DocumentCode :
1610123
Title :
A protocol for file sharing, anonymous and confidential, adapted to P2P networks
Author :
Riahla, M.A. ; Tamine, K. ; Gaborit, P.
Author_Institution :
XLIM Lab., Univ. of Limoges, Limoges, France
fYear :
2012
Firstpage :
549
Lastpage :
557
Abstract :
Peer-To-Peer networks have become increasingly common as a means of transferring files over Internet. However, user anonymity and privacy are not typically protected in such peer-to-peer systems. An adversary can gain knowledge about not only the content of the files being transferred but also the senders and receivers of the files. In this paper, we describe the design and experimentation of AnonymP2P a new Anonymous and confidential P2P system. AnonymP2P works on the principle of social networks with nodes identified by virtual addresses where each node can change randomly its neighbors to avoid an attacker to surround it. AnonymP2P uses also a process of data request and file sharing that differs from that found in other P2P networks; indeed the “path” of the file transfer is not necessary the reverse “path” of the data request but a set of “paths” built by a set of control message. The “path” of the data request and the “paths” of the file transfer are used by sender and receiver to exchange a secret by the Diffie-Helman protocol and thus reduce the probability of success of Man-In-The-Middle attack. We show that our protocol presents a good trade-off between efficiency on the side and anonymous and confidential communications on the other side.
Keywords :
Internet; cryptographic protocols; peer-to-peer computing; probability; social networking (online); AnonymP2P; Diffie-Helman protocol; Internet; P2P networks; anonymous P2P system; confidential P2P system; confidential communications; control message; data request; file sharing protocol; file transfer; man-in-the-middle attack; peer-to-peer networks; peer-to-peer systems; probability; social networks; transferring files; virtual addresses; Mobile agents; Peer-to-peer computing; Protocols; Public key; Receivers; Routing; P2P networks; anonymity; cryptography; mobile multi agent systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012 6th International Conference on
Conference_Location :
Sousse
Print_ISBN :
978-1-4673-1657-6
Type :
conf
DOI :
10.1109/SETIT.2012.6481971
Filename :
6481971
Link To Document :
بازگشت