2013 IEEE International Workshop on Information Forensics and Security (WIFS) 2013
DOI: 10.1109/wifs.2013.6707798
|View full text |Cite
|
Sign up to set email alerts
|

Building a privacy-preserving semantic overlay for Peer-to-Peer networks

Abstract: Access to the full text of the published version may require a subscription. Abstract-Searching a Peer-to-Peer (P2P) network without using a central index has been widely investigated but proved to be very difficult. Various strategies have been proposed, however no practical solution to date also addresses privacy concerns. RightsBy clustering peers which have similar interests, a semantic overlay provides a method for achieving scalable search. Traditionally, in order to find similar peers, a peer is require… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…For instance, with homomorphic encryption -proposed by Rivest et al in 1978 [20] -a node can carry out computations on encrypted values, without needing to decrypt them first. In [21] and PrivHab+ [22], privacy-preserving routing protocols based on additive homomorphic encryption (Paillier cryptosystem [23]) were proposed. The former, which was proposed for peer-to-peer networks, allowed a node to calculate its similarity to other nodes using multivariate polynomial evaluation, meanwhile, the latter, which was proposed as a secure geographical routing protocol for DTNs, allowed nodes to compare their habitats in order to choose the best forwarder for every message, respectively.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, with homomorphic encryption -proposed by Rivest et al in 1978 [20] -a node can carry out computations on encrypted values, without needing to decrypt them first. In [21] and PrivHab+ [22], privacy-preserving routing protocols based on additive homomorphic encryption (Paillier cryptosystem [23]) were proposed. The former, which was proposed for peer-to-peer networks, allowed a node to calculate its similarity to other nodes using multivariate polynomial evaluation, meanwhile, the latter, which was proposed as a secure geographical routing protocol for DTNs, allowed nodes to compare their habitats in order to choose the best forwarder for every message, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…The mechanism addresses the PSI problem [21] by allowing a node, say A, to calculate its similarity to another node, say B, in a private manner.…”
Section: B Anonymization Of the Neighboring Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…This naïve approach scales very poorly in large networks. For this reason, several alternative approaches have been proposed and implemented in subsequent networks that modify the flooding behaviour [29]. The main issue with network flooding is the high network use it can generate.…”
Section: F Performance Considerationsmentioning
confidence: 99%