Anonymous Communication in Peer-to-Peer Networks for providing more Privacy and Security
نویسندگان
چکیده
—One of the most important issues in peer-to-peer networks is anonymity. The major anonymity for peer-to-peer users concerned with the users' identities and actions which can be revealed by any other members. There are many approaches proposed to provide anonymous peer-to-peer communications. An intruder can get information about the content of the data, the sender's and receiver's identities. Anonymous approaches are designed with the following three goals: to protect the identity of provider, to protect the identity of requester and to protect the contents of transferred data between them. This article presents a new peer-to-peer approach to achieve anonymity between a requester and a provider in peer-to-peer networks with trusted servers called suppernode so that the provider will not be able to identify the requester and no other peers can identify the two communicating parties with certainty. This article shows that the proposed algorithm improved reliability and has more security. This algorithm, based on onion routing and randomization, protects transferring data against traffic analysis attack. The ultimate goal of this anonymous communications algorithm is to allow a requester to communicate with a provider in such a manner that nobody can determine the requester's identity and the content of transferred data. I. INTRODUCTION A peer-to-peer network is a dynamic and scalable set of computers (also referred as peers). The peers can join or leave the network at any time. [1] The basic idea of a peer-to-peer network is to build a virtual layer over the application or network layer. In such an overlay network all peers interconnect with each other. All peers are both the resource consumers and providers. Currently, file-sharing is the most popular application in peer-to-peer systems [2]. Peer-to-peer networks can be divided into structured and unstructured classes. Structured peer-to-peer networks map each peer as well as the index information of each resource into a globally position such as Distributed Hash Table (DHT) in a highly organized structure. This paradigm has two main drawbacks which limit the implementation in real world. First, it cannot support the fuzzy query and Second, the DHT structure has large overhead to individual peers and too difficult to maintenance. In Unstructured peer-to-peer networks, peers can join and leave networks simply and there are not any structured
منابع مشابه
Network and Security Analysis of Anonymous Communication Networks
Anonymous communication networks are popular for providing a means of covert communication and secure exchange of data. Analysis of such networks is challenging due to the high degree of anonymity and unconventional ways to access these networks. In this paper, we use network analysis as a tool to analyze the structure of these networks and assess the privacy and security provided by these netw...
متن کاملTEL-AVIV UNIVERSITY RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES SCHOOL OF COMPUTER SCIENCE Hide and Seek: Provable Anonymity in Computer Networks
Anonymous communication methods have been under heavy research in the last years. Specifically, with the advent of peer to peer networks, anonymity is grasped as a desired property of any well designed system for exchanging information between parties. Previous work dealing with anonymity and privacy is mostly application driven and intuitively based, paying more attention to implementation det...
متن کاملA Survey on Security, Privacy and Anonymity in Legal Distribution of Copyrighted Multimedia Content over Peer-to-Peer Networks
..................................................................................................................5 Introduction..............................................................................................................6 1. Secuirty, privacy and anonymity challenges in legal P2P content distribution systems. .......................................................................
متن کاملAn Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh clients (MCs), where MRs are connected to the Internet backbone through the Internet gateways (IGWs). The MCs are wireless devices and communicate among themse...
متن کاملPPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume a client-server architecture in which only the clients, but not the servers, care about their privacy. In peer-to-peer (P2P) systems where both clients and servers are peer users with privacy concerns, no existing sy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1208.3192 شماره
صفحات -
تاریخ انتشار 2012