Anonymity and Censorship Resistance in Unstructured Overlay Networks
Identifieur interne : 000D21 ( Istex/Curation ); précédent : 000D20; suivant : 000D22Anonymity and Censorship Resistance in Unstructured Overlay Networks
Auteurs : Michael Backes [Allemagne] ; Marek Hamerlik [Allemagne] ; Alessandro Linari [Royaume-Uni] ; Matteo Maffei [Allemagne] ; Christos Tryfonopoulos [Allemagne] ; Gerhard Weikum [Allemagne]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2009.
English descriptors
- Teeft :
- Algorithm, Anonymity, Anonymity degree, Anonymous communication, Appropriate cluster, Attack scenarios, Attackers need, Average number, Backes, Baseline value, Best strategy, Broadcast threshold, Cardinality, Censorship, Censorship resistance, Censorship resistance properties, Centralised infrastructures, Cloud, Cloud creation, Cloud creation algorithm, Cloud creation process, Cloud intersections, Cloud locality, Cloud size, Cloud topology, Colluding attackers, Communication channel, Communication level, Communication protocol, Communications security, Cryptographic protocol, Data communications, Data model, Destination cloud, Different attack scenarios, Different attacks, Direct connections, Encrypted messages, Experimental evaluation, Experimental results, Extra message, Footprint, Footprint list, Future work, Guarantee anonymity, High cardinality, Honest participants, Honest peers, Important observation, Information exchange, Information providers, Information retrieval, Information systems, Initiator, Interesting observation, International conference, International workshop, Intersection attack, Intersection attacks, Intersection cardinality, Intersections intersections, Joincloud messages, Large fraction, Last steps, Last years, Limited broadcast, Malicious, Malicious peer, Malicious peers, Mdata, Mdata messages, Message content, Message history, Neighbour, Other approaches, Other neighbours, Other peers, Overlay, Overlay network, Overlay networks, Peer, Protocol, Provider, Publishing system, Query, Query language, Query message, Random value, Resource, Resource description, Resource provider, Resource providers, Retrieval, Retrieval capabilities, Rich data model, Scenario, Search functionality, Search infrastructure, Security guarantees, Security properties, Semantic correlation, Semantic overlay networks, Server, Similar peers, Similarity function, Single topic, Social network, Social networking, Social networks, Special interest group, Static paths, Step numbe, Subsequent messages, Sybil, Sybil attack, Sybil attacks, System security, Trust relationships, Ubmit, Unstructured networks, Unstructured overlay network, Unstructured overlay networks, Usenix security symposium.
Abstract
Abstract: This paper presents Clouds, a peer-to-peer protocol that guarantees both anonymity and censorship resistance in semantic overlay networks. The design of such a protocol needs to meet a number of challenging goals: enabling the exchange of encrypted messages without assuming previously shared secrets, avoiding centralised infrastructures, like trusted servers or gateways, and guaranteeing efficiency without establishing direct connections between peers. Anonymity is achieved by cloaking the identity of protocol participants behind groups of semantically close peers. Censorship resistance is guaranteed by a cryptographic protocol securing the anonymous communication between the querying peer and the resource provider. Although we instantiate our technique on semantic overlay networks to exploit their retrieval capabilities, our framework is general and can be applied to any unstructured overlay network. Experimental results demonstrate the security properties of Clouds under different attacks and show the message overhead and retrieval effectiveness of the protocol.
