In: Proceedings of the 3rd Hot Topics in Privacy Enhancing Technologies, HotPETs 2010, Berlin, Germany. IEEE Communications Society (July 2010)
Le Blond, S., Manils, P., Chaabane, A., Kaafar, M.A., Castelluccia, C., Legout, A., Dabbous, W.: One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users. In: Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats, LEET 2011. USENIX Association, Berkeley (2011)
I2P. The I2P network, http://www.i2p2.de/
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Proccedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, California, USA. Springer-Verlag New York, Inc. (July 2001)
Cohen, B.: Incentives Build Robustness in BitTorrent. In: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkely, California, USA (June 2003)
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, California, USA. Springer-Verlag New York, Inc. (July 2001)
Bennett, K., Grothoff, C., Horozov, T., Patrascu, I., Stef, T.: GNUnet - A truly anonymous networking infrastructure. In: Proceedings of the Privacy Enhancing Technologies Workshop (PET), PET 2002. Springer (April 2002)
Berthold, O., Federrath, H., Köpsell, S.: A system for anonymous and unobservable Internet access. In: Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, California, USA. Springer-Verlag New York, Inc. (July 2001)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)
Isdal, T., Piatek, M., Krishnamurthy, A., Anderson, T.: Privacy-preserving P2P data sharing with OneSwarm. In: Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM 2010, New Delhi, India. ACM (August 2010)
Prusty, S., Levine, B.N., Liberatore, M.: Forensic investigation of the OneSwarm anonymous filesharing system. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011. ACM, New York (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Timpanaro, J.P., Chrisment, I., Festor, O. (2012). Improving Content Availability in the I2P Anonymous File-Sharing Environment. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-35362-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35361-1
Online ISBN: 978-3-642-35362-8
eBook Packages: Computer ScienceComputer Science (R0)