Serveur d'exploration sur la musique en Sarre

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Anonymity and Censorship Resistance in Unstructured Overlay Networks

Identifieur interne : 000597 ( Main/Exploration ); précédent : 000596; suivant : 000598

Anonymity and Censorship Resistance in Unstructured Overlay Networks

Auteurs : Michael Backes [Allemagne] ; Marek Hamerlik [Allemagne] ; Alessandro Linari [Royaume-Uni] ; Matteo Maffei [Allemagne] ; Christos Tryfonopoulos [Allemagne] ; Gerhard Weikum [Allemagne]

Source :

RBID : ISTEX:85E7846654A163C360D11073FD9455D5794F317F

English descriptors

Abstract

Abstract: This paper presents Clouds, a peer-to-peer protocol that guarantees both anonymity and censorship resistance in semantic overlay networks. The design of such a protocol needs to meet a number of challenging goals: enabling the exchange of encrypted messages without assuming previously shared secrets, avoiding centralised infrastructures, like trusted servers or gateways, and guaranteeing efficiency without establishing direct connections between peers. Anonymity is achieved by cloaking the identity of protocol participants behind groups of semantically close peers. Censorship resistance is guaranteed by a cryptographic protocol securing the anonymous communication between the querying peer and the resource provider. Although we instantiate our technique on semantic overlay networks to exploit their retrieval capabilities, our framework is general and can be applied to any unstructured overlay network. Experimental results demonstrate the security properties of Clouds under different attacks and show the message overhead and retrieval effectiveness of the protocol.