Url:
DOI: 10.1007/978-3-642-05148-7_12
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: Pour aller vers cette notice dans l'étape Curation :000D88
Links to Exploration step
ISTEX:85E7846654A163C360D11073FD9455D5794F317FLe document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Anonymity and Censorship Resistance in Unstructured Overlay Networks</title>
<author><name sortKey="Backes, Michael" sort="Backes, Michael" uniqKey="Backes M" first="Michael" last="Backes">Michael Backes</name>
<affiliation><mods:affiliation>Saarland University & MPI-SWS</mods:affiliation>
<wicri:noCountry code="no comma">Saarland University & MPI-SWS</wicri:noCountry>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: backes@cs.uni-sb.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Hamerlik, Marek" sort="Hamerlik, Marek" uniqKey="Hamerlik M" first="Marek" last="Hamerlik">Marek Hamerlik</name>
<affiliation><mods:affiliation>Saarland University</mods:affiliation>
<wicri:noCountry code="no comma">Saarland University</wicri:noCountry>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: mhamerli@cs.uni-sb.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Linari, Alessandro" sort="Linari, Alessandro" uniqKey="Linari A" first="Alessandro" last="Linari">Alessandro Linari</name>
<affiliation wicri:level="1"><mods:affiliation>Oxford Brookes University & Nominet, UK</mods:affiliation>
<country xml:lang="fr">Royaume-Uni</country>
<wicri:regionArea>Oxford Brookes University & Nominet</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: alessandro@nominet.org.uk</mods:affiliation>
<country wicri:rule="url">Royaume-Uni</country>
</affiliation>
</author>
<author><name sortKey="Maffei, Matteo" sort="Maffei, Matteo" uniqKey="Maffei M" first="Matteo" last="Maffei">Matteo Maffei</name>
<affiliation><mods:affiliation>Saarland University</mods:affiliation>
<wicri:noCountry code="no comma">Saarland University</wicri:noCountry>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: maffei@cs.uni-sb.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Tryfonopoulos, Christos" sort="Tryfonopoulos, Christos" uniqKey="Tryfonopoulos C" first="Christos" last="Tryfonopoulos">Christos Tryfonopoulos</name>
<affiliation><mods:affiliation>Max Planck Institut für Informatik</mods:affiliation>
<wicri:noCountry code="no comma">Max Planck Institut für Informatik</wicri:noCountry>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: trifon@mpi-inf.mpg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Weikum, Gerhard" sort="Weikum, Gerhard" uniqKey="Weikum G" first="Gerhard" last="Weikum">Gerhard Weikum</name>
<affiliation><mods:affiliation>Max Planck Institut für Informatik</mods:affiliation>
<wicri:noCountry code="no comma">Max Planck Institut für Informatik</wicri:noCountry>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: weikum@mpi-inf.mpg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:85E7846654A163C360D11073FD9455D5794F317F</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-05148-7_12</idno>
<idno type="url">https://api.istex.fr/document/85E7846654A163C360D11073FD9455D5794F317F/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000D88</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000D88</idno>
<idno type="wicri:Area/Istex/Curation">000D21</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Anonymity and Censorship Resistance in Unstructured Overlay Networks</title>
<author><name sortKey="Backes, Michael" sort="Backes, Michael" uniqKey="Backes M" first="Michael" last="Backes">Michael Backes</name>
<affiliation><mods:affiliation>Saarland University & MPI-SWS</mods:affiliation>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: backes@cs.uni-sb.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Hamerlik, Marek" sort="Hamerlik, Marek" uniqKey="Hamerlik M" first="Marek" last="Hamerlik">Marek Hamerlik</name>
<affiliation><mods:affiliation>Saarland University</mods:affiliation>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: mhamerli@cs.uni-sb.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Linari, Alessandro" sort="Linari, Alessandro" uniqKey="Linari A" first="Alessandro" last="Linari">Alessandro Linari</name>
<affiliation wicri:level="1"><mods:affiliation>Oxford Brookes University & Nominet, UK</mods:affiliation>
<country xml:lang="fr">Royaume-Uni</country>
<wicri:regionArea>Oxford Brookes University & Nominet</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: alessandro@nominet.org.uk</mods:affiliation>
<country wicri:rule="url">Royaume-Uni</country>
</affiliation>
</author>
<author><name sortKey="Maffei, Matteo" sort="Maffei, Matteo" uniqKey="Maffei M" first="Matteo" last="Maffei">Matteo Maffei</name>
<affiliation><mods:affiliation>Saarland University</mods:affiliation>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: maffei@cs.uni-sb.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Tryfonopoulos, Christos" sort="Tryfonopoulos, Christos" uniqKey="Tryfonopoulos C" first="Christos" last="Tryfonopoulos">Christos Tryfonopoulos</name>
<affiliation><mods:affiliation>Max Planck Institut für Informatik</mods:affiliation>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: trifon@mpi-inf.mpg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Weikum, Gerhard" sort="Weikum, Gerhard" uniqKey="Weikum G" first="Gerhard" last="Weikum">Gerhard Weikum</name>
<affiliation><mods:affiliation>Max Planck Institut für Informatik</mods:affiliation>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: weikum@mpi-inf.mpg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2009</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="Teeft" xml:lang="en"><term>Algorithm</term>
