Skip to main content
Log in

Rendezvous tunnel for anonymous publishing

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Anonymous communication, and anonymous Peer-to-Peer (P2P) file sharing systems in particular, have received considerable attention in recent years. In a P2P file sharing system there are three types of participants: publishers, who insert content into the system, servers, which store content, and readers, who retrieve the content from the servers. Existing anonymity P2P file sharing systems confer partial anonymity; they provide anonymity to participant pairs, such as servers and readers or publishers and readers, but do not consider the anonymity of all three types of participants together. In this work we propose two solutions for anonymous P2P file sharing systems, both of which provide anonymity to all three types of participants. The proposed solutions are based on indexing by global hash functions (rather than an index server), dispersal of information, and three anonymity tunnels – publishing tunnel, reading tunnel, and serving tunnel. Each anonymity tunnel is designed to protect the anonymity of a different user (publisher, reader or server respectively). In both solutions the publishing and reading tunnels are sender anonymity tunnels, where the serving tunnel is different in each solution. In the first solution, the serving tunnel is a rendezvous tunnel, constructed by means of a random walk and terminating at the server. In the second solution, which is based on Tor, the serving tunnel is built using Tor’s hidden services. The first solution preserves anonymity in the presence of a semi-honest adversary that controls a limited number of nodes in the system. The second solution is based on Tor primitives and copes with the same adversary as that assumed in Tor. The second solution also enhances Tor, ensuring publisher, reader, and server anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Beimel A, Dolev S (2003) Buses for anonymous message delivery. J Cryptol 16(1):25–39

    Article  MATH  MathSciNet  Google Scholar 

  2. Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, CCS ’93. ACM, New York, pp 62–73

  3. Berthold O, Federrath H, Köpsell S (2000) Web-MIXes: a system for anonymous and unobservable Internet access. In: Proceedings of designing privacy enhancing technologies: workshop on design issues in anonymity and unobservability, vol LNCS 2009, pp 115–129

  4. Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 4(2)

  5. Chaum D (1988) The dining cryptographers problem: unconditional sender and recipient untraceability. J Cryptol 1(1):65–75

    Article  MATH  MathSciNet  Google Scholar 

  6. Clarke I, Miller SG, Hong TW, Sandberg O, Wiley B (2002) Protecting free expression online with freenet. IEEE Intern Comput 6(1):40–49

    Article  Google Scholar 

  7. Danezis G, Diaz C, Troncoso C, Laurie B (2010) Drac: an architecture for anonymous low-volume communications. In: Proceedings of the 10th international conference on privacy enhancing technologies, PETS’10. Springer, Berlin, pp 202–219

  8. Dingledine R, Freedman MJ, Molnar D (2000) The free haven project: distributed anonymous storage service. In: Proceedings of designing privacy enhancing technologies: workshop on design issues in anonymity and unobservability, LNCS 2009. Springer

  9. Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of the 13th conference on USENIX security symposium - SSYM’04, vol 13. USENIX Association, Berkeley, pp 21–21

  10. Dolev S, Ostrobsky R (2000) Xor-trees for efficient anonymous multicast and reception. ACM Trans Inf Syst Secur 3(2):63–84

    Article  Google Scholar 

  11. Goldreich O (2000) Foundations of cryptography: basic tools. Cambridge University Press, New York

    Google Scholar 

  12. Goldreich O (2004) Foundations of cryptography: basic applications, vol 2. Cambridge University Press, New York

    Book  Google Scholar 

  13. Hermoni O, Gilboa N, Felstaine E, Elovici Y, Dolev S (2010) Rendezvous tunnel for anonymous publishing. In: Proceedings of the 17th ACM conference on computer and communications security, CCS ’10. ACM, New York, pp 690–692

  14. Hermoni O, Gilboa N, Felstaine E, Elovici Y, Dolev S (2011) Rendezvous tunnel for anonymous publishing: Clean slate and tor based designs. In: SSS’11, pp 223–237

  15. Hermoni O, Gilboa N, Felstaine E, Shitrit S (2008) Deniability: an alibi for users in p2p networks. In: 3rd international conference on communication systems software and middleware and workshops, 2008. COMSWARE 2008, pp 310–317

  16. Isdal T, Piatek M, Krishnamurthy A, Anderson T (2010) Privacy-preserving p2p data sharing with oneswarm. In: Proceedings of the ACM SIGCOMM 2010 conference, SIGCOMM ’10. ACM, New York, pp 111–122

  17. Ling Z, Luo J, Yu W, Fu X, Xuan D, Jia W (2009) A new cell counter based attack against tor. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09. ACM, New York, pp 578–589

  18. Mittal P, Borisov N (2009) Shadowwalker: peer-to-peer anonymous communication using redundant structured topologies. In: Proceedings of the 16th ACM conference on computer and communications security, CCS ’09. ACM, New York, pp 161–172

  19. Murdoch SJ, Danezis G (2005) Low-cost traffic analysis of tor. In: Proceedings of the 2005 IEEE symposium on security and privacy, SP ’05. IEEE Computer Society, Washington, DC, pp 183–195

  20. Overlier L, Syverson P (2006) Locating hidden servers. In: Proceedings of the 2006 IEEE symposium on security and privacy, SP ’06. IEEE Computer Society, Washington, DC, pp 100–114

  21. Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf

  22. Rabin MO (1989) Efficient dispersal of information for security, load balancing, and fault tolerance. J ACM 36(2):335–348

    Article  MATH  MathSciNet  Google Scholar 

  23. Reed M, Syverson P, Goldschlag D (1998) Anonymous connections and onion routing. IEEE J Select Areas Commun 16(4):482–494

    Article  Google Scholar 

  24. Reiter MK, Rubin AD (1998) Crowds: anonymity for web transactions. ACM Trans Inf Syst Secur 1(1):66–92

    Article  Google Scholar 

  25. Serjantov A (2002) Anonymizing censorship resistant systems. In: Revised papers from the first international workshop on peer-to-peer systems, IPTPS ’01. Springer, London, pp 111–120

  26. Shitrit S, Gilboa N, Felstaine E, Hermoni O (2009) Anonymity scheme for interactive p2p services. J Intern Technol 10(3)

  27. Stoica I, Morris R, Liben-Nowell D, Karger D, Kaashoek M, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans Networking 11(1):17–32

    Article  Google Scholar 

  28. Waldman M, Rubin AD, Cranor LF (2000) Publius: a robust, tamper-evident, censorship-resistant web publishing system. In: Proceedings of the 9th conference on USENIX security symposium - SSYM’00, vol 9. USENIX Association, Berkeley, pp 5–5

Download references

Acknowledgments

We would like to thank Rotem Hungem and yair sarel for the implementation of this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ofer Hermoni.

Additional information

This research has been supported by the Ministry of Science and Technology (MOST), the Israel Internet Association (ISOC-IL), the Lynne and William Frankel Center for Computer Science at Ben-Gurion University, Rita Altura Trust Chair in Computer Science, the ICT Programme of the European Union under contract number FP7-215270 (FRONTS), Microsoft, US Air-Force, Israel Science Foundation (grant number 428/11), Verisign 25th Anniversary of .COM grant and Deutsche Telekom Labs at BGU. A poster presenting preliminary results of this work was presented in CCS ’10 [13], an extended abstract was presented in SSS ’11 [14].

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hermoni, O., Gilboa, N., Felstaine, E. et al. Rendezvous tunnel for anonymous publishing. Peer-to-Peer Netw. Appl. 8, 352–366 (2015). https://doi.org/10.1007/s12083-014-0254-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-014-0254-6

Keywords