Title :
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
Author :
Ray, Souvik ; Zhang, Zhao
Author_Institution :
Iowa State Univ., Ames
Abstract :
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about other nodes in the system and therefore compromise privacy. In this paper, we use information theory to build a model to quantify the information leak from compromised routing tables for a given DHT with certain routing geometry and route table size. Based on this model, we have analyzed and compared how existing DHTs perform in face of anonymity attacks. We found that ring-based routing geometry (Chord) performs the best among the studied DHTs with the same routing complexity when no routing optimizations are used. The analysis of the interaction between routing geometries and recipient anonymity will help improve the design of future DHTs which can achieve a balance between routing efficiency and robustness against information leak.
Keywords :
computational complexity; data privacy; information theory; distributed hash table privacy; information leak; information-theoretic framework; ring-based routing geometry; routing complexity; routing tables; storage nodes; Information analysis; Information geometry; Information security; Information theory; Performance analysis; Privacy; Robustness; Routing; Secure storage; Solid modeling;
Conference_Titel :
Peer-to-Peer Computing, 2007. P2P 2007. Seventh IEEE International Conference on
Conference_Location :
Galway
Print_ISBN :
978-0-7695-2986-8
DOI :
10.1109/P2P.2007.34