<term>Anonymity</term>
<term>Anonymity degree</term>
<term>Anonymous communication</term>
<term>Appropriate cluster</term>
<term>Attack scenarios</term>
<term>Attackers need</term>
<term>Average number</term>
<term>Backes</term>
<term>Baseline value</term>
<term>Best strategy</term>
<term>Broadcast threshold</term>
<term>Cardinality</term>
<term>Censorship</term>
<term>Censorship resistance</term>
<term>Censorship resistance properties</term>
<term>Centralised infrastructures</term>
<term>Cloud</term>
<term>Cloud creation</term>
<term>Cloud creation algorithm</term>
<term>Cloud creation process</term>
<term>Cloud intersections</term>
<term>Cloud locality</term>
<term>Cloud size</term>
<term>Cloud topology</term>
<term>Colluding attackers</term>
<term>Communication channel</term>
<term>Communication level</term>
<term>Communication protocol</term>
<term>Communications security</term>
<term>Cryptographic protocol</term>
<term>Data communications</term>
<term>Data model</term>
<term>Destination cloud</term>
<term>Different attack scenarios</term>
<term>Different attacks</term>
<term>Direct connections</term>
<term>Encrypted messages</term>
<term>Experimental evaluation</term>
<term>Experimental results</term>
<term>Extra message</term>
<term>Footprint</term>
<term>Footprint list</term>
<term>Future work</term>
<term>Guarantee anonymity</term>
<term>High cardinality</term>
<term>Honest participants</term>
<term>Honest peers</term>
<term>Important observation</term>
<term>Information exchange</term>
<term>Information providers</term>
<term>Information retrieval</term>
<term>Information systems</term>
<term>Initiator</term>
<term>Interesting observation</term>
<term>International conference</term>
<term>International workshop</term>
<term>Intersection attack</term>
<term>Intersection attacks</term>
<term>Intersection cardinality</term>
<term>Intersections intersections</term>
<term>Joincloud messages</term>
<term>Large fraction</term>
<term>Last steps</term>
<term>Last years</term>
<term>Limited broadcast</term>
<term>Malicious</term>
<term>Malicious peer</term>
<term>Malicious peers</term>
<term>Mdata</term>
<term>Mdata messages</term>
<term>Message content</term>
<term>Message history</term>
<term>Neighbour</term>
<term>Other approaches</term>
<term>Other neighbours</term>
<term>Other peers</term>
<term>Overlay</term>
<term>Overlay network</term>
<term>Overlay networks</term>
<term>Peer</term>
<term>Protocol</term>
<term>Provider</term>
<term>Publishing system</term>
<term>Query</term>
<term>Query language</term>
<term>Query message</term>
<term>Random value</term>
<term>Resource</term>
<term>Resource description</term>
<term>Resource provider</term>
<term>Resource providers</term>
<term>Retrieval</term>
<term>Retrieval capabilities</term>
<term>Rich data model</term>
<term>Scenario</term>
<term>Search functionality</term>
<term>Search infrastructure</term>
<term>Security guarantees</term>
<term>Security properties</term>
<term>Semantic correlation</term>
<term>Semantic overlay networks</term>
<term>Server</term>
<term>Similar peers</term>
<term>Similarity function</term>
<term>Single topic</term>
<term>Social network</term>
<term>Social networking</term>
<term>Social networks</term>
<term>Special interest group</term>
<term>Static paths</term>
<term>Step numbe</term>
<term>Subsequent messages</term>
<term>Sybil</term>
<term>Sybil attack</term>
<term>Sybil attacks</term>
<term>System security</term>
<term>Trust relationships</term>
<term>Ubmit</term>
<term>Unstructured networks</term>
<term>Unstructured overlay network</term>
<term>Unstructured overlay networks</term>
<term>Usenix security symposium</term>
</keywords>
</textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: This paper presents Clouds, a peer-to-peer protocol that guarantees both anonymity and censorship resistance in semantic overlay networks. The design of such a protocol needs to meet a number of challenging goals: enabling the exchange of encrypted messages without assuming previously shared secrets, avoiding centralised infrastructures, like trusted servers or gateways, and guaranteeing efficiency without establishing direct connections between peers. Anonymity is achieved by cloaking the identity of protocol participants behind groups of semantically close peers. Censorship resistance is guaranteed by a cryptographic protocol securing the anonymous communication between the querying peer and the resource provider. Although we instantiate our technique on semantic overlay networks to exploit their retrieval capabilities, our framework is general and can be applied to any unstructured overlay network. Experimental results demonstrate the security properties of Clouds under different attacks and show the message overhead and retrieval effectiveness of the protocol.</div>
</front>
</TEI>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Sarre/explor/MusicSarreV3/Data/Istex/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000D21 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Istex/Curation/biblio.hfd -nk 000D21 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Sarre |area= MusicSarreV3 |flux= Istex |étape= Curation |type= RBID |clé= ISTEX:85E7846654A163C360D11073FD9455D5794F317F |texte= Anonymity and Censorship Resistance in Unstructured Overlay Networks }}
This area was generated with Dilib version V0.6.33. |