Introducing Tarzan, a peer-to-peer anonymizing network layer

被引:0
|
作者
Freedman, MJ [1 ]
Sit, E [1 ]
Cates, J [1 ]
Morris, R [1 ]
机构
[1] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
来源
PEER-TO-PEER SYSTEMS | 2002年 / 2429卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, without change to those applications. Performance tests show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route.
引用
收藏
页码:121 / 129
页数:9
相关论文
共 50 条
  • [21] A peer-to-peer content distribution network
    Heckmann, O
    Liebau, N
    Darlagiannis, V
    Bock, A
    Mauthe, A
    Steinmetz, R
    FROM INTEGRATED PUBLICATION AND INFORMATION SYSTEMS TO VIRTUAL INFORMATION AND KNOWLEDGE ENVIRONMENTS: ESSAYS DEDICATED TO ERICH J NEUHOLD ON THE OCCASION OF HIS 65TH BIRTHDAY, 2005, 3379 : 69 - 78
  • [22] Accelerated transmission in peer-to-peer network
    Zhuang, Yanyan
    Liu, Ye
    Niu, Lin
    Journal of Southeast University (English Edition), 2007, 23 (02) : 226 - 231
  • [23] The research of Peer-to-Peer network security
    Chen Jinrui
    Li Jianping
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 590 - 592
  • [24] The analysis of peer-to-peer network security
    Zhang, YQ
    Zhang, TJ
    GCA '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON GRID COMPUTING AND APPLICATIONS, 2005, : 131 - 137
  • [25] Peer-to-peer network for concurrent engineering
    Hahn, A
    Benger, A
    Kern, EM
    CONCURRENT ENGINEERING: ENHANCED INTEROPERABLE SYSTEMS, 2003, : 1105 - 1112
  • [26] The State of Peer-to-Peer Network Simulators
    Basu, Anirban
    Fleming, Simon
    Stanier, James
    Naicken, Stephen
    Wakeman, Ian
    Gurbani, Vijay K.
    ACM COMPUTING SURVEYS, 2013, 45 (04)
  • [27] Research of peer discovery method in peer-to-peer network
    Li, ZP
    Huang, DY
    Zhuang, L
    Huang, JH
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 383 - 386
  • [28] Implementation of secure peer group in peer-to-peer network
    Li, ZP
    Dong, YG
    Zhuang, L
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 192 - 195
  • [29] A Social Network Peer-to-Peer Model for Peer Clustering
    Modarresi, Amir
    Mamat, Ali
    Ibrahim, Hamidah
    Mustapha, Norwati
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 1572 - 1578
  • [30] Introducing Peer Copy - A Fully Decentralized Peer-to-Peer File Transfer Tool
    Trautwein, Dennis
    Schubotz, Moritz
    Gipp, Bela
    2021 IFIP NETWORKING CONFERENCE AND WORKSHOPS (IFIP NETWORKING), 2021,