2008
DOI: 10.1007/s11390-008-9162-7
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Anonymity in Unstructured Peer-to-Peer Systems

Abstract: Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms of transfer efficiency, many systems try to mask the identities of their users for privacy consideration. By comparison and analysis of existing approaches, we investigate the properties of unstructured P2P anonymity, and summarize current attack models on these designs. Most of these approaches are path-based, which require peers to pre-construct anonymous paths before transmission, thus suffering significant overhead and poor re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 46 publications
0
5
0
Order By: Relevance
“…However, we drop it, because this overlay uses either one-hop messages, messages supposed to reach all peers or messages routed towards a single destination. Moreover, TTL is easy to spoof, it creates problems with maintaining anonymity [15] and we already employ other ways for detecting repeated messages.…”
Section: Design Of the Overlaymentioning
confidence: 99%
“…However, we drop it, because this overlay uses either one-hop messages, messages supposed to reach all peers or messages routed towards a single destination. Moreover, TTL is easy to spoof, it creates problems with maintaining anonymity [15] and we already employ other ways for detecting repeated messages.…”
Section: Design Of the Overlaymentioning
confidence: 99%
“…This strategy can also be treated as a mechanism to exclude adversary from the system. Although some existing works have shown the possibility of importing trust strategy into P2P anonymous communications, they also face some challenges and open problems for practical use [20][21][22].…”
Section: Trust and Reputationmentioning
confidence: 99%
“…These methods can be classi¿ed into three types: unimessagebased, replicated message-based, and split message-based [8]. For the unimessage-based approaches, they incur the lowest traffic overhead.…”
Section: Introductionmentioning
confidence: 99%