Url:
DOI: 10.1007/978-3-642-05148-7_12


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Anonymity and Censorship Resistance in Unstructured Overlay Networks</title>
<author>
<name sortKey="Backes, Michael" sort="Backes, Michael" uniqKey="Backes M" first="Michael" last="Backes">Michael Backes</name>
</author>
<author>
<name sortKey="Hamerlik, Marek" sort="Hamerlik, Marek" uniqKey="Hamerlik M" first="Marek" last="Hamerlik">Marek Hamerlik</name>
</author>
<author>
<name sortKey="Linari, Alessandro" sort="Linari, Alessandro" uniqKey="Linari A" first="Alessandro" last="Linari">Alessandro Linari</name>
</author>
<author>
<name sortKey="Maffei, Matteo" sort="Maffei, Matteo" uniqKey="Maffei M" first="Matteo" last="Maffei">Matteo Maffei</name>
</author>
<author>
<name sortKey="Tryfonopoulos, Christos" sort="Tryfonopoulos, Christos" uniqKey="Tryfonopoulos C" first="Christos" last="Tryfonopoulos">Christos Tryfonopoulos</name>
</author>
<author>
<name sortKey="Weikum, Gerhard" sort="Weikum, Gerhard" uniqKey="Weikum G" first="Gerhard" last="Weikum">Gerhard Weikum</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:85E7846654A163C360D11073FD9455D5794F317F</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-05148-7_12</idno>
<idno type="url">https://api.istex.fr/document/85E7846654A163C360D11073FD9455D5794F317F/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000D88</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000D88</idno>
<idno type="wicri:Area/Istex/Curation">000D21</idno>
<idno type="wicri:Area/Istex/Checkpoint">000434</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000434</idno>
<idno type="wicri:doubleKey">0302-9743:2009:Backes M:anonymity:and:censorship</idno>
<idno type="wicri:Area/Main/Merge">000597</idno>
<idno type="wicri:Area/Main/Curation">000597</idno>
<idno type="wicri:Area/Main/Exploration">000597</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Anonymity and Censorship Resistance in Unstructured Overlay Networks</title>
<author>
<name sortKey="Backes, Michael" sort="Backes, Michael" uniqKey="Backes M" first="Michael" last="Backes">Michael Backes</name>
<affiliation></affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Hamerlik, Marek" sort="Hamerlik, Marek" uniqKey="Hamerlik M" first="Marek" last="Hamerlik">Marek Hamerlik</name>
<affiliation></affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Linari, Alessandro" sort="Linari, Alessandro" uniqKey="Linari A" first="Alessandro" last="Linari">Alessandro Linari</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Royaume-Uni</country>
<wicri:regionArea>Oxford Brookes University & Nominet</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Royaume-Uni</country>
</affiliation>
</author>
<author>
<name sortKey="Maffei, Matteo" sort="Maffei, Matteo" uniqKey="Maffei M" first="Matteo" last="Maffei">Matteo Maffei</name>
<affiliation></affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Tryfonopoulos, Christos" sort="Tryfonopoulos, Christos" uniqKey="Tryfonopoulos C" first="Christos" last="Tryfonopoulos">Christos Tryfonopoulos</name>
<affiliation></affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Weikum, Gerhard" sort="Weikum, Gerhard" uniqKey="Weikum G" first="Gerhard" last="Weikum">Gerhard Weikum</name>
<affiliation></affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2009</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="Teeft" xml:lang="en">
<term>Algorithm</term>
<term>Anonymity</term>
<term>Anonymity degree</term>
<term>Anonymous communication</term>
<term>Appropriate cluster</term>
<term>Attack scenarios</term>
<term>Attackers need</term>
<term>Average number</term>
<term>Backes</term>
<term>Baseline value</term>
<term>Best strategy</term>
<term>Broadcast threshold</term>
<term>Cardinality</term>
<term>Censorship</term>
<term>Censorship resistance</term>
<term>Censorship resistance properties</term>
<term>Centralised infrastructures</term>
<term>Cloud</term>
<term>Cloud creation</term>
<term>Cloud creation algorithm</term>
<term>Cloud creation process</term>
<term>Cloud intersections</term>
<term>Cloud locality</term>
<term>Cloud size</term>
<term>Cloud topology</term>
<term>Colluding attackers</term>
<term>Communication channel</term>
<term>Communication level</term>
<term>Communication protocol</term>
<term>Communications security</term>
<term>Cryptographic protocol</term>
<term>Data communications</term>
<term>Data model</term>
<term>Destination cloud</term>
<term>Different attack scenarios</term>
<term>Different attacks</term>
<term>Direct connections</term>
<term>Encrypted messages</term>
<term>Experimental evaluation</term>
<term>Experimental results</term>
<term>Extra message</term>
<term>Footprint</term>
<term>Footprint list</term>
<term>Future work</term>
<term>Guarantee anonymity</term>
<term>High cardinality</term>
<term>Honest participants</term>
<term>Honest peers</term>
<term>Important observation</term>
<term>Information exchange</term>
<term>Information providers</term>
<term>Information retrieval</term>
<term>Information systems</term>
<term>Initiator</term>
<term>Interesting observation</term>
<term>International conference</term>
<term>International workshop</term>
<term>Intersection attack</term>
<term>Intersection attacks</term>
<term>Intersection cardinality</term>
<term>Intersections intersections</term>
<term>Joincloud messages</term>
<term>Large fraction</term>
<term>Last steps</term>
<term>Last years</term>
<term>Limited broadcast</term>
<term>Malicious</term>
<term>Malicious peer</term>
<term>Malicious peers</term>
<term>Mdata</term>
<term>Mdata messages</term>
<term>Message content</term>
<term>Message history</term>
<term>Neighbour</term>
<term>Other approaches</term>
<term>Other neighbours</term>
<term>Other peers</term>
<term>Overlay</term>
<term>Overlay network</term>
<term>Overlay networks</term>
<term>Peer</term>
<term>Protocol</term>
<term>Provider</term>
<term>Publishing system</term>
<term>Query</term>
<term>Query language</term>
<term>Query message</term>
<term>Random value</term>
<term>Resource</term>
<term>Resource description</term>
<term>Resource provider</term>
<term>Resource providers</term>
<term>Retrieval</term>
<term>Retrieval capabilities</term>
<term>Rich data model</term>
<term>Scenario</term>
<term>Search functionality</term>
<term>Search infrastructure</term>
<term>Security guarantees</term>
<term>Security properties</term>
<term>Semantic correlation</term>
<term>Semantic overlay networks</term>
<term>Server</term>
<term>Similar peers</term>
<term>Similarity function</term>
<term>Single topic</term>
<term>Social network</term>
<term>Social networking</term>
<term>Social networks</term>
<term>Special interest group</term>
<term>Static paths</term>
<term>Step numbe</term>
<term>Subsequent messages</term>
<term>Sybil</term>
<term>Sybil attack</term>
<term>Sybil attacks</term>
<term>System security</term>
<term>Trust relationships</term>
<term>Ubmit</term>
<term>Unstructured networks</term>
<term>Unstructured overlay network</term>
<term>Unstructured overlay networks</term>
<term>Usenix security symposium</term>
</keywords>
</textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: This paper presents Clouds, a peer-to-peer protocol that guarantees both anonymity and censorship resistance in semantic overlay networks. The design of such a protocol needs to meet a number of challenging goals: enabling the exchange of encrypted messages without assuming previously shared secrets, avoiding centralised infrastructures, like trusted servers or gateways, and guaranteeing efficiency without establishing direct connections between peers. Anonymity is achieved by cloaking the identity of protocol participants behind groups of semantically close peers. Censorship resistance is guaranteed by a cryptographic protocol securing the anonymous communication between the querying peer and the resource provider. Although we instantiate our technique on semantic overlay networks to exploit their retrieval capabilities, our framework is general and can be applied to any unstructured overlay network. Experimental results demonstrate the security properties of Clouds under different attacks and show the message overhead and retrieval effectiveness of the protocol.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Allemagne</li>
<li>Royaume-Uni</li>
</country>
</list>
<tree>
<country name="Allemagne">
<noRegion>
<name sortKey="Backes, Michael" sort="Backes, Michael" uniqKey="Backes M" first="Michael" last="Backes">Michael Backes</name>
</noRegion>
<name sortKey="Hamerlik, Marek" sort="Hamerlik, Marek" uniqKey="Hamerlik M" first="Marek" last="Hamerlik">Marek Hamerlik</name>
<name sortKey="Maffei, Matteo" sort="Maffei, Matteo" uniqKey="Maffei M" first="Matteo" last="Maffei">Matteo Maffei</name>
<name sortKey="Tryfonopoulos, Christos" sort="Tryfonopoulos, Christos" uniqKey="Tryfonopoulos C" first="Christos" last="Tryfonopoulos">Christos Tryfonopoulos</name>
<name sortKey="Weikum, Gerhard" sort="Weikum, Gerhard" uniqKey="Weikum G" first="Gerhard" last="Weikum">Gerhard Weikum</name>
</country>
<country name="Royaume-Uni">
<noRegion>
<name sortKey="Linari, Alessandro" sort="Linari, Alessandro" uniqKey="Linari A" first="Alessandro" last="Linari">Alessandro Linari</name>
</noRegion>
<name sortKey="Linari, Alessandro" sort="Linari, Alessandro" uniqKey="Linari A" first="Alessandro" last="Linari">Alessandro Linari</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Sarre/explor/MusicSarreV3/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000597 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000597 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Sarre
   |area=    MusicSarreV3
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:85E7846654A163C360D11073FD9455D5794F317F
   |texte=   Anonymity and Censorship Resistance in Unstructured Overlay Networks
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Sun Jul 15 18:16:09 2018. Site generation: Tue Mar 5 19:21:25 2024