[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

The Free Haven Project: Distributed Anonymous Storage Service

  • Chapter
  • First Online:
Designing Privacy Enhancing Technologies

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2009))

Abstract

We present a design for a system of anonymous storage which resists the attempts of powerful adversaries to find or destroy any stored data. We enumerate distinct notions of anonymity for each party in the system, and suggest a way to classify anonymous systems based on the kinds of anonymity provided. Our design ensures the availability of each document for a publisher-specified lifetime. A reputation system provides server accountability by limiting the damage caused from misbehaving servers. We identify attacks and defenses against anonymous storage services, and close with a list of problems which are currently unsolved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Masayuki Abe. Universally verifiable mix-net with verification work independent of the number of servers. In Advances in Cryptology-EUROCRYPT’ 98, pages 437–447.

    Google Scholar 

  2. Ross Anderson. The Eternity Service. http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.

  3. Adam Back. The Eternity Service. http://phrack.infonexus.com/search.phtml?view&article=p51-12.

  4. Adam Back. Re: another distributed project. http://freehaven.net/archives/freehaven/dev/Aug-2000/msg00027.html.

  5. Oliver Berthold, Hannes Federrath, and Marit Kohntopp. Anonymity and unob-servability on the Internet. In Workshop on Freedom and Privacy by Design: CFP 2000, 2000.

    Google Scholar 

  6. Ran Canetti, Cynthia Dwork, Moni Naor, and Rafail Ostrovsky. Deniable encryption. In Advances in Cryptology-CRYPTO’ 97.

    Google Scholar 

  7. David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1982.

    Google Scholar 

  8. David Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65–75, 1988.

    Article  MATH  MathSciNet  Google Scholar 

  9. Yuan Chen, Jan Edler, Andrew Goldberg, Allan Gottlieb, Sumeet Sobti, and Peter Yianilos. A prototype implementation of archival intermemory. In Proceedings of the fourth ACM Conference on Digital libraries (DL’ 99), 1999.

    Google Scholar 

  10. Ian Clarke. The Free Network Project. http://freenet.sourceforge.net/.

  11. The Cleaner. Gnutella wall of shame. http://www.zeropaid.com/busted/.

  12. Roger Dingledine. The Free Haven Project. Master’s thesis, MIT, 2000.

    Google Scholar 

  13. Roger Dingledine, Michael J. Freedman, and David Molnar. Accountability. In Peer-to-peer. O’Reilly and Associates, 2001.

    Google Scholar 

  14. Ian Hall-Beyer et. al. Gnutella. http://gnutella.wego.com/.

  15. Michael J. Freedman. Design and Analysis of an Anonymous Communication Channel for the Free Haven Project. http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.

  16. Electronic Frontiers Georgia (EFGA). Anonymous remailer information. http://anon.efga.org/Remailers/.

  17. Ian Goldberg and Adam Shostack. Freedom network 1.0 architecture, November 1999.

    Google Scholar 

  18. Ian Goldberg, David Wagner, and Eric Brewer. Privacy-enhancing technologies for the internet. In Proceedings of IEEE COMPCON’ 97.

    Google Scholar 

  19. O. Goldreich, S. Even, and Lempel. A randomized protocol for signing contracts. In Advances in Cryptology-CRYPTO’ 82.

    Google Scholar 

  20. Oded Goldreich. Modern Cryptography, Probabilistic Proofs, and Pseudo-Randomness. Springer-Verlag, 1999.

    Google Scholar 

  21. C. Gulcu and G. Tsudik. Mixing e-mail with Babel. In Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 2–16, 1996.

    Google Scholar 

  22. Autonomous Zone Industries. Mojonation. http://www.mojonation.com/.

  23. M. Jakobsson. Flash mixing. In Principles of Distributed Computing PODC’ 99.

    Google Scholar 

  24. M. Jakobsson. A practical mix. In Advances in Cryptology-EUROCRYPT’ 98.

    Google Scholar 

  25. Ari Juels and John Brainard. Client puzzles: A cryptographic defense against connection depletion attacks. In Proceedings of the 1999 Network and Distributed System Security Symposium, February 1999.

    Google Scholar 

  26. Clifford Kahn, David Black, and Paul Dale. MANET: Mobile agents for network trust. http://www.darpa.mil/ito/psum1998/F255-0.html, 1998.

  27. Dogan Kesdogan, Jan Egner, and Roland Buschkes. Stop and go mixes: Providing probabilistic anonymity in an open system. In 1998 Information Hiding Workshop, pages 83–98.

    Google Scholar 

  28. Raph Levien. Advogato’s trust metric. http://www.advogato.org/trust-metric.html.

  29. Mark Lewis. Metallica sues Napster, universities, citing copyright infringement and RICO violations. http://www.livedaily.com/archive/2000/2k04/wk2/MetallicaSuesNapster,Univ.html.

  30. Tal Malkin. Private Information Retrieval. PhD thesis, MIT. see http://theory.lcs.mit.edu/cis/cis-theses.html.

  31. Tim May. Cyphernomicon. http://www2.pro-ns.net/crypto/cyphernomicon.html.

  32. David Mazieres and M. Frans Kaashoek. The design and operation of an e-mail pseudonym server. In 5th ACM Conference on Computer and Communications Security, 1998.

    Google Scholar 

  33. S. Micali. Certified e-mail with invisible post-offices. In Talk at RSA’ 97.

    Google Scholar 

  34. University of Michigan News and Information Services. Yugoslav phone books: perhaps the last record of a people. http://www.umich.edu/~newsinfo/Releases/2000/Jan00/r012000e.html.

  35. A. Pfitzmann, B. Pfitzmann, and M. Waidner. ISDN-Mixes: Untraceable communication with small bandwidth overhead. In GI/ITG Conference: Communication in Distributed Systems, pages 451–463. Springer-Verlag, 1991.

    Google Scholar 

  36. Michael O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance, April 1989.

    Google Scholar 

  37. Michael K. Reiter and Aviel D. Rubin. Crowds: Anonymity for web transactions. DIMACS Technical Report, 97(15), April 1997.

    Google Scholar 

  38. Simon and Rackoff. Cryptographic defense against traffic analysis. In STOC 1993, pages 672–681, 1993.

    Google Scholar 

  39. Brian T. Sniffen. Trust Economies in the Free Haven Project. http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.

  40. Markus Stadler. Publicly verifiable secret sharing. In EUROCRYPT’ 96, 1996. http://citeseer.nj.nec.com/stadler96publicly.html.

  41. Steve Steinberg. Gnutellanet maps. http://gnutella.wego.com/file depot/0-10000000/110000-120000/116705/folder/151713/network3.jpg.

  42. Paul Syverson and Stuart Stubblebine. Group principals and the formalization of anonymity. In World Congress on Formal Methods 1999, 1999.

    Google Scholar 

  43. P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997.

    Google Scholar 

  44. Vernor Vinge. True Names. Short story.

    Google Scholar 

  45. Marc Waldman, Aviel Rubin, and Lorrie Cranor. Publius: A robust, tamperevident, censorship-resistant and source-anonymous web publishing system.

    Google Scholar 

  46. Alma Whitten and J. D. Tygar. Why johnny can’t encrypt. In USENIX Security 1999, 1999. http://www.usenix.org/publications/library/proceedings/sec99/whitten.html.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Dingledine, R., Freedman, M.J., Molnar, D. (2001). The Free Haven Project: Distributed Anonymous Storage Service. In: Federrath, H. (eds) Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol 2009. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44702-4_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-44702-4_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41724-8

  • Online ISBN: 978-3-540-44702-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics