DISTRIBUTED PATH RESTORATION ALGORITHM FOR ANONYMITY IN P2P FILE SHARING SYSTEMS

Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Juan Carlos Sanchez-Aarnoutse, Joan Garcia-Haro

2007

Abstract

In this paper, a new mechanism to achieve anonymity in peer-to-peer (P2P) file sharing systems is proposed. As usual, the anonymity is obtained by means of connecting the source and destination peers through a set of intermediate nodes, creating a multiple-hop path. The main paper contribution is a distributed algorithm able to guarantee the anonymity even when a node in a path fails (voluntarily or not). The algorithm takes into account the inherent costs associated with multiple-hop communications and tries to reach a well-balanced solution between the anonymity degree and its associated costs. Some parameters are obtained analytically but the main network performances are evaluated by simulation.

References

  1. Castro, M., Druschel, P., Kermarrec, A., and Rowstron, A. (2002). Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal On Selected Areas in Communications, 20(8):100-110.
  2. Dingledine, R., Mathewson, N., and Syverson, P. (2004). Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA.
  3. Freedman, M. and Morris, R. (2002). Tarzan: A peer-topeer anonymizing network layer. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), Washington, DC, USA.
  4. Ghodsi, A., Alima, L., El-Ansary, S., Brand, P., and Haridi, S. (2003). Dks(n,k,f): A family of low communication, scalable and fault-tolerant infrastructures for p2p applications. In Proceedings of the 3rd. International Workshop on Global and P2P Computing on Large Scale Distributed Systems (CCGRID 2003), Tokyo, Japan.
  5. Han, J., Liu, Y., Xiao, L., Xiao, R., and Ni, L. M. (2005). A mutual anonymous peer-to-peer protocol design. In Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS'05), Denver, CO, USA.
  6. Levine, B. N. and Shields, C. (2002). Hordes: A multicastbased protocol for anonymity. Journal of Computer Security, 10(3):213-240.
  7. Li, J., Stribling, J., Morris, R., and Kaashoek, M. F. (2005). Bandwidth-efficient management of dht routing tables. In Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI'05), Boston, MA, USA.
  8. Lu, T., Fang, B., Sun, Y., and Cheng, X. (2004). Wongoo: A peer-to-peer protocol for anonymous communication. In Proceedings of the 2004 International Conference on Parallel and Distributed Processing Techniques and Appliations (PDPTA 2004), Las Vegas, NE, USA.
  9. Mislove, A., Oberoi, G., A. Post, C. R., and Druschel, P. (2004). Ap3: Cooperative, decentralized anonymous communication. In Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC, New York, NY, USA.
  10. Mun˜oz-Gea, J. P., Malgosa-Sanahuja, J., ManzanaresLopez, P., Sanchez-Aarnoutse, J. C., and GuiradoPuerta, A. M. (2006). A hybrid topology architecture for p2p file sharing systems. In Proceedings of the First International Conference on Software and Data Technologies (ICSOFT 2006), Setúbal, Portugal.
  11. Pfitzmann, A. and Hansen, M. (2001). Anonymity, unobservability and pseudomyity: a proposal for terminology. In Proceedings of the Fourth International Information Hiding Workshop, Pittsburgh, PE, USA.
  12. Ratnasamy, S., Francis, P., Handley, M., Karp, R., and Shenker, S. (2001a). A scalable content-addressable network. In Proceedings of ACM SIGCOMM, San Diego, CA, USA.
  13. Ratnasamy, S., Handley, M., Karp, R., and Shenker, S. (2001b). Application-level multicast using contentaddressable networks. In Proceedings of the 3rd. International Workshop of Networked Group Communication (NGC), London, UK.
  14. Reed, M. G., Syverson, P. F., and Goldshlag, D. M. (1998). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4):482-494.
  15. Reiter, M. K. and Rubin, A. D. (1999). Crowds: Anonymity for web transactions. Communications of the ACM, 42(2):32-48.
  16. Stoica, I., Morris, R., Liben-Nowell, D., and Karger, D. (2003). Chord: A scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 11(1):17-32.
  17. Sui, H., Chen, J., Che, S., and Wang, J. (2003). Payload analysis of anonymous communication system with host-based rerouting mechanism. In Proceedings of the Eighth IEEE International Symposium on Computers and Communications (ISCC'03), KemerAntalya, Turkey.
  18. Wright, M., Adler, M., Levine, B. N., and Shields, C. (2002). An analysis of the degradation of anonymous protocols. In Proceedings of the Network and Distributed Security Symposium (NDSS'02), San Diego, CA, USA.
  19. Xiao, L., Xu, Z., and Shang, X. (2003). Low-cost and reliable mutual anonymity protocols in peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems, 14(9):829-840.
Download


Paper Citation


in Harvard Style

Manzanares-Lopez P., Pedro Muñoz-Gea J., Malgosa-Sanahuja J., Carlos Sanchez-Aarnoutse J. and Garcia-Haro J. (2007). DISTRIBUTED PATH RESTORATION ALGORITHM FOR ANONYMITY IN P2P FILE SHARING SYSTEMS . In Proceedings of the Second International Conference on Software and Data Technologies - Volume 1: ICSOFT, ISBN 978-989-8111-05-0, pages 88-95. DOI: 10.5220/0001338600880095


in Bibtex Style

@conference{icsoft07,
author={Pilar Manzanares-Lopez and Juan Pedro Muñoz-Gea and Josemaria Malgosa-Sanahuja and Juan Carlos Sanchez-Aarnoutse and Joan Garcia-Haro},
title={DISTRIBUTED PATH RESTORATION ALGORITHM FOR ANONYMITY IN P2P FILE SHARING SYSTEMS},
booktitle={Proceedings of the Second International Conference on Software and Data Technologies - Volume 1: ICSOFT,},
year={2007},
pages={88-95},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001338600880095},
isbn={978-989-8111-05-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Software and Data Technologies - Volume 1: ICSOFT,
TI - DISTRIBUTED PATH RESTORATION ALGORITHM FOR ANONYMITY IN P2P FILE SHARING SYSTEMS
SN - 978-989-8111-05-0
AU - Manzanares-Lopez P.
AU - Pedro Muñoz-Gea J.
AU - Malgosa-Sanahuja J.
AU - Carlos Sanchez-Aarnoutse J.
AU - Garcia-Haro J.
PY - 2007
SP - 88
EP - 95
DO - 10.5220/0001338600880095