Anonymity for Trust Holders using k-anonymity Chord
نویسندگان
چکیده
Anonymity is important in a peer-to-peer system to protect peers that offer/request services. We propose an anonymity scheme on Chord to provide a peer k-anonymity protection against a global passive adversary who can sniff all the communication on a network. For collaborating adversaries, anonymity is protected as long as they perform only passive attacks. An encryption scheme ensures that peers can authenticate the sender of an anonymous response. A trusted third party is not needed. We achieve a performance comparable to Chord. The efficiency and anonymity guarantees are shown theoretically. As a case scenario, anonymous access to trust information is studied on a trust model. Peers query the information stored by trust holders. We show how trust holders anonymously respond to such queries. Attack scenarios are discussed in detail to verify security of the scheme.
منابع مشابه
On Anonymity with Identity Escrow
Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exceptional circumstances, such as to assist in a criminal investigation. A protocol for achieving anonymity with identity escrow has been presented by Marshall and Molina-Jiminez. In this paper, we show that that protocol suf...
متن کاملChord-PKI: A distributed trust infrastructure based on P2P networks
Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI...
متن کاملAnonymity in Structured Peer-to-Peer Networks
Existing peer-to-peer systems that aim to provide anonymity to its users are based on networks with unstructured or loosely-structured routing algorithms. Structured routing offers performance and robustness guarantees that these systems are unable to achieve. We therefore investigate adding anonymity support to structured peer-to-peer networks. We apply an entropy-based anonymity metric to Cho...
متن کاملSTor: Social Network based Anonymous Communication in Tor
Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymitynetworks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus makingthem susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based<...
متن کاملA STor: Social Network based Anonymous Communication in Tor
Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust ...
متن کامل