A multicast based anonymous information sharing protocol for peer-to-peer systems

被引:1
|
作者
Ye, BL [1 ]
Guo, MY
Zhou, JY
Chen, DX
机构
[1] Univ Aizu, Sch Engn & Comp Sci, Aizu Wakamatsu 9658580, Japan
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China
来源
关键词
peer-to-peer; mutual anonymity; IP multicast; multi-proxy; file retrieval;
D O I
10.1093/ietisy/e89-d.2.581
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A fundamental problem in a pure Peer-to-Peer (P2P) file sharing system is how to protect the anonymity of peer nodes when providing efficient data access services. Most of existing work mainly focus on how to provide the initiator anonymity, but neglect the anonymity of the responder. In this paper, we propose a multicast-based protocol, called Mapper, for efficient file sharing with mutual anonymity. By seamlessly combining the technologies of multi-proxy and IP multicast together, the proposed protocol guarantees mutual anonymity during the entire session of file retrieval. Furthermore, Mapper replicates requested files inside the multicast group, so file distribution can be adjusted adaptively and the cost for multicast can be further reduced. Results of both simulations and theoretical analyses demonstrate that Mapper possesses the merits of scalability, reliability, and high adaptability.
引用
收藏
页码:581 / 588
页数:8
相关论文
共 50 条
  • [41] Peer-to-Peer Solution to Support Group Collaboration and Information Sharing
    Shtykh, Roman
    Zhang, Guozhen
    Jin, Qun
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2005, 1 (03) : 187 - 198
  • [42] Peer-to-peer information sharing in a mobile ad hoc environment
    Hayes, A
    Wilson, D
    [J]. SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, : 154 - 162
  • [43] An Active-Drop Congestion Control Protocol in Peer-to-Peer Multicast Streaming
    Zhang, Weizhan
    Zheng, Qinghua
    Lian, Yanze
    Yu, Yiqin
    [J]. GCC 2008: SEVENTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2008, : 398 - +
  • [44] An Authentication Scheme in Peer-to-peer Based Live Stream Sharing Management Systems
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Chen, Pin-You
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, : 507 - +
  • [45] An Adaptive Randomized Search Protocol in Peer-to-peer Systems
    Wu, Yu
    Izumi, Taisuke
    Ooshita, Fukuhito
    Kakugawa, Hirotsugu
    Masuzawa, Toshimitsu
    [J]. APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 533 - +
  • [46] Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
    Aringhieri, R
    Damiani, E
    Di Vimercati, SD
    Paraboschi, S
    Samarati, P
    [J]. JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2006, 57 (04): : 528 - 537
  • [47] Agent based peer-to-peer systems
    Dasgupta, P
    [J]. 2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL I, CONFERENCE PROCEEDINGS, 2002, : 663 - 666
  • [48] Peer-to-peer File Sharing Based on Network Coding
    Yang, Min
    Yang, Yuanyuan
    [J]. 28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 168 - 175
  • [49] Peer-to-Peer multimedia sharing based on social norms
    Zhang, Yu
    van der Schaar, Mihaela
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2012, 27 (05) : 383 - 400
  • [50] A distributed ranking strategy in peer-to-peer based information retrieval systems
    Lu, Zhiguo
    Ling, Bo
    Qian, Weining
    Ng, Wee Siong
    Zhou, Aoying
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3007 : 279 - 284