DocumentCode :
1415746
Title :
Providing Witness Anonymity Under Peer-to-Peer Settings
Author :
Zhu, Bo ; Setia, Sanjeev ; Jajodia, Sushil ; Wang, Lingyu
Author_Institution :
Concordia Inst. for Inf. Syst. Eng., Concordia Univ., Montreal, QC, Canada
Volume :
5
Issue :
2
fYear :
2010
fDate :
6/1/2010 12:00:00 AM
Firstpage :
324
Lastpage :
336
Abstract :
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems, as well as other systems with the peer-to-peer nature. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest peers who report on the misbehavior of other peers) and accountability (for malicious peers that attempt to misuse the anonymity feature to slander honest peers). We propose the Secure Deep Throat (SDT) protocol to provide anonymity for the witnesses of malicious or selfish behavior to enable such peers to report on this behavior without fear of retaliation. On the other hand, in SDT, the misuse of anonymity is restrained in such a way that any malicious peer attempting to send multiple claims against the same innocent peer for the same reason (i.e., the same misbehavior type) can be identified. We also describe how SDT can be used in two modes. The active mode can be used in scenarios with real-time requirements, e.g., detecting and preventing the propagation of peer-to-peer worms, whereas the passive mode is suitable for scenarios without strict real-time requirements, e.g., query-based reputation systems. We analyze the security and overhead of SDT, and present countermeasures that can be used to mitigate various attacks on the protocol. Moreover, we show how SDT can be easily integrated with existing protocols/mechanisms with a few examples. Our analysis shows that the communication, storage, and computation overheads of SDT are acceptable in peer-to-peer systems.
Keywords :
computer network security; peer-to-peer computing; real-time systems; SDT; innocent peer; malicious peers; peer-to-peer settings; peer-to-peer systems; providing witness anonymity; real-time requirements; secure deep throat; slander honest peers; witness anonymity; Peer-to-peer; privacy; reputation systems; trust;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2010.2041821
Filename :
5411765
Link To Document :
بازگشت