A multicast based anonymous information sharing protocol for peer-to-peer systems

被引:1
|
作者
Ye, BL [1 ]
Guo, MY
Zhou, JY
Chen, DX
机构
[1] Univ Aizu, Sch Engn & Comp Sci, Aizu Wakamatsu 9658580, Japan
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China
来源
关键词
peer-to-peer; mutual anonymity; IP multicast; multi-proxy; file retrieval;
D O I
10.1093/ietisy/e89-d.2.581
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A fundamental problem in a pure Peer-to-Peer (P2P) file sharing system is how to protect the anonymity of peer nodes when providing efficient data access services. Most of existing work mainly focus on how to provide the initiator anonymity, but neglect the anonymity of the responder. In this paper, we propose a multicast-based protocol, called Mapper, for efficient file sharing with mutual anonymity. By seamlessly combining the technologies of multi-proxy and IP multicast together, the proposed protocol guarantees mutual anonymity during the entire session of file retrieval. Furthermore, Mapper replicates requested files inside the multicast group, so file distribution can be adjusted adaptively and the cost for multicast can be further reduced. Results of both simulations and theoretical analyses demonstrate that Mapper possesses the merits of scalability, reliability, and high adaptability.
引用
收藏
页码:581 / 588
页数:8
相关论文
共 50 条
  • [21] An Anonymous Peer-to-Peer based Online Social Network
    Jain, Ina
    Gorantla, M. Choudary
    Saxena, Ashutosh
    [J]. 2011 ANNUAL IEEE INDIA CONFERENCE (INDICON-2011): ENGINEERING SUSTAINABLE SOLUTIONS, 2011,
  • [22] A chord-based novel mobile peer-to-peer file sharing protocol
    Li, M
    Chen, EH
    Sheu, PC
    [J]. FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 806 - 811
  • [23] SPP: A Secure Protocol for Peer-to-Peer Systems
    Quang Hieu Vu
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 1 - 6
  • [24] Posting protocol for improved keyword search success in peer-to-peer file sharing systems
    Clay, LM
    Ammar, MH
    Zegura, EW
    Clark, RJ
    [J]. MULTIMEDIA COMPUTING AND NETWORKING 2003, 2003, 5019 : 138 - 149
  • [25] PPAA: peer-to-peer anonymous authentication
    Tsang, Patrick P.
    Smith, Sean W.
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 55 - 74
  • [26] An efficient protocol for peer-to-peer file sharing with mutual anonymity
    Ye, BL
    Zhou, JY
    Zhang, Y
    Cao, JN
    Chen, DX
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 665 - 670
  • [27] The cost of peer discovery and searching in the Gnutella peer-to-peer file sharing protocol
    Portmann, M
    Sookavatana, P
    Ardon, S
    Seneviratne, A
    [J]. NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS, 2001, : 263 - 268
  • [28] HiOPS Overlay - Efficient Provision of Multicast in Peer-to-Peer Systems
    Schloss, Hermann
    Botev, Jean
    Hoehfeld, Alexander
    Scholtes, Ingo
    Oechsle, Rainer
    Esch, Markus
    [J]. PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 49 - +
  • [29] Incentivizing anonymous "peer-to-peer" reviews
    Venkitasubramaniam, Parv
    Sahai, Anant
    [J]. 2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 692 - +
  • [30] Securing pseudo identities in an anonymous peer-to-peer file-sharing network
    Chothia, Tom
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 279 - 282