The BitTorrent Anonymity Marketplace

نویسندگان

  • Seth James Nielson
  • Dan S. Wallach
چکیده

The very nature of operations in peer-to-peer systems such as BitTorrent exposes information about participants to their peers. Nodes desiring anonymity, therefore, often chose to route their peer-to-peer traffic through anonymity relays, such as Tor. Unfortunately, these relays have little incentive for contribution and struggle to scale with the high loads that P2P traffic foists upon them. We propose a novel modification for BitTorrent that we call the BitTorrent Anonymity Marketplace. Peers in our system trade in k swarms obscuring the actual intent of the participants. But because peers can cross-trade torrents, the k− 1 cover traffic can actually serve a useful purpose. This creates a system wherein a neighbor cannot determine if a node actually wants a given torrent, or if it is only using it as leverage to get the one it really wants. In this paper, we present our design, explore its operation in simulation, and analyze its effectiveness. We demonstrate that the upload and download characteristics of cover traffic and desired torrents are statistically difficult to distinguish.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PACOM: Parasitic anonymous communication in the BitTorrent network

Existing anonymous communication systems mask the identities of users by adopting intermediary nodes to transform message flows. However, some recently presented traffic analysis algorithms are still able to undermine the anonymity of these systems. The traditional flow transformation strategies fail to completely eliminate the traffic correlation between adjacent communication links to prevent...

متن کامل

Improving Content Availability in the I2P Anonymous File-Sharing Environment

Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as...

متن کامل

Sensing Data Market

This paper proposes the Sensing Data Market (SenseMart). It leverages the existing sensing and communication infrastructure for a low capital investment cost. The goal of SenseMart is to facilitate and provide incentives for the exchange of sensing data among users (as in a marketplace) and can be seen as the "BitTorrent" of sensing data.

متن کامل

Practices of de-identification in the global file sharing community

Purpose – The purpose of this study is to understand more of online anonymity in the global file sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of VPN or similar service related to age, gender, geographical location, as well as analysing the correlation with file sharing frequencies. Design/methodology/approach – This stud...

متن کامل

Analyzing the Pynchon Gate Protocol

I analyzed the Pynchon Gate Protocol, a pseudonymous mail reply handling protocol introduced by Sassaman, Coen, and Mathewson, and in particular BitTorrent’s suitability for it’s purpose within that protocol. After an unfulfilling attempt at using PRISM, I wrote a BitTorrent simulator and used that to verify the feasibility of an attack delaying the distribution of the mail and possibly removin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1108.2718  شماره 

صفحات  -

تاریخ انتشار 2011