Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks

被引:0
|
作者
Tian, Guanyu [1 ]
Duan, Zhenhai [2 ]
Baumeister, Todd [3 ]
Dong, Yingfei [3 ]
机构
[1] Fontbonne Univ, St Louis, MO 63105 USA
[2] Florida State Univ, Tallahassee, FL 32306 USA
[3] Univ Hawaii, Honolulu, HI 96822 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Detecting and handling routing loops is a critical issue in the design of anonymous peer-to-peer content sharing networks (apCSNs). A principal requirement of such a scheme is that it should not leak any message forwarding information that can undermine the user anonymity of the resulting apCSN. A number of loop handling schemes have been developed in apCSNs such as Freenet and GNUnet. However, they all leak certain level of message forwarding information, which can be exploited to undermine or compromise the user anonymity. In this paper we develop a new loop handling scheme named Reroute-on-Loop (ROL) that will not leak any message forwarding information. Using the Thynix simulator developed by the Freenet project, we show that overall ROL only has minor performance impacts on message path lengths compared to the current loop handling scheme of Freenet on various network topologies, ranging from small-world topologies to random topologies. For example, the average routing path lengths of ROL are only increased by less than 1 hop compared to those with the current loop handling scheme of Freenet on small-world network topologies. Our performance studies confirm that ROL is a practical scheme, and can be deployed on Freenet and similar apCSN systems.
引用
收藏
页码:409 / 417
页数:9
相关论文
共 50 条
  • [1] Peer-to-peer content sharing in wireless networks
    Marossy, K
    Csúcs, G
    Bakos, B
    Farkas, L
    Nurminen, JK
    [J]. 2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 109 - 114
  • [2] Hybrid peer-to-peer content sharing in mobile networks
    Ekler, Péter
    Kelényi, Imre
    Dévai, István
    Bakos, Balázs
    Kiss, Attila
    [J]. Journal of Networks, 2009, 4 (02) : 119 - 132
  • [3] Content management policies in peer-to-peer file sharing networks
    Meo, M
    Milan, F
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 975 - 979
  • [4] Polluted Content Prevention in Peer-to-Peer File Sharing Networks
    Anand, P. M. Rubesh
    Bhaskar, Vidhyacharan
    [J]. 2011 ANNUAL IEEE INDIA CONFERENCE (INDICON-2011): ENGINEERING SUSTAINABLE SOLUTIONS, 2011,
  • [5] Survey of anonymous peer-to-peer file-sharing
    Chothia, T
    Chatzikokolakis, K
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 744 - 755
  • [6] Responder anonymity and anonymous peer-to-peer file sharing
    Scarlata, V
    Levine, BN
    Shields, C
    [J]. NETWORK PROTOCOLS, 2001, : 272 - 280
  • [7] LCrawler: an Enhanced Measurement Tool for Peer-to-Peer Content Sharing Networks
    Lu, Qiang
    Liu, Bo
    Hu, Huaping
    [J]. PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 507 - 511
  • [8] A unified trust management strategy for content sharing in Peer-to-Peer networks
    Anand, P. M. Rubesh
    Bhaskar, Vidhyacharan
    [J]. APPLIED MATHEMATICAL MODELLING, 2013, 37 (04) : 1992 - 2007
  • [9] Mobile Peer-to-Peer Content Sharing Application
    Matuszewski, Marcin
    Beijar, Nicklas
    Lehtinen, Juuso
    Hyyrylaeinen, Tuomo
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 1324 - +
  • [10] A universal anonymous system for structured peer-to-peer networks
    Lee, Li-Yuan
    Lee, Jiunn-Jye
    Lei, Chin-Laung
    [J]. TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 896 - 899