skip to main content
10.1145/1107548.1107606acmotherconferencesArticle/Chapter ViewAbstractPublication Pagessoc-eusaiConference Proceedingsconference-collections
Article

Securing anonymity in P2P network

Published: 12 October 2005 Publication History

Abstract

Basically flooding-based P2P systems provide anonymity and thus it is not possible to find the initial sender of packet and the designated receiver of that packet. However it does not provide anonymity where the IP addresses of nodes uploading and downloading contents are revealed. So in order to maintain anonymity we propose and test our techniques that the receiver node of response packets on retrieval query is agent node and the agent node provides contents service between server and client. Through the proposed techniques it was found that the identity of node is secured without using encryption techniques which have been deployed in the former anonymity protection techniques and control data communications through all the nodes located between server and client. The application of this concept of which result was evaluated may be extended to many other current P2P systems under operation.

References

[1]
The Annotated Gnutella Protocol Specification v0.4 (1). http://rfc-gnutella.sourceforge.net/developer/stable/index. Html
[2]
The Freenet Project. http://freenet.sourceforge.net/
[3]
Kirsten Hildrum, John Kubiatowicz, Satish Rao and Ben Y. Zhao. (2004) Distributed Object Location in a Dynamic Network, Theory of Computing Systems.
[4]
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker, A scalable content-addressable network, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications table of contents.
[5]
Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John Kubiatowicz. (2004) Tapestry: A Resilient Global-scale Overlay for Service Deployment, IEEE Journal on Selected Areas in Communications.
[6]
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, Hari Balakrishnan. (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications, IEEE/ACM Transactions on Networking.
[7]
Neil Daswani, Hector Garcia-Molina. (2002) Query-flood DoS attacks in gnutella, Proceedings of the 9th ACM conference on Computer and communications security table of contents.
[8]
P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble. (2002) A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems, ACM SIGCOMM Computer Communication Review.
[9]
Stephen C. Bono, Christopher A. Soghoian, Fabian Monrose. (2004) Mantis: A Lightweight, Server-Anonymity Preserving, Searchable P2P, Information Security Institute of The Johns Hopkins University, Technical Report TR-2004-01-B-ISI-IHU.
[10]
MUTE: Simple, Anonymous File Sharing. http://mutenet.sourceforge.net/
[11]
Michael K. Reiter, Aviel D. Rubin. (1998) Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security (TISSEC).
[12]
Roger Dingledine, Nick Mathewson, Paul Syverson. (2004) Tor: The Second-Generation Onion Router, Proceedings of the 13th USENIX Security Symposium.
[13]
Michael G. Reed and Paul F. Syverson. (1999) Onion Routing, Proceeding of AIPA '99.
[14]
Gnutella Developer Forum. http://groups.yahoo.com/group/the_gdf/
[15]
The Gnutella Protocol Specification v0.41 Document Revision 1.2.
[16]
A. Oram, Peer-to-Peer, p. 106--107, O'Reilly, Mar, 2001.

Cited By

View all
  • (2007)Securing pseudo identities in an anonymous peer-to-peer file-sharing network2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 200710.1109/SECCOM.2007.4550344(279-282)Online publication date: Sep-2007
  • (2007)Enabling User Control with Personal Identity ManagementIEEE International Conference on Services Computing (SCC 2007)10.1109/SCC.2007.56(60-67)Online publication date: Jul-2007

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
sOc-EUSAI '05: Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies
October 2005
316 pages
ISBN:1595933042
DOI:10.1145/1107548
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2005

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

sOc-EUSAI05
sOc-EUSAI05: Smart Objects & Ambient Intelligence
October 12 - 14, 2005
Grenoble, France

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2007)Securing pseudo identities in an anonymous peer-to-peer file-sharing network2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 200710.1109/SECCOM.2007.4550344(279-282)Online publication date: Sep-2007
  • (2007)Enabling User Control with Personal Identity ManagementIEEE International Conference on Services Computing (SCC 2007)10.1109/SCC.2007.56(60-67)Online publication date: Jul-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media