Protecting Data Privacy in Structured P2P Networks

被引:0
|
作者
Jawad, Mohamed [1 ]
Serrano-Alvarado, Patricia [1 ]
Valduriez, Patrick [1 ]
机构
[1] Univ Nantes, LINA, F-44035 Nantes, France
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
P2P systems are increasingly used for efficient, scalable data sharing. Popular applications focus On massive file sharing. However, advanced applications such as online communities (e.g., medical or research communities) need to share private or sensitive data. Currently, in P2P systems, untrusted peers call easily violate data privacy by using data for malicious purposes (e.g., fraudulence, profiling). To prevent such behavior, the well accepted Hippocratic database principle states that data owners should specify the purpose for which their data will be collected. In this paper, we apply such principles as well as reputation techniques to support purpose and trust in structured P2P systems. Hippocratic databases enforce purpose-based privacy while reputation techniques guarantee trust. We propose a P2P data privacy model which combines the Hippocratic principles and the trust notions. We also present the algorithms of PriServ, a DHT-based P2P privacy service which supports this model and prevents data privacy violation. We show, in a performance evaluation, that PriServ introduces a small overhead.
引用
收藏
页码:85 / 98
页数:14
相关论文
共 50 条
  • [1] A privacy data leakage prevention method in P2P networks
    Chae, Cheol-Joo
    Shin, YongJu
    Choi, Kiseok
    Kim, Ki-Bong
    Choi, Kwang-Nam
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (03) : 508 - 519
  • [2] A privacy data leakage prevention method in P2P networks
    Cheol-Joo Chae
    YongJu Shin
    Kiseok Choi
    Ki-Bong Kim
    Kwang-Nam Choi
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 508 - 519
  • [3] Data persistence in structured P2P networks with redundancy schemes
    Li, Hongxing
    Chen, Guihai
    [J]. SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 542 - +
  • [4] Effective Data Replication in Heterogeneous Structured P2P Networks
    Wang, Yan
    Qiu, Xiaofeng
    Zhang, Chunhong
    Mi, Wei
    Li, Lichun
    Ji, Yang
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5297 - 5300
  • [5] Securing Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 37 - 43
  • [6] Efficient broadcast in structured P2P networks
    El-Ansary, S
    Alima, LO
    Brand, P
    Haridi, S
    [J]. PEER-TO-PEER SYSTEMS II, 2003, 2735 : 304 - 314
  • [7] ID Repetition in Structured P2P Networks
    Yu, Jie
    Li, Zhoujun
    Xiao, Peng
    Fang, Chengfang
    Xu, Jia
    Chang, Ee-Chien
    [J]. COMPUTER JOURNAL, 2011, 54 (06): : 962 - 975
  • [8] Approximate Aggregations in Structured P2P Networks
    Sun, Dalie
    Wu, Sai
    Jiang, Shouxu
    Li, Jianzhong
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (11) : 1748 - 1752
  • [9] Rumor mongering in structured P2P networks
    Wu, Tao
    Zhu, Cheng
    Qu, Shao-Cheng
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1632 - +
  • [10] Estimating churn in structured P2P networks
    Binzenhoefer, Andreas
    Leibnitz, Kenji
    [J]. MANAGING TRAFFIC PERFORMANCE IN CONVERGED NETWORKS, 2007, 4516 : 630 - +