Mutual anonymous overlay multicast
نویسندگان
چکیده
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous multicasting and such services are not available yet. Due to the fundamental differences between multicast and unicast, the solutions proposed for anonymity in unicast communications cannot be directly applied to multicast applications. In this paper we define the anonymous multicast system, and propose a mutual anonymous multicast (MAM) protocol including the design of a unicast mutual anonymity protocol and construction and optimization of an anonymous multicast tree. MAM is self-organizing and completely distributed. We define the attack model in an anonymous multicast system and analyze the anonymity degree. We also evaluate the performance of MAM by comprehensive simulations. © 2006 Elsevier Inc. All rights reserved.
منابع مشابه
Anonymous Communications on the Internet
For many internet applications, it may be advantageous or essential and even critical to protect the identity of participants. Anonymous communication strategies mostly shield the sender of messages from identification. This paper presents a protocol for anonymous communication over internet that can also provide receiver anonymity. Our system is designed to provide anonymity under a rather str...
متن کاملAgyaat: mutual anonymity over structured P2P networks
Purpose – To provide mutual anonymity over traditionally un-anonymous Distributed Hash Tables (DHT) based Peer-to-Peer overlay networks, while maintaining the desired scalability and guaranteed lookup properties of the DHTs. Design/methodology/approach – Agyaat uses a novel hybrid-overlay design, a fully decentralized topology without any trusted proxies. It anonymizes both the querying and res...
متن کاملResponder Anonymity and Anonymous Peer-to-Peer File Sharing
Data transfer over TCP/IP provides no privacy for network users. Previous research in anonymity has focused on the provision of initiator anonymity. We explore methods of adapting existing initiator-anonymous protocols to provide responder anonymity and mutual anonymity. We present Anonymous Peer-to-peer File Sharing (APFS) protocols, which provide mutual anonymity for peer-to-peer file sharing...
متن کاملIssues in Overlay Multicast Networks: Dynamic Routing and Communication Cost
Overlay networks are becoming a popular vehicle for deploying advanced services in the Internet. One such service is multicast. Unlike conventional IP multicast, which requires universal deployment of network layer mechanisms, the overlay multicast model leverages the existing unicast mechanism and offers many service flexibilities to applications. Implementing multicast without requiring netwo...
متن کاملHostCast: a new overlay multicasting protocol
Though the merits of IP-based multicast is undeniable, the deployment of IP multicast has met many difficulties. In the past several years, lots of research work have been done on overlay multicast (end-system multicast, application-layer multicast). In this paper, we propose a new overlay multicast protocol: HostCast. Besides constructing a data delivery tree, HostCast uses a simple and effici...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Parallel Distrib. Comput.
دوره 66 شماره
صفحات -
تاریخ انتشار 2006