• DocumentCode
    2840191
  • Title

    Octopus: A Secure and Anonymous DHT Lookup

  • Author

    Wang, Qiyan ; Borisov, Nikita

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
  • fYear
    2012
  • fDate
    18-21 June 2012
  • Firstpage
    325
  • Lastpage
    334
  • Abstract
    Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them, we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We present the design of Octopus, which uses attacker identification mechanisms to discover and remove malicious nodes, severely limiting an adversary´s ability to carry out active attacks, and splits lookup queries over separate anonymous paths and introduces dummy queries to achieve high levels of anonymity. We analyze the security of Octopus by developing an event-based simulator to show that the attacker discovery mechanisms can rapidly identify malicious nodes with low error rate. We calculate the anonymity of Octopus using probabilistic modeling and show that Octopus can achieve near-optimal anonymity. We evaluate Octopus´s efficiency on Planet lab and show that Octopus has reasonable lookup latency and low bandwidth overhead.
  • Keywords
    data privacy; error statistics; peer-to-peer computing; probability; query processing; security of data; table lookup; Octopus anonymity; Octopus design; Octopus efficiency; Octopus security; P2P networks; Planet lab; adversary ability; anonymous DHT lookup; attacker discovery mechanisms; attacker identification mechanisms; bandwidth overhead; core technique; decentralized nature; distributed hash table lookup; dummy query; event-based simulator; lookup mechanism; lookup query; low error rate; malicious nodes; near-optimal anonymity; privacy vulnerability; probabilistic modeling; reasonable lookup latency; secure DHT lookup; security vulnerability; structured peer-to-peer networks; Accuracy; Fingers; Peer to peer computing; Pollution; Routing; Security; Surveillance; Anonymity; DHT; lookup; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on
  • Conference_Location
    Macau
  • ISSN
    1063-6927
  • Print_ISBN
    978-1-4577-0295-2
  • Type

    conf

  • DOI
    10.1109/ICDCS.2012.78
  • Filename
    6258005