Survey on Anonymity in Unstructured Peer-to-Peer Systems

@article{Xiao2008SurveyOA,
  title={Survey on Anonymity in Unstructured Peer-to-Peer Systems},
  author={Renyi Xiao},
  journal={Journal of Computer Science and Technology},
  year={2008},
  volume={23},
  pages={660-671}
}
  • Renyi Xiao
  • Published 1 July 2008
  • Computer Science
  • Journal of Computer Science and Technology
Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms of transfer efficiency, many systems try to mask the identities of their users for privacy consideration. By comparison and analysis of existing approaches, we investigate the properties of unstructured P2P anonymity, and summarize current attack models on these designs. Most of these approaches are path-based, which require peers to pre-construct anonymous paths before transmission, thus suffering significant… 
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
TLDR
Rumor Riding is proposed, a lightweight and non-path-based mutual anonymity protocol for decentralized P2P systems that takes advantage of lower overhead by mainly using the symmetric cryptographic algorithm.
Privacy and Cooperation in Peer-to-Peer Systems
TLDR
This thesis looks at other forms of collaboration wherein a P2P system can overcome some of the other downsides of centralized solutions, e.g. the privacy concerns.
Maintaining Unlinkability in Group Based P2P Environments
TLDR
Using this method, it is not possible to ultimately pinpoint a peer's identity despite the constraints of a group membership scenario, so unlinkability in group membership authentication attempts when using peer groups relying on web-of-trust is maintained.
Split Message-Based Anonymity for JXTA Applications
TLDR
This work proposes ananonymity service for JXTA, which takes advantage of its core services, in a manner so that it can be easily integrated to existing end applications and services.
Dual-Path Peer-to-Peer Anonymous Approach
TLDR
The ultimate goal of this anonymous communications approach is to allow a requester to communicate with a provider in such a manner that nobody can determine the requester’s identity and the content of transferred data.
JXTA anonymity through a replicated message-based approach
TLDR
This paper proposes how to adapt a replicated message-based approach to JXTA, by taking advantage of its idiosyncracies and capabilities, to achieve some degree of message privacy and authentication.
Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar
TLDR
This paper provides an experimental evaluation of two relevant protocols, each one belonging to a different category of approaches to anonymity: unimessage and split message, and analysis on three metrics: round trip-time (RTT), node processing time and reliability.
Anonymous Communication for Providing More Privacy and Security
TLDR
The ultimate goal of this anonymous communications algorithmic rule is to permit a requester to speak with a provider in such a way that no-one will confirm the requester’s identity and therefore the content of transferred information.
Anonymous Communication in Peer-to-Peer Networks for providing more Privacy and Security
TLDR
The ultimate goal of this anonymous communications algorithm is to allow a requester to communicate with a provider in such a manner that nobody can determine the requester's identity and the content of transferred data.
...
1
2
3
...

References

SHOWING 1-10 OF 62 REFERENCES
A mutual anonymous peer-to-peer protocol design
TLDR
Compared with previous designs, SSMP achieves mutual anonymity in P2P systems with a high degree of anonymity and a low cryptography processing overhead.
A Survey of Anonymous Peer-to-Peer File-Sharing
TLDR
A survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity and describes a number of implemented systems based on one, or a combination of, these methods.
Responder anonymity and anonymous peer-to-peer file sharing
TLDR
This work presents anonymous peer-to-peer file sharing (APFS) protocols, which provide mutual anonymity for peer- to- peer file sharing, and compares the TCP performance of the APFS protocol to existing overt file sharing systems such as Napster.
A peer-to-peer anonymizing network layer
TLDR
This thesis proposes Tarzan, a peer-to-peer anonymous IP ne twork overlay that is fault-tolerant, highly sc alable, and easy to manage and quantifies Tarzan’s anonymity properties and shows that Tarzan imposes minimal performance overhead over a corresponding non-anonymous overlay route.
Mutual Anonymity for Mobile P2P Systems
TLDR
A scalable secret-sharing-based mutual anonymity protocol, termed PUZZLE, is proposed, which enables anonymous query issuance and file delivery for MOPNETs in ad hoc environments by employing Shamir's secret sharing scheme.
Tarzan: a peer-to-peer anonymizing network layer
TLDR
Measurements show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route, and Protocols toward unbiased peer-selection offer new directions for distributing trust among untrusted entities.
Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks
We present several protocols to achieve mutual communication anonymity between an information requester and a provider in a P2P information-sharing environment, such that neither the requester nor
Anonymizing Censorship Resistant Systems
TLDR
The key idea is to separate the role of document storers from the machines visible to the users, which makes each individual part of the system less prone to attacks, and therefore to censorship.
How to Disappear Completely: A Survey of Private Peer-to-Peer Networks
This paper offers a survey of the emerging field of private peer-to-peer networks, which can be defined as internet overlays in which the resources and infrastructure are provided by the users, and
AP3: cooperative, decentralized anonymous communication
TLDR
This paper describes a cooperative overlay network that provides anonymous communication services for participating users and uses AP3's primitives to build novel anonymous group communication facilities (multicast and anycast), which shield the identity of both publishers and subscribers.
...
1
2
3
4
5
...