• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Anonymity in Structured Peer-to-peer Networks (2005)

by N Borisov, J Waddle
Add To MetaCart

Tools

Sorted by:
Results 1 - 9 of 9

Anonymous Routing in Structured Peer-to-Peer Overlays

by Nikita Borisov , 2005
"... ..."
Abstract - Cited by 17 (5 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...ve routing offers some measure of anonymity, as intermediate nodes do not know where a query originated. In this way, it is similar to the routing of queries in Freenet. Earlier work by us and others =-=[11, 55, 44]-=- explores the viability of using recursive routing, or a simple modification thereof, to achieve anonymity in the structured Chord [70] overlay. However, a fundamental difficulty with this approach is...

A Taxonomy for and Analysis of . . .

by Douglas Kelly , 2009
"... Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama’s Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity of new surveillance technologies in cyberspace enables instant, undetectable, and unsolicited information collection about entities. Hence, anonymity and privacy are becoming increasingly important issues. Anonymization enables

Coordinating randomized policies for increasing security of . . .

by P. Paruchuri, J. P. Pearce, J. Marecki, M. Tambe, F. Ordóñez, Sarit Kraus , 2009
"... ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract not found

Anonymity for Trust Holders using k-anonymity Chord

by Ahmet Burak Can, Bharat Bhargava , 2006
"... Anonymity is important in a peer-to-peer system to protect peers that offer/request services. We propose an anonymity scheme on Chord to provide a peer k-anonymity protection against a global passive adversary who can sniff all the communication on a network. For collaborating adversaries, anonymity ..."
Abstract - Add to MetaCart
Anonymity is important in a peer-to-peer system to protect peers that offer/request services. We propose an anonymity scheme on Chord to provide a peer k-anonymity protection against a global passive adversary who can sniff all the communication on a network. For collaborating adversaries, anonymity is protected as long as they perform only passive attacks. An encryption scheme ensures that peers can authenticate the sender of an anonymous response. A trusted third party is not needed. We achieve a performance comparable to Chord. The efficiency and anonymity guarantees are shown theoretically. As a case scenario, anonymous access to trust information is studied on a trust model. Peers query the information stored by trust holders. We show how trust holders anonymously respond to such queries. Attack scenarios are discussed in detail to verify security of the scheme. Index Terms Peer-to-peer systems, anonymity, cryptography, trust management, security.
(Show Context)

Citation Context

...ll these peer-to-peer schemes do not provide protection against a global passive adversary. Anonymity on Chord have been studied by using recursive, randomized, indirect, split, bidirectional routing =-=[27]-=-, and virtual nodes [28]. Achord [3] proposes enhancements to provide censorship resistance on Chord. These December 4, 2006 DRAFT 3sNotation Description UBS, RBS Pi IDi T IDi Ui, Ri T Ui, T Ri OUi, O...

SCUBE: A DoS-Resistant Distributed Search Protocol

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...orage based on Rabin’s information dispersal algorithm wasproposedin[6],inwhichsecretsharingisusedtobreakafile into shares. A secret-sharing based routing approach called Splitrouting was proposed in =-=[3]-=-. Secret sharing has also been used in software engineering [30]. This work proposed a secret sharing based compiler solution to achieve confidentiality, integrity and availability of critical data. A...

Algorithms for secure patrols in adversarial domains

by Praveen Paruchuri, Jonathan P. Pearce, Milind Tambe, Fernando Ordonez, Sarit Kraus , 2007
"... We consider the problem of providing decision support to a patrolling or security service in an adversarial domain. The idea is to create patrols that can achieve a high level of coverage or reward while taking into account the presence of an adversary. We assume that the adversary can learn or ob ..."
Abstract - Add to MetaCart
We consider the problem of providing decision support to a patrolling or security service in an adversarial domain. The idea is to create patrols that can achieve a high level of coverage or reward while taking into account the presence of an adversary. We assume that the adversary can learn or observe the patrolling strategy and use this to its advantage. We follow two different approaches depending on what is known about the adversary. If there is no information about the adversary we use a Markov Decision Process (MDP) to represent patrols and identify randomized solutions that minimize the information available to the adversary. This leads to algorithm BRLP, for policy randomization of MDPs. Second, when there is partial information about the adversary we decide on efficient patrols by solving a Bayesian Stackelberg game. Here, the leader decides first on a patrolling strategy and then an adversary, of possibly many adversary types, selects its best response for the given patrol. We provide an efficient MIP formulation to solve this NP-hard problem. Our experimental results show the efficiency of these algorithms and illustrate how these techniques provide optimal and secure patrolling policies.
(Show Context)

