Survey on anonymity in unstructured Peer-to-Peer systems

被引:13
|
作者
Xiao, Ren-Yi [1 ]
机构
[1] Natl Nat Sci Fdn China, Beijing 100085, Peoples R China
基金
中国国家自然科学基金;
关键词
unstructured Peer-to-Peer systems; mutual anonymity; privacy; distributed system;
D O I
10.1007/s11390-008-9162-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms of transfer efficiency, many systems try to mask the identities of their users for privacy consideration. By comparison and analysis of existing approaches, we investigate the properties of unstructured P2P anonymity, and summarize current attack models on these designs. Most of these approaches are path-based, which require peers to pre-construct anonymous paths before transmission, thus suffering significant overhead and poor reliability. We also discuss the open problems in this field and propose several future research directions.
引用
收藏
页码:660 / 671
页数:12
相关论文
共 50 条
  • [41] Broadcasting in unstructured peer-to-peer overlay networks
    Annexstein, FS
    Berman, KA
    Jovanovic, MA
    THEORETICAL COMPUTER SCIENCE, 2006, 355 (01) : 25 - 36
  • [42] HUP: An Unstructured Hierarchical Peer-to-Peer Protocol
    Khataniar, Guruprasad
    Goswami, Diganta
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 671 - 676
  • [43] On the Feasibility of Unstructured Peer-to-Peer Information Retrieval
    Asthana, H.
    Fu, Ruoxun
    Cox, Ingemar J.
    ADVANCES IN INFORMATION RETRIEVAL THEORY, 2011, 6931 : 125 - 138
  • [44] Message replication in unstructured peer-to-peer network
    Hassan, Osama Al-Haj
    Ramaswamy, Lakshmish
    2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 337 - 344
  • [45] Exploiting semantics in unstructured peer-to-peer networks
    Nakauchi, K
    Ishikawa, Y
    Morikawa, H
    Aoyama, T
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (07) : 1806 - 1817
  • [46] Adaptive lookup for unstructured peer-to-peer overlays
    Haribabu, K.
    Reddy, Dayakar
    Hota, Chittaranjan
    Yla-Jaaski, Antii
    Tarkoma, Sasu
    2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 2008, : 776 - +
  • [47] A survey on peer-to-peer SIP based communication systems
    Zheng, Xianghan
    Oleshchuk, Vladimir
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2010, 3 (04) : 257 - 264
  • [48] A survey on peer-to-peer SIP based communication systems
    Xianghan Zheng
    Vladimir Oleshchuk
    Peer-to-Peer Networking and Applications, 2010, 3 : 257 - 264
  • [49] Providing Witness Anonymity Under Peer-to-Peer Settings
    Zhu, Bo
    Setia, Sanjeev
    Jajodia, Sushil
    Wang, Lingyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 324 - 336
  • [50] Responder anonymity and anonymous peer-to-peer file sharing
    Scarlata, V
    Levine, BN
    Shields, C
    NETWORK PROTOCOLS, 2001, : 272 - 280