Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2005.12C.3.331

Packet Replacement Technique for Securing Anonymity in P2P Network  

Kim Byung Ryong (인하대학교 전자계산공학과)
Kim Ki Chang (인하대학교 정보통신공학부)
Abstract
Flooding based P2P system basically provides anonymity and under the anonymity circumstances user and provider exchange information. Most of packets transferred from node to node do not contain identity information on node that sent packet. And these packets are transmitted to the destination through the routing systems dynamically composed of intermediate nodes. Therefore it is impossible to know who transmitted it for the first and who the designated recipient is. But since downloading and uploading host's IP address is exposed it does not provide anonymity. This study introduces techniques to provide anonymity for protecting identification of users and resource Providers by replacing QueryHit Packets in systems where anonymity can cause trouble.
Keywords
Peer-to-Peer; P2P; Securing Anonymity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Oram, 'Peer-to-Peer,' O'Reilly, Mar., 2001
2 Michael K. Reiter, Aviel D. Rubin, 'Crowds: anonymity for Web transactions,' ACM Transactions on Information and System Security (TISSEC), November, 1998
3 'Gnutella Web Caching System.,' http://www.gnucleus.com/gwebcache/
4 'Gnutella Developer Forum.,' http://groups.yahoo.com/group/the_gdf/
5 'Open Source Newtella for Linux et al.,' http://gnewtellium.sourceforge.net/
6 'The Annotated Gnutella Protocol Specification $v0.4^{(1)}$ .,' http://rfc-gnutella.source forge.net/developer/stable/index.html/
7 Neil Daswani, Hector Garcia-Molina, 'Query-flood DoS attacks in gnutella,' Proceedings of the 9th ACM conference on Computer and communications security table of contents, 2002   DOI
8 P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble, 'A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems,' ACM SIGCOMM Computer Communication Review, January, 2002   DOI
9 'MUTE: Simple, Anonymous File Sharing.,' http://mutenet.sourceforge.net/
10 Stephen C. Bono, Christopher A. Soghoian, Fabian Monrose, 'Mantis: A Lightweight, Server-Anonymity Preserving, Searchable P2P,' Information Security Institute of The Johns Hopkins University, Technical Report TR-2004-01-B-ISI-JHU, June, 2004
11 Michael G. Reed and Paul F. Syverson, 'Onion Routing,' Proceeding of AIPA '99, March, 1999
12 Roger Dingledine, Nick Mathewson, Paul Syverson, 'Tor: The Second-Generation Onion Router,' Proceedings of the 13th USENIX Security Symposium, August, 2004
13 Ben Y. Zhao. Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and Hohn Kubiatowicz, 'Tapestry: A Resilient Global-scale Overlay for Service Deployment,' IEEE Journal on Selected Areas in Communications, January, 2004   DOI   ScienceOn
14 The Gnutella Protocol Specification v0.41 Document Revision 1.2
15 Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker, 'A acalable content-addressable network,' Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications table of contents
16 Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, Hari Balakrishnan, 'Chord: a scalable peer-to-peer lookup protocol for internet applications,' IEEE/ACM Transactions on Networking, February, 2003   DOI   ScienceOn
17 'The Freenet Project.,' http://freenet.sourceforge.net/
18 Kirsten Hildrum, John Kubiatowicz, Satish Rao and Ben Y. Zhao, 'Distributed Object Location in a Dynamic Network,' Theory of Computing Systems, March., 2004