Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.6.65

Peer to Peer Anonymous Protocol Based Random Walk  

Cho, Jun-Ha (Korea University Graduate School of Information Management and Security)
Rhee, Hyun-Sook (Korea University Graduate School of Information Management and Security)
Park, Hyun-A (Korea University Graduate School of Information Management and Security)
Lee, Dong-Hoon (Korea University Graduate School of Information Management and Security)
Abstract
The P2P file sharing system sends the results to users by searching the files in the shared folders. In the process of it, the problem is that the transferred information includes the pathname and file information and it can be revealed who searches which files. In related to this problem, anonymous file sharing P2P protocol has been an active research area where a number of works have been produced. However, the previous studies still have a few of weakness. Therefore, We propose two anonymous P2P file sharing protocols based on the decentralized and unstructured Random Walk. The first scheme uses the dynamic onion routing where the requester can receive the wanted file without knowing other peers' IDs. The second scheme uses the IP multicast method which lowers the computational overhead. Both of them are more suited for the dynamic P2P system.
Keywords
anonymity; peer to peer; random walk; dynamic; multicast;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Xiao, Z. Xu, and X. Zhang. 'Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to Peer Networks', IEEE Transactions on Parallel and Distributed Systems, 2003
2 Byungryong Kim, 'Client and Server Anonymity Preserving in P2P Networks', ASWC 2006, LNCS 4185, pp. 689-695, 2006
3 The Gnutella Protocol Specification v0.41 Document Revision 1.2., http://rfc-gnutella.sourceforge.net/developer/ stable/index.html/
4 김병오, 김일우, '분산 해시 테이블 기반 P2P 기술동향', ETRI, 전자통신동향분석, 제 21권, 제 6호, pp. 179-189, 12월, 2006
5 Chin-Chen Chang, Chin-Yang Lin, 'Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots', Elsevier Journal of Network and Computer Applications 30, pp. 662-676, 2007   DOI   ScienceOn
6 Li Xiao, Yunhao Liu, 'Mutual anonymous overlay multicast', Elsevier J. Parallel Distrib.Comput. 66, pp. 1205-1216, 2006   DOI   ScienceOn
7 V. Scarlata, B. Levine, and C. Shields, 'Responder Anonymity and anonymous peer-to-peer File Sharing', in Proc. of IEEE International Conference on Network Protocols(ICNP), Riverside, CA, 2001
8 Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker, 'A scalable content- addressable network', Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications table of contents
9 Ion Stoica, Robert Morris, 'Chord: A Scalable Peer-to-peer Lookup Service for internet Applications', ACM, SIGCOMM'01, 2001
10 Jingsong Han, Yunhao Liu, 'A Random Walk Based Anonymous Peer-to-Peer Protocol Design', ICCNMC 2005, LNCS 3619, pp. 143-152, 2005
11 C. Shields and B.N. Levine, “A protocol for anonymous communication over the Internet,” Proc. 7th ACM Conference on Computer and Communication Security, ACM CCS 2000, Nov. 2000
12 권혁찬, 문용혁, 'P2P 표준화 및 기술 동향', ETRI, 전자통신동향분석, 제 22권, 제 1호, pp. 11-23, 2월, 2007
13 http://en.wikipedia.org/wiki/Random_walk
14 Baoliu YE, Minyi, 'A Multicast Based Anonymous Information Sharing Protocol for Peer-to-Peer Systems', IEICE, 2006
15 Jingsong Han, Yunhao Liu, 'A Mutual Anonymous Peer-to-peer Protocol Design', IPDPS'05, 2005
16 강현국, 신용태, '컴퓨터 네트워킹', PEARSON Addison Wesley Korea, 제 3판, pp. 394-403, 11월, 2005
17 M.K. Reiter and A.D. Rubin, 'Crowds: Anonymity for Web transactions,' ACM Trans. Information and System Security, vol.1, no.1, pp. 66-92, Nov. 1988   DOI
18 Brian Neil Levine, Clay Shields, 'Hordes: a multicast based protocol for anonymity', IOS, Journal of Computer Security 10, pp. 213-240, 2002   DOI
19 I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, 'Freenet: A distributed anonymous information storage and retrieval system', In Workshop on Design Issues in Anonymity and Unobservability, pp. 46-66, 2000., http://citeseer.nj.nec.com/clarkeoofreenet.html
20 Ben Y.Zhao, Ling Huang, Jeremy Stribling, Sean C.Rhea, Anthony D.Joseph, and John Kubiatowicz, 'Tapestry: A Resilient Global-scale Overlay for Service Deployment', IEEE Journal on Selected Areas in Communications, 2004