VOUTE-Virtual Overlays Using Tree Embeddings
نویسندگان
چکیده
Friend-to-friend (F2F) overlays, which restrict direct communication to mutually trusted parties, are a promising substrate for privacy-preserving communication due to their inherent membership-concealment and Sybilresistance. Yet, existing F2F overlays suffer from a low performance, are vulnerable to denial-of-service attacks, or fail to provide anonymity. In particular, greedy embeddings allow highly efficient communication in arbitrary connectivity-restricted overlays but require communicating parties to reveal their identity. In this paper, we present a privacy-preserving routing scheme for greedy embeddings based on anonymous return addresses rather than identifying node coordinates. We prove that the presented algorithm are highly scalalbe, with regard to the complexity of both the routing and the stabilization protocols. Furthermore, we show that the return addresses provide plausible deniability for both sender and receiver. We further enhance the routing’s resilience by using multiple embeddings and propose a method for efficient content addressing. Our simulation study on real-world data indicates that our approach is highly efficient and effectively mitigates failures as well as powerful denial-
منابع مشابه
Self-optimised Tree Overlays using Proximity-driven Self-organised Agents
Hierarchical structures are often deployed in large scale distributed systems to structure communication. Building and maintaining such structures in dynamic environments is challenging. Self-organisation is the approach taken in this chapter. AETOS, the Adaptive Epidemic Tree Overlay Service, provides tree overlays on demand. AETOS uses three local agents to this purpose (i) to translate appli...
متن کاملAn Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays
Structured peer-to-peer overlay networks such as CAN, Chord, Pastry, and Tapestry can be used to implement Internet-scale application-level multicast. There are two general approaches to accomplishing this: tree building and flooding. This paper evaluates these two approaches using two different types of structured overlay: 1) overlays which use a form of generalized hypercube routing, e.g., Ch...
متن کاملPerformance-Engineered Network Overlays for High Quality Interaction in Virtual Worlds
Overlay hosting systems such as PlanetLab, and cloud computing environments such as Amazon’s EC2, provide shared infrastructures within which new applications can be developed and deployed on a global scale. This paper ex-plores how systems of this sort can be used to enable ad-vanced network services and sophisticated applications that use those services to enhance performance and provide a hi...
متن کاملPhysical Expander in Virtual Tree Overlay
In this paper, we propose a new construction of constantdegree expanders motivated by their application in P2P overlay networks and in particular in the design of robust trees overlay. Our key result can be stated as follows. Consider a complete binary tree T and construct a random pairing Π between leaf nodes and internal nodes. We prove that the graph GΠ obtained from T by contracting all pai...
متن کاملOn counting planar embeddings
A method for counting the embeddings of a connected but not necessarily biconnected planar graph is given. The method relates the embedding of edges around an articulation point to a tree structure called an embedding tree. MacLane [S] gives a method for counting the number of distinct embeddings of a biconnected planar graph. This method is based on a decomposition into triconnetted components...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1601.06119 شماره
صفحات -
تاریخ انتشار 2016