Abstract
We present a design for a system of anonymous storage which resists the attempts of powerful adversaries to find or destroy any stored data. We enumerate distinct notions of anonymity for each party in the system, and suggest a way to classify anonymous systems based on the kinds of anonymity provided. Our design ensures the availability of each document for a publisher-specified lifetime. A reputation system provides server accountability by limiting the damage caused from misbehaving servers. We identify attacks and defenses against anonymous storage services, and close with a list of problems which are currently unsolved.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Masayuki Abe. Universally verifiable mix-net with verification work independent of the number of servers. In Advances in Cryptology-EUROCRYPT’ 98, pages 437–447.
Ross Anderson. The Eternity Service. http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.
Adam Back. The Eternity Service. http://phrack.infonexus.com/search.phtml?view&article=p51-12.
Adam Back. Re: another distributed project. http://freehaven.net/archives/freehaven/dev/Aug-2000/msg00027.html.
Oliver Berthold, Hannes Federrath, and Marit Kohntopp. Anonymity and unob-servability on the Internet. In Workshop on Freedom and Privacy by Design: CFP 2000, 2000.
Ran Canetti, Cynthia Dwork, Moni Naor, and Rafail Ostrovsky. Deniable encryption. In Advances in Cryptology-CRYPTO’ 97.
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1982.
David Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65–75, 1988.
Yuan Chen, Jan Edler, Andrew Goldberg, Allan Gottlieb, Sumeet Sobti, and Peter Yianilos. A prototype implementation of archival intermemory. In Proceedings of the fourth ACM Conference on Digital libraries (DL’ 99), 1999.
Ian Clarke. The Free Network Project. http://freenet.sourceforge.net/.
The Cleaner. Gnutella wall of shame. http://www.zeropaid.com/busted/.
Roger Dingledine. The Free Haven Project. Master’s thesis, MIT, 2000.
Roger Dingledine, Michael J. Freedman, and David Molnar. Accountability. In Peer-to-peer. O’Reilly and Associates, 2001.
Ian Hall-Beyer et. al. Gnutella. http://gnutella.wego.com/.
Michael J. Freedman. Design and Analysis of an Anonymous Communication Channel for the Free Haven Project. http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.
Electronic Frontiers Georgia (EFGA). Anonymous remailer information. http://anon.efga.org/Remailers/.
Ian Goldberg and Adam Shostack. Freedom network 1.0 architecture, November 1999.
Ian Goldberg, David Wagner, and Eric Brewer. Privacy-enhancing technologies for the internet. In Proceedings of IEEE COMPCON’ 97.
O. Goldreich, S. Even, and Lempel. A randomized protocol for signing contracts. In Advances in Cryptology-CRYPTO’ 82.
Oded Goldreich. Modern Cryptography, Probabilistic Proofs, and Pseudo-Randomness. Springer-Verlag, 1999.
C. Gulcu and G. Tsudik. Mixing e-mail with Babel. In Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 2–16, 1996.
Autonomous Zone Industries. Mojonation. http://www.mojonation.com/.
M. Jakobsson. Flash mixing. In Principles of Distributed Computing PODC’ 99.
M. Jakobsson. A practical mix. In Advances in Cryptology-EUROCRYPT’ 98.
Ari Juels and John Brainard. Client puzzles: A cryptographic defense against connection depletion attacks. In Proceedings of the 1999 Network and Distributed System Security Symposium, February 1999.
Clifford Kahn, David Black, and Paul Dale. MANET: Mobile agents for network trust. http://www.darpa.mil/ito/psum1998/F255-0.html, 1998.
Dogan Kesdogan, Jan Egner, and Roland Buschkes. Stop and go mixes: Providing probabilistic anonymity in an open system. In 1998 Information Hiding Workshop, pages 83–98.
Raph Levien. Advogato’s trust metric. http://www.advogato.org/trust-metric.html.
Mark Lewis. Metallica sues Napster, universities, citing copyright infringement and RICO violations. http://www.livedaily.com/archive/2000/2k04/wk2/MetallicaSuesNapster,Univ.html.
Tal Malkin. Private Information Retrieval. PhD thesis, MIT. see http://theory.lcs.mit.edu/cis/cis-theses.html.
Tim May. Cyphernomicon. http://www2.pro-ns.net/crypto/cyphernomicon.html.
David Mazieres and M. Frans Kaashoek. The design and operation of an e-mail pseudonym server. In 5th ACM Conference on Computer and Communications Security, 1998.
S. Micali. Certified e-mail with invisible post-offices. In Talk at RSA’ 97.
University of Michigan News and Information Services. Yugoslav phone books: perhaps the last record of a people. http://www.umich.edu/~newsinfo/Releases/2000/Jan00/r012000e.html.
A. Pfitzmann, B. Pfitzmann, and M. Waidner. ISDN-Mixes: Untraceable communication with small bandwidth overhead. In GI/ITG Conference: Communication in Distributed Systems, pages 451–463. Springer-Verlag, 1991.
Michael O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance, April 1989.
Michael K. Reiter and Aviel D. Rubin. Crowds: Anonymity for web transactions. DIMACS Technical Report, 97(15), April 1997.
Simon and Rackoff. Cryptographic defense against traffic analysis. In STOC 1993, pages 672–681, 1993.
Brian T. Sniffen. Trust Economies in the Free Haven Project. http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.
Markus Stadler. Publicly verifiable secret sharing. In EUROCRYPT’ 96, 1996. http://citeseer.nj.nec.com/stadler96publicly.html.
Steve Steinberg. Gnutellanet maps. http://gnutella.wego.com/file depot/0-10000000/110000-120000/116705/folder/151713/network3.jpg.
Paul Syverson and Stuart Stubblebine. Group principals and the formalization of anonymity. In World Congress on Formal Methods 1999, 1999.
P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997.
Vernor Vinge. True Names. Short story.
Marc Waldman, Aviel Rubin, and Lorrie Cranor. Publius: A robust, tamperevident, censorship-resistant and source-anonymous web publishing system.
Alma Whitten and J. D. Tygar. Why johnny can’t encrypt. In USENIX Security 1999, 1999. http://www.usenix.org/publications/library/proceedings/sec99/whitten.html.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Dingledine, R., Freedman, M.J., Molnar, D. (2001). The Free Haven Project: Distributed Anonymous Storage Service. In: Federrath, H. (eds) Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol 2009. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44702-4_5
Download citation
DOI: https://doi.org/10.1007/3-540-44702-4_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41724-8
Online ISBN: 978-3-540-44702-3
eBook Packages: Springer Book Archive