Distributed path restoration algorithm for anonymity in P2P file sharing systems

被引:0
|
作者
Manzanares-Lopez, Pilar [1 ]
Munoz-Gea, Juan Pedro [1 ]
Malgosa-Sanahuja, Josemaria [1 ]
Sanchez-Aamoutse, Juan Carlos [1 ]
Garcia-Haro, Joan [1 ]
机构
[1] Polytech Univ Cartagena, Dept Informat Technol & Commun, Cartagena 30202, Spain
关键词
peer-to-peer networks; anonymity; distributed systems;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, a new mechanism to achieve anonymity in peer-to-peer (P2P) file sharing systems is proposed. As usual, the anonymity is obtained by means of connecting the source and destination peers through a set of intermediate nodes, creating a multiple-hop path. The main paper contribution is a distributed algorithm able to guarantee the anonymity even when a node in a path fails (voluntarily or not). The algorithm takes into account the inherent costs associated with multiple-hop communications and tries to reach a well-balanced solution between the anonymity degree and its associated costs. Some parameters are obtained analytically but the main network performances are evaluated by simulation.
引用
收藏
页码:88 / 95
页数:8
相关论文
共 50 条
  • [21] A View of the Data on P2P File-sharing Systems
    Yee, Wai Gen
    Nguyen, Linh Thai
    Frieder, Ophir
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2009, 60 (10): : 2132 - 2141
  • [22] A hybrid topology architecture for P2P file sharing systems
    Munoz-Gea, J. P.
    Malgosa-Sanahuja, J.
    Manzanares-Lopez, P.
    Sanchez-Aarnoutse, J. C.
    Guirado-Puerta, A. M.
    ICSOFT 2006: PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 1, 2006, : 319 - 324
  • [23] A study on key strategies in P2P file sharing systems and ISPs’ P2P traffic management
    Jessie Hui Wang
    Chungang Wang
    Jiahai Yang
    Changqing An
    Peer-to-Peer Networking and Applications, 2011, 4 : 410 - 419
  • [24] A study on key strategies in P2P file sharing systems and ISPs' P2P traffic management
    Wang, Jessie Hui
    Wang, Chungang
    Yang, Jiahai
    An, Changqing
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (04) : 410 - 419
  • [25] Reliable P2P file sharing service
    Shin, Jung-Hwa
    Shin, Weon
    Rhee, Kyung-Hyune
    AGENTS AND PEER-TO-PEER COMPUTING, 2008, 4461 : 143 - +
  • [26] A Method of Identifying the P2P File Sharing
    Chen, Jian-Bo
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 111 - 115
  • [27] Efficient file sharing strategy in DHT based P2P systems
    Xu, ZY
    He, XB
    Bhuyan, L
    CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 151 - 158
  • [28] The power of P2P beyond file sharing
    Zhang, XD
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 781 - 781
  • [29] Resources Monitoring Architecture for P2P File-Sharing Systems
    Wang, Wenxian
    Chen, Xingshu
    Wang, Haizhou
    FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
  • [30] A reliable economic framework in P2P file-sharing systems
    Huang, Qiubo
    Xu, Guangwei
    Cao, Qiying
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 980 - 984