Improving Sender Anonymity in a Structured Overlay with Imprecise Routing
نویسنده
چکیده
In the framework of peer to peer distributed systems, the problem of anonymity in structured overlay networks remains a quite elusive one. It is especially unclear how to evaluate and improve sender anonymity, that is, untraceability of the peers who issue messages to other participants in the overlay. In a structured overlay organized as a chordal ring, we have found that a technique originally developed for recipient anonymity also improves sender anonymity. The technique is based on the use of imprecise entries in the routing tables of each participating peer. Simulations show that the sender anonymity, as measured in terms of average size of anonymity set, decreases slightly if the peers use imprecise routing; yet, the anonymity takes a better distribution, with good anonymity levels becoming more likely at the expenses of very high and very low levels. A better quality of anonymity service is thus provided to participants.
منابع مشابه
Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity
Anonymous communication is usually achieved by using overlay networks and public-key cryptography. Besides well-established protocols, based on onion routing, various competing solutions have been proposed in the literature. In this work we extend the Crowds system by providing sender and adjustable receiver anonymity. Our solution is robust against a coalition of passive adversaries having int...
متن کاملFormal Notions of Anonymity for Peer-to-peer Networks
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potential privacy attacks (e.g., network address traceback) may deter a storage source from providing the needed data. In this paper we use this practical application scenario to verify our observation that network-based anonymity can be modeled as a complexity based cryptographic problem. We show that, ...
متن کاملAgyaat: mutual anonymity over structured P2P networks
Purpose – To provide mutual anonymity over traditionally un-anonymous Distributed Hash Tables (DHT) based Peer-to-Peer overlay networks, while maintaining the desired scalability and guaranteed lookup properties of the DHTs. Design/methodology/approach – Agyaat uses a novel hybrid-overlay design, a fully decentralized topology without any trusted proxies. It anonymizes both the querying and res...
متن کاملAgyaat: Providing Mutually Anonymous Services over Structured P2P Networks
In the modern era of ubiquitous computing, privacy is one of the most critical user concerns. To prevent their privacy, users typically, try to remain anonymous to the service provider. This is especially true for decentralized Peer-to-Peer (P2P) systems, where common users act both as clients and as service providers. Preserving privacy in such cases requires mutual anonymity, which shields th...
متن کاملAnonymous Communications on the Internet
For many internet applications, it may be advantageous or essential and even critical to protect the identity of participants. Anonymous communication strategies mostly shield the sender of messages from identification. This paper presents a protocol for anonymous communication over internet that can also provide receiver anonymity. Our system is designed to provide anonymity under a rather str...
متن کامل