skip to main content
10.1145/1280680.1280700acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Establishing darknet connections: an evaluation of usability and security

Published: 18 July 2007 Publication History

Abstract

In many applications, hosts in a peer to peer network may wish to maintain their anonymity or the privacy of their queries. In some applications, an even stronger guarantee is desirable: hosts would like to prevent others from determining whether they participate in the network at all. Darknets, or friend-to-friend networks, are one approach to preventing the discovery of hosts within a peer to peer network [1]. In such a network, hosts only form Internet connections with and directly communicate with a small set of hosts whose operators are known and trusted a priori. That is, each user only connects to her friends, trusting that her friends will not reveal her identity or existence in the network.

References

[1]
P. Biddle, P. England, M. Peinado, and B. Willman. The Darknet and the Future of Content Protection. ACM Workshop on Digital Rights Management, 2002.
[2]
B. Popescu, B. Crispo, and A. Tanenbaum. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. Security Protocols Workshop, 2004.

Cited By

View all
  • (2015)Darkcube: A k-Hypercube based P2P VoIP protocolPeer-to-Peer Networking and Applications10.1007/s12083-015-0415-210:1(170-183)Online publication date: 21-Oct-2015
  • (2012)Characterization of community based-P2P systems and implications for traffic localizationPeer-to-Peer Networking and Applications10.1007/s12083-012-0132-z6:2(118-133)Online publication date: 25-Apr-2012
  • (2010)Leveraging social networks for increased bittorrent robustnessProceedings of the 7th IEEE conference on Consumer communications and networking conference10.5555/1834217.1834249(159-163)Online publication date: 9-Jan-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security
July 2007
188 pages
ISBN:9781595938015
DOI:10.1145/1280680
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • CyLab

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2007

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SOUPS '07
Sponsor:
SOUPS '07: The third Symposium on Usable Privacy and Security
July 18 - 20, 2007
Pennsylvania, Pittsburgh, USA

Acceptance Rates

Overall Acceptance Rate 15 of 49 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Darkcube: A k-Hypercube based P2P VoIP protocolPeer-to-Peer Networking and Applications10.1007/s12083-015-0415-210:1(170-183)Online publication date: 21-Oct-2015
  • (2012)Characterization of community based-P2P systems and implications for traffic localizationPeer-to-Peer Networking and Applications10.1007/s12083-012-0132-z6:2(118-133)Online publication date: 25-Apr-2012
  • (2010)Leveraging social networks for increased bittorrent robustnessProceedings of the 7th IEEE conference on Consumer communications and networking conference10.5555/1834217.1834249(159-163)Online publication date: 9-Jan-2010
  • (2010)Leveraging Social Networks for Increased BitTorrent Robustness2010 7th IEEE Consumer Communications and Networking Conference10.1109/CCNC.2010.5421823(1-5)Online publication date: Jan-2010
  • (2009)GalaxiaProceedings of the 2009 First International Conference on Networks & Communications10.1109/NetCoM.2009.41(289-294)Online publication date: 27-Dec-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media