ABSTRACT
Semantic overlay networks are an instance of unstructured overlays, where peers that are semantically, thematically, or socially close are organized into groups to exploit similarities at query time. In this work we present Clouds, a novel P2P search infrastructure for providing anonymous and censorship resistant search functionality in such networks. Although we utilize semantic overlays to exploit their retrieval capabilities, our framework is general and can be applied to any unstructured overlay.
- M. Backes, M. Hamerlik, A. Linari, M. Maffei, C. Tryfonopoulos, and G. Weikum. Anonymity and Censorship Resistance in Unstructured Overlays. http://www.mpi-inf.mpg.de/~trifon/papers/pdf/TR-MPI-Clouds08.pdf.Google Scholar
- M.K. Reiter and A.D. Rubin. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security, 1998. Google ScholarDigital Library
Index Terms
- Anonymous and censorship resistant content sharing in unstructured overlays
Recommendations
Censorship-Resistant and Anonymous P2P Filesharing
ARES '06: Proceedings of the First International Conference on Availability, Reliability and SecurityWe present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Instead, only fragments that do not contain any information about the original ...
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
The current peer-to-peer (P2P) content distribution systems are constricted by their simple on-demand content discovery mechanism. The utility of these systems can be greatly enhanced by incorporating two capabilities, namely a mechanism through which ...
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityThe ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributes hash table lookups to locate relays, but the lack of anonymity in their lookup mechanisms ...
Comments