Skip to main content

Efficient Caching Strategies for Gnutella-Like Systems to Achieve Anonymity in Unstructured P2P File Sharing

  • Conference paper
Next Generation Information Technologies and Systems (NGITS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4032))

Abstract

A critical problem in a Peer-to-Peer file sharing system is how to protect the anonymity of agent nodes when providing efficient data access services. Most of existing technique mostly focus on how to provide the initiator anonymity and privacy, but leave the anonymity of the server. Our technique is similar to Onion routing in that it uses a proxy node to hide the identity of the client and the server. But it differs from it in that the proxy node is selected dynamically for each session and not fixed as in Onion routing. The fixed proxy might be convenient to use and is useful when loaded with additional features such as encryption as in Onion routing. However it is a sort of compromise from P2P point of view: we are introducing something similar to a control center that could become a bottleneck in the network. Temporary proxy doesn’t have this problem. And our technique provides caching of a retrieved data item on the reverse path back to the requestor. Caching in our paper is primarily for providing publisher anonymity and security. In this paper, we show a technique to find such proxy and caching, explain the rationale behind the decision, and prove its effectiveness through experimentation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Workshop on Design Issues in Anonymity and Unobservability, pp. 46–66 (2000), http://citeseer.nj.nec.com/clarke00freenet.html

  2. The Gnutella Protocol Specification v0.41 Document Revision 1.2., http://rfcgnutella.source-forge.net/developer/stable/index.html/

  3. Hildrum, K., Kubiatowicz, J., Rao, S., Zhao, B.Y.: Distributed Object Location in a Dynamic Network. Theory of Computing Systems (2004)

    Google Scholar 

  4. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)

    Google Scholar 

  5. Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A Resilient Global-scale Overlay for Service Deployment. IEEE Journal on Selected Areas in Communications (2004)

    Google Scholar 

  6. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking (2003)

    Google Scholar 

  7. Daswani, N., Garcia-Molina, H.: Query-flood DoS attacks in gnutella. In: Proceedings of the 9th ACM conference on Computer and communications security table of contents (2002)

    Google Scholar 

  8. Gummadi, P.K., Saroiu, S., Gribble, S.D.: A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. ACM SIGCOMM Computer Communication Review (2002)

    Google Scholar 

  9. Back, A., Möller, U., Stiglic, A.: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245–257. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, p. 10. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Anonymizer, http://www.anonymizer.com/

  12. Gabber, E., Gibbons, P., Kristol, D., Matias, Y., Mayer, A.: Consistent, yet anonymous, Web access with LPWA. Commun. ACM 42(2), 42–47 (1999)

    Article  Google Scholar 

  13. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web transactions. ACM Trans. Information and System Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  14. Chaum, D.: Untraceable electronic mail, return addresses, and digitall pseudonyms. Commun. ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  15. Shields, C., Levine, B.N.: A protocol for anonymous communication over the Internet. In: Proc. 7th ACM Conference on Computer and Communication Security (ACM CCS 2000) (November 2000)

    Google Scholar 

  16. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  17. Cottrell, L.: Frequently asked questions about Mixmaster remailers (2000), http://www.obscura.com/~loki/remailer/mixmaster-faq.html

  18. Zero-Knowledge Systems (2000), http://www.zks.net/

  19. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. Journal of the ACM 45(6), 965–982 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  20. The Rewebber (2000), http://www.rewebber.de/

  21. Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: a robust, tamper-evident, censorship-resistant, web publishing system. In: Proceedings of the Ninth USENIX Security Symposium, Denver, CO, USA (2000)

    Google Scholar 

  22. Anderson, R.J.: The Eternity service. In: Proceedings of the 1st International Conference on the Theory and Applications of Cryptology (PRAGOCRYPT 1996), Prague, Czech Republic (1996)

    Google Scholar 

  23. Dingledine, R., Freedman, M.J., Molnar, D.: The Free Haven project: distributed anonymous storage service. In: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer, New York (2001)

    Chapter  Google Scholar 

  24. MUTE: Simple, Anonymous File Sharing, http://mute-net.sourceforge.net/

  25. Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429. Springer, Heidelberg (2002)

    Google Scholar 

  26. Bono, S.C., Soghoian, C.A., Monrose, F.: Mantis: A Lightweight, Server-Anonymity Preserving, Searchable P2P, Information Security Institute of The Johns Hopkins University, Technical Report TR-2004-01-B-ISI-JHU (2004)

    Google Scholar 

  27. Gnutella Developer Forum, http://groups.yahoo.com/group/the_gdf/

  28. Shirky, C.: Listening to Napster. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology. O’Reilly and Associates, Inc., Sebastopol (2001)

    Google Scholar 

  29. Scarlata, V., Levine, B.N., Shields, C.: Responder anonymity and anonymous peer-to-peer file sharing. In: Proc. IEEE Intl. Conference on Network Protocols (ICNP 2001) (November 2001)

    Google Scholar 

  30. Introduction to Newtella, http://www.schnarff.com/gnutelladev/source/newtella/

  31. Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web Caching and Zipf-like Distributions: Evidence and Implications. IEEE INFOCOM (1999)

    Google Scholar 

  32. Sripanidkulchai, K.: The popularity of Gnutella queries and its implications on scalability (January 2004), http://www-2.cs.cmu.edu/~kunwadee/research/p2p/paper.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, B.R., Kim, K.C. (2006). Efficient Caching Strategies for Gnutella-Like Systems to Achieve Anonymity in Unstructured P2P File Sharing. In: Etzion, O., Kuflik, T., Motro, A. (eds) Next Generation Information Technologies and Systems. NGITS 2006. Lecture Notes in Computer Science, vol 4032. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11780991_11

Download citation

  • DOI: https://doi.org/10.1007/11780991_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35472-7

  • Online ISBN: 978-3-540-35473-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics