Introducing Tarzan, a peer-to-peer anonymizing network layer

被引:0
|
作者
Freedman, MJ [1 ]
Sit, E [1 ]
Cates, J [1 ]
Morris, R [1 ]
机构
[1] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
来源
PEER-TO-PEER SYSTEMS | 2002年 / 2429卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, without change to those applications. Performance tests show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route.
引用
收藏
页码:121 / 129
页数:9
相关论文
共 50 条
  • [41] Legitimate peer-to-peer content distribution network
    Chen, Kai
    Deng, Qianni
    GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 129 - +
  • [42] Cost allocation mechanisms in a peer-to-peer network
    Altan, Basak
    Ozener, Okan Orsan
    NETWORKS, 2019, 73 (01) : 104 - 118
  • [43] Network Coding for Resilient Peer-to-Peer Networks
    Hu, D. Y.
    Wang, M. Z.
    Lau, F. C. M.
    Peng, Q. C.
    2009 7TH INTERNATIONAL WORKSHOP ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN 2009), 2009, : 352 - +
  • [44] Peer-to-Peer networkingIs this the future of network computing?
    U Ananth Kini
    Samarth M Shetty
    Resonance, 2001, 6 (12) : 69 - 79
  • [45] Adaptive resource location in a peer-to-peer network
    Iles, M
    Deugo, D
    DEVELOPMENTS IN APPLIED ARTIFICIAL INTELLIGENCE, 2003, 2718 : 604 - 613
  • [46] Efficient person searching in a peer-to-peer network
    Lei, MI
    Chan, SHG
    Wong, AKS
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 970 - 974
  • [47] Using peer-to-peer technology for network forensics
    Redding, S
    ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 141 - 152
  • [48] An evaluation of the security of the Bitcoin Peer-to-Peer Network
    Tapsell, James
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1057 - 1062
  • [49] Protecting Peer-to-Peer Network with Roaming Agents
    Banik, Shankar M.
    Urey, Hugh
    IEEE SOUTHEASTCON 2015, 2015,
  • [50] Classifying Peer-to-Peer Network Coding Schemes
    Ortolf, Christian
    Schindelhauer, Christian
    Vater, Arne
    SPAA'09: PROCEEDINGS OF THE TWENTY-FIRST ANNUAL SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURES, 2009, : 310 - 318