2006
DOI: 10.1007/11957454_11
|View full text |Cite
|
Sign up to set email alerts
|

Improving Sender Anonymity in a Structured Overlay with Imprecise Routing

Abstract: In the framework of peer to peer distributed systems, the problem of anonymity in structured overlay networks remains a quite elusive one. It is especially unclear how to evaluate and improve sender anonymity, that is, untraceability of the peers who issue messages to other participants in the overlay. In a structured overlay organized as a chordal ring, we have found that a technique originally developed for recipient anonymity also improves sender anonymity. The technique is based on the use of imprecise ent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 41 publications
0
10
0
Order By: Relevance
“…Borisov [5] proposed an anonymous DHT based on Koorde [24], which performs a randomized routing phase before an actual lookup. Ciaccio [8] proposed the use of imprecise routing in DHTs to improve sender anonymity. These lookups were designed to be anonymous, but not secure: an active adversary could easily subvert the path of the lookup.…”
Section: Related Workmentioning
confidence: 99%
“…Borisov [5] proposed an anonymous DHT based on Koorde [24], which performs a randomized routing phase before an actual lookup. Ciaccio [8] proposed the use of imprecise routing in DHTs to improve sender anonymity. These lookups were designed to be anonymous, but not secure: an active adversary could easily subvert the path of the lookup.…”
Section: Related Workmentioning
confidence: 99%
“…Borisov [2005] proposed an anonymous DHT based on Koorde , which performs a randomized routing phase before an actual lookup. Ciaccio [2006] proposed the use of imprecise routing in DHTs to improve sender anonymity. These lookups were designed to be anonymous but not secure: an active adversary could easily subvert the path of the lookup.…”
Section: Related Workmentioning
confidence: 99%
“…NEBLO, a NEarly BLind Overlay, is a structured overlay network organized as a Chord ring [23], in which the use of imprecise finger lists, whose size and extent are severely constrained, yields a pretty good anonymity to information requestors as well as providers [5].…”
Section: Ongoing and Future Workmentioning
confidence: 99%