Citation Context

...arian mission [1], [12], agents assisting in routine security checks at airports [13], agents providing privacy in sensor network routing [10] or agents maintaining anonymity in peer to peer networks =-=[2]-=-. In this paper we present our recent research [12], [11] on how to plan for agents acting in such uncertain environments while facing security challenges. The common assumption in these security doma...

An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables

by Souvik Ray
"... ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...instead of address lookup. Thus, the IP address of the storage node is not revealed in the query reply. However, information leak from routing table entries cannot be prevented. Several other studies =-=[7, 2, 1]-=- have focused on the issue of sender-anonymity in Chord. We aim at analyzing the effect of leak of information from routing tables on recipient anonymity. An analytical framework for calculating infor...

SCUBE: A DoS Resistant Distributed Search Protocol

by unknown authors
"... Abstract – Many P2P-based storage systems use distributed indexing service for searching documents. There are two security issues when the nodes providing the index service are compromised by adversaries. First, the adversaries may delete the indexes or stop the program of indexing service, making t ..."
Abstract - Add to MetaCart
Abstract – Many P2P-based storage systems use distributed indexing service for searching documents. There are two security issues when the nodes providing the index service are compromised by adversaries. First, the adversaries may delete the indexes or stop the program of indexing service, making the affected documents disappear in the search infrastructure. Second, the adversaries may leak the locations of the storage nodes hosting certain documents, making those nodes the target of DOS attacks. We propose a protocol called SCUBE which addresses these attacks by using secret-sharing based threshold cryptography and the concept of virtual addresses. The use of secretsharing enables us to achieve better security guarantees in comparison to traditional approaches like replication. Our results show that SCUBE performs appreciably well under different attack scenarios and incurs nominal overhead. A working prototype of SCUBE has also been implemented and tested on the Planetlab testbed. 1
(Show Context)

Citation Context

...Rabin’s information dispersal algorithm was proposed in [11], in which secret sharing is used to break a file into shares. A secret-sharing based routing approach called Split-routing was proposed in =-=[7]-=-. Secret sharing has also been used in software engineering. [34] proposed a secret sharing based compiler solution to achieve confidentiality, integrity and availability of critical data. Address obf...

Anonymous Access to Trust Information Using k-anonymity Chord

by Ahmet Burak Can, Bharat Bhargava
"... Abstract—In a reputation based trust network, each peer stores trust information of others and answers the trust queries, in addition to providing services to others. We present a cryptographic protocol on Chord, which provides anonymous access to trust information. Peers form anonymity groups and g ..."
Abstract - Add to MetaCart
Abstract—In a reputation based trust network, each peer stores trust information of others and answers the trust queries, in addition to providing services to others. We present a cryptographic protocol on Chord, which provides anonymous access to trust information. Peers form anonymity groups and generate responses inside the group. Responder of a trust query has k-anonymity protection against an adversary who can sniff all communication on the network. Moreover, our encryption scheme ensures that the initiator of a trust query can check the validity of an anonymous reply. Keywords-anonymity, trust management, peer-to-peer I.
(Show Context)

Citation Context

...ty if the adversary can not sniff the whole communication path. Changing the routing method. Anonymity has been studied on Chord by using recursive, randomized, indirect, split, bidirectional routing =-=[20]-=-. Achord [3] defines routing limitations on Chord to provide censorship resistance. These schemes offer anonymity protection in a local adversary model and can not protect anonymity against a global p...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University