Abstract
Geometric routing, which combines greedy embedding and greedy forwarding, is a promising approach for efficient data sharing in darknets. However, the security of data sharing using geometric routing in darknets is still an issue that has not been fully studied. In this paper, we propose a Secure Data Sharing framework (SeDS) for future darknets via hierarchical greedy embedding. SeDS adopts a hierarchical topology and uses a set of secure nodes to protect the whole topology. To support geometric routing in the hierarchical topology, a two-level bit-string prefix embedding approach (Prefix-T) is first proposed, and then a greedy forwarding strategy and a data mapping approach are combined with Prefix-T for data sharing. SeDS guarantees that the publication or request of a data item can always pass through the corresponding secure node, such that security strategies can be performed. The experimental results show that SeDS provides scalable and efficient end-to-end communication and data sharing.







Similar content being viewed by others
References
Biddle P, England P, Peinado M, Willman B (2002) The darknet and the future of content protection. In: ACM workshop on digital rights management. Springer, pp 155–176
Mansfield-Devine S (2009) Darknets. Computer Fraud & Security 2009(12):4–6
Clarke I, Sandberg O, Wiley B, Hong TW (2001) Freenet: a distributed anonymous information storage and retrieval system. In: Designing privacy enhancing technologies. Springer, pp 46–66
Isdal T, Piatek M, Krishnamurthy A, Anderson T (2010) Privacy-preserving p2p data sharing with oneswarm. In: ACM SIGCOMM computer communication review, vol 40. ACM, pp 111–122
Kügler D (2003) An analysis of gnunet and the implications for anonymous, censorship-resistant networks. In: International workshop on privacy enhancing technologies. Springer, pp 161–176
Tan Q, Gao Y, Shi J, Wang X, Fang B, Tian ZH (2018) Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J.
Roos S, Beck M, Strufe T (2016) Anonymous addresses for efficient and resilient routing in f2f overlays. In: Proceedings of the 35th annual IEEE international conference on computer communications (INFOCOM). IEEE, pp 1–9
Popescu B (2004) Safe and private data sharing with turtle: friends team-up and beat the system (transcript of discussion). In: International workshop on security protocols. Springer, pp 221–230
Mittal P, Caesar M, Borisov N (2011) X-vine: Secure and pseudonymous routing using social networks. arXiv:11090971
Kleinberg R (2007) Geographic routing using hyperbolic space. In: Proceeding of the 26th IEEE international conference on computer communications (INFOCOM). IEEE, pp 1902–1909
Höfer A, Roos S, Strufe T (2013) Greedy embedding, routing and content addressing for darknets. In: Conference on networked systems (NetSys). IEEE, pp 43–50
Wu C, Zapevalova E, Chen Y, Li F (2018) Time optimization of multiple knowledge transfers in the big data environment. Computers, Materials & Continua 54(3):269–285
Evans NS, Grothoff C (2011) R5n: Randomized recursive routing for restricted-route networks. In: 2011 5th international conference on network and system security (NSS). IEEE, pp 316–321
Caesar M, Castro M, Nightingale EB, O’Shea G, Rowstron A (2006) Virtual ring routing: network routing inspired by dhts. In: ACM SIGCOMM computer communication review, vol 36. ACM, pp 351–362
Karp B, Kung HT (2000) GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th annual international conference on mobile computing and networking,. ACM, pp 243–254
Caruso A, Chessa S, De S, Urpi A (2005) GPS free coordinate assignment and routing in wireless sensor networks. In: Proceedings of the 24th IEEE international conference on computer communications (INFOCOM). IEEE, pp 150–160
Ratnasamy S, Karp B, Yin L, Yu F, Estrin D, Govindan R, Shenker S (2002) GHT: a geographic hash table for data-centric storage. In: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications. ACM, pp 78–87
Newsome J, Song D (2003) GEM: Graph embedding for routing and data-centric storage in sensor networks without geographic information. In: Proceedings of the 1st international conference on Embedded networked sensor systems. ACM, pp 76–88
Landsiedel O, Lehmann KA, Wehrle K (2005) T-DHT: topology-based distributed hash tables. In: Proceedings of the 5th IEEE international conference on peer-to-peer computing. IEEE, pp 143–144
Leighton T, Moitra A (2010) Some results on greedy embeddings in metric spaces. Discrete & Computational Geometry 44(3):686–705
Abdel-Aziz H, Saad MK (2018) On special curves according to darboux frame in the three dimensional lorentz space. Computers, Materials & Continua 54(3):229–249
Wang L, Waltari O, Kangasharju J (2013) Mobiccn: mobility support with greedy routing in content-centric networks. In: IEEE Global communications conference (GLOBECOM). IEEE, pp 2069–2075
Herzen J, Westphal C, Thiran P (2011) Scalable Routing easy as PIE: a practical isometric embedding protocol. In: Proceeding of the 19th IEEE international conference on network protocols (ICNP). IEEE, pp 49–58
Sun Y, Zhang Y, Fang B, Zhang H (2017) Succinct and practical greedy embedding for geometric routing. Computer Communications
Perlman R (1985) An algorithm for distributed computation of a spanning tree in an extended LAN. In: ACM SIGCOMM computer communication review, vol 15. ACM, pp 44–53
Jiang F, Fu Y, Gupta BB, Lou F, Rho S, Meng F, Tian Z (2018) Deep learning based multi-channel intelligent attack detection for data security. IEEE Transactions on Sustainable Computing
Ahmed A, Bakar KA, Channa MI, Khan AW (2016) A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Networks and Applications 21(2):272–285
Chen J, Tian Z, Cui X, Yin L, Wang X (2018) Trust architecture and reputation evaluation for internet of things. Journal of Ambient Intelligence and Humanized Computing, pp 1–9
Wang Y, Tian Z, Zhang H, Su S, Shi W (2018) A privacy preserving scheme for nearest neighbor query. Sensors 18(8):2440
Thorup M, Zwick U (2001) Compact routing schemes. In: Proceedings of the 13th annual ACM symposium on parallel algorithms and architectures. ACM, pp 1–10
Papadimitriou CH, Ratajczak D (2005) On a conjecture related to geometric routing. Theor Comput Sci 344(1):3–14
Yanbin S, Yu Z, Shen S, Hongli Z, Binxing F (2015) Geometric name routing for icn in dynamic world. China Communications 12(7):47–59
(2012) The IPv4 Routed/24 AS Links Dataset-Jue, 2012. http://www.caida.org/data/active/ipv4_routed_topology_aslinks_dataset.xml
Bu T, Towsley D (2002) On distinguishing between internet power law topology generators. In: Proceedings of the 21st annual joint conference of the IEEE computer and communications societies (INFOCOM), vol 2. IEEE, pp 638–647
Acknowledgements
This work is funded by the National Key Research and Development Plan (Grant No. 2018YFB0803504) and the National Natural Science Foundation of China (No. 61871140, 61702223, 61702220, 61572153).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sun, Y., Li, M., Su, S. et al. Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. Mobile Netw Appl 26, 940–948 (2021). https://doi.org/10.1007/s11036-019-01325-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01325-4