DocumentCode :
3149445
Title :
Preserving receiver´s anonymity for circular structured P2P networks
Author :
Naghizadeh, Alireza ; Berenjian, Samaneh ; Razeghi, Behrooz ; Shahanggar, Saghi ; Pour, Nima Razagh
Author_Institution :
Dept. of Comput. Eng., Guilan Univ., Rasht, Iran
fYear :
2015
fDate :
9-12 Jan. 2015
Firstpage :
71
Lastpage :
76
Abstract :
Some unique attributes of P2P networks such as cost efficiency and scalability, contributed for the widespread adaptation of these networks. Since P2P applications are mostly used in file-sharing, preserving anonymity of users has become a very important subject for researchers. As a result, a lot of methods are suggested for P2P networks to preserve anonymity of users. Most of these methods, by relying on established anonymous solutions on client/server applications, are presented for unstructured P2P networks. But structured overlays, by using Distributed Hash Tables (DHT) for their routing, do not resemble traditional paradigms. Therefore, current anonymous methods can not be implemented for them easily. In this paper, we introduce a novel methodology to provide receiver´s anonymity for circular P2P structures. With this method, we get help from inherited features of network infrastructure to establish a standard way for making tunnels. Our purpose is to introduce a flexible design which is able to manage different parts of the tunnels on current infrastructures. For this purpose, we implement our method on top of Chord to show how such design can be managed for real world applications. The results of applied method on a chord-like network shows that by managing critical features of our method, a trade-off can be made between stronger security and performance of the network.
Keywords :
client-server systems; computer network security; peer-to-peer computing; telecommunication network routing; chord-like network; circular structured P2P networks; client-server applications; cost efficiency; file-sharing; receiver anonymity preservation; scalability; unstructured P2P networks; Conferences; Cryptography; Peer-to-peer computing; Receivers; Routing; Tunneling; Anonymity; Chord; P2P; Security; Tunneling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE
Conference_Location :
Las Vegas, NV
ISSN :
2331-9860
Print_ISBN :
978-1-4799-6389-8
Type :
conf
DOI :
10.1109/CCNC.2015.7157949
Filename :
7157949
Link To Document :
بازگشت