Abstract
A fundamental problem in a pure Peer-to-Peer (P2P) file sharing system is how to protect the anonymity of nodes when providing efficient data access services. By seamlessly combining the technologies of multi-proxy and IP multicast together, we propose a multicast-based protocol for efficient file sharing with mutual anonymity in this paper. Furthermore, the proposed protocol can adaptively adjust file distribution and reduce the multicast cost simultaneously. The simulations show that Mapper possesses the merits of scalability, reliability, and high adaptability with high performance.
This work is partially supported by the National 973 Program of China under Grant No. 2002CB312002 and the National High-Tech Research and Development 863 Program of China under Grant No. 2001AA113050.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Milojicic, D., Kalogeraki, S., Lukose, V.R., et al.: Peer to Peer Computing, Technical Report: HPL-2002-57 (March 2002)
Shields, C., Levine, B.N.: A Protocol for Anonymous Communication Over the Internet. In: Proc. 7th ACM Conference on Computer and Communication Security (ACM CCS 2000) (November 2000)
Dingledine, R., Freedman, M.J., Molnar, D.: The free heven project: Distributed anonymous storage service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, p. 67. Springer, Heidelberg (2001)
Anonymizer, http://www.anonymizer.com/
Gabber, E., Gibbons, P., Kristol, D., et al.: Consistent, yet anonymous, Web access with LPWA. Communications of the ACM 42, 2 (1999)
Reed, M., Syverson, P., Goldschlag, D.: Proxies for anonymous routing. In: 12th Annual Computer Security Applications Conference, December 1995, pp. 95–104. IEEE, Los Alamitos (1995)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital pseudonyms. Communications of the ACM 24(2) (1981)
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California (2000)
Scarlata, V., Levine, B.N., Shields, C.: Responder Anonymity and Anonymous Peer-to- Peer File Sharing. In: Proceedings of the IEEE Intl. Conference on Network Protocols (ICNP) 2001 (November 2001)
Shirky, C.: Listening to Napster. In: Oram, A. (ed.) Peer-to-Peer:Harnessing the Benefits of a Disruptive Technology, O’Reilly and Associates, Inc., Sebastopol (2001)
Clips, Gnutella Protocol Specifications, V. 0.4, http://www.clips2.com
American National Standards Institute, American National Standard X9.30.2-1997: Public Key Cryptography for the Financial Services Industry – Part 2: The Secure Hash Algorithm (SHA-1) (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ye, B., Zhou, J., Zhang, Y., Cao, J., Chen, D. (2004). An Efficient Protocol for Peer-to-Peer File Sharing with Mutual Anonymity. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004. GCC 2004. Lecture Notes in Computer Science, vol 3251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30208-7_89
Download citation
DOI: https://doi.org/10.1007/978-3-540-30208-7_89
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23564-4
Online ISBN: 978-3-540-30208-7
eBook Packages: Springer Book Archive