Peer-to-Peer Anonymous Networking Using Coding

被引:0
|
作者
Chang, Christopher S. [1 ,2 ]
Ho, Tracey [2 ]
Effros, Michelle [2 ]
机构
[1] Samsung Elect Co Ltd, Seoul, South Korea
[2] CALTECH, Dept Elect Engn, Pasadena, CA 91125 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider design and analysis of coding-based anonymous routing systems in peer-to-peer (P2P) overlay networks. An unknown subset of participating nodes is adversarial, and can collude to try to identify the communicating nodes through passive observations. The first part of this work considers subgraph setup in the absence of a reliable public key infrastructure (PKI). As in the "slicing the onion" scheme proposed by Katti et al., a sender constructs a layered subgraph over which coding is performed, but we propose a new coding scheme with a formal information theoretic security characterization. We consider optimization of protocol parameters to maximize the adversary's uncertainty, as measured by the entropy of the source and sink identities, and show that a randomized strategy can improve anonymity and resource usage efficiency. The second part of this work focuses on the data transmission phase, assuming availability of a subgraph setup scheme (either PKI-based or coding-based) and end-to-end encryption. We use network coding at intermediate nodes to improve networking performance and reduce complexity by replacing expensive cryptographic operations at each hop with simpler linear algebra operations.
引用
收藏
页码:525 / 532
页数:8
相关论文
共 50 条
  • [41] Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks
    Tian, Guanyu
    Duan, Zhenhai
    Baumeister, Todd
    Dong, Yingfei
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 409 - 417
  • [42] A random walk based anonymous peer-to-peer protocol design
    Han, JS
    Liu, YH
    Lu, L
    Hu, L
    Patil, A
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 143 - 152
  • [43] Study on Privacy Protection and Anonymous Communication in Peer-to-Peer Networks
    Chao, Gao
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 522 - 525
  • [44] A collaboration scheme for making peer-to-peer anonymous routing resilient
    Wang, Xiaogang
    Luo, Junzhou
    PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 70 - 75
  • [45] Bus-based anonymous multicast in peer-to-peer overlay
    Wang, Jian
    Niu, Changyong
    Shen, Ruimin
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 148 - 151
  • [46] Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
    Mittal, Prateek
    Borisov, Nikita
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (01)
  • [47] Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
    Mittal, Prateek
    Borisov, Nikita
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 267 - 278
  • [48] In Search of an Anonymous and Secure Lookup Attacks on Structured Peer-to-Peer Anonymous Communication Systems
    Wang, Qiyan
    Mittal, Prateek
    Borisov, Nikita
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 308 - 318
  • [49] A comparative study of peer-to-peer networking in the Internet and optical networks
    Wu, J
    Savoie, JM
    Arnaud, BS
    CCCT 2003, VOL 3, PROCEEDINGS, 2003, : 349 - 356
  • [50] Jupiter: Peer-to-peer networking platform over heterogeneous networks
    Ishikawa, Norihiro
    Kato, Takeshi
    Sumino, Hiromitsu
    Hjelm, Johan
    Miyatsu, Kazuhiro
    Murakami, Shingo
    3rd International Conference on Computing, Communications and Control Technologies, Vol 2, Proceedings, 2005, : 1 - 8