Octopus: Anonymous and Secure DHT Lookup
ثبت نشده
چکیده
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We first explore the essential anonymity vulnerabilities in DHT lookups, and propose mechanisms to address them. We present Octopus, a novel anonymous and secure DHT lookup, which provides strong guarantees for both anonymity and security. We design a novel attacker identification mechanism to discover and remove misbehaving malicious nodes, thus severely limiting an adversary’s ability to carry out active attacks. We analyze the security of Octopus by developing an event-based simulator to show that the attacker discovery mechanism can rapidly identify malicious nodes with low error rate. We calculate the anonymity of Octopus using probabilistic modeling and show that Octopus can achieve near-optimal anonymity guarantees: the anonymity provided by Octopus is 4-6 times better than that of any existing scheme (in terms of amount of leaked information). We evaluate Octopus’s efficiency on Planetlab with 207 nodes and show that Octopus has reasonable lookup latency and manageable communication overhead.
منابع مشابه
A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT
For improving the routing security of traditional DHT, in this paper, a Multidimensional Mapping Mechanism and a secure routing method based on it are proposed against various routing attacks. The proposed mechanism, which maps the resource search and related peers to a smaller space following the same topology with current DHT protocol to simplify the routing operation and decrease the couplin...
متن کاملByzantine Fault Tolerance of Inverse de Bruijn Overlay Networks for Secure P2P Routing
Byzantine faults in a peer-to-peer (P2P) system are resulted from adversarial and inconsistent peer behaviors. Malicious peers can disrupt the routing functions in peer joining and lookup services. Byzantine attackers may collude with each other to paralyze the entire P2P network operations. We discover a new class of DHT-based overlay networks, called inverse de Bruijn (IDB) graph, to enable m...
متن کاملAgyaat: Providing Mutually Anonymous Services over Structured P2P Networks
In the modern era of ubiquitous computing, privacy is one of the most critical user concerns. To prevent their privacy, users typically, try to remain anonymous to the service provider. This is especially true for decentralized Peer-to-Peer (P2P) systems, where common users act both as clients and as service providers. Preserving privacy in such cases requires mutual anonymity, which shields th...
متن کاملStructured Peer-to-Peer Networks: Faster, Closer, Smarter
Peer-to-peer (P2P) distributed hash tables (DHTs) are structured networks with decentralized lookup capabilities. Each node is responsible for a given set of keys (identifiers) and lookup of a key is achieved by routing a request through the network toward the current peer responsible for the desired key. DHT designs are usually compared in terms of degree (number of neighbors) and diameter (le...
متن کاملA Scalable and Robust DHT Protocol for Structured P2P Network
Distributed Hash Tables (DHTs) were originated from the design of structured peer-to-peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, we present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses parallel lookup to reduce retrive latency and bounds communication overhead to a dynamically adjusted r...
متن کامل