A Framework for Privacy Preserving, Distributed Search Engine Using Topology of DLT and Onion Routing

Risks regarding Internet privacy and security have been identified as issues for both new and experienced users of Internet technology. This paper explores the privacy and security threats in centralized search engines and proposes a decentralized search system. The proposed decentralized search system provides privacy and security for its users. The decentralized nature also provides transparency, distributed search and community-driven decisions in the proposed framework. We compare the proposed framework with the existing centralized approach. Our analysis shows that (1) there is no significant difference in search time between the centralized and proposed framework, and (2) the proposed framework is more efficient by providing search results with fewer search resources compared to the centralized approach.

[1]  Jung Yeon Hwang,et al.  Group signatures with controllable linkability for dynamic membership , 2013, Inf. Sci..

[2]  J. M. Eklund,et al.  Blockchain Technology in Healthcare: A Systematic Review , 2019, Healthcare.

[3]  Nitin Rakesh,et al.  Search engine optimization: Success factors , 2016, 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).

[4]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[5]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[6]  Gary R. Orren,et al.  The Electronic Commonwealth: The Impact of New Media Technologies on Democratic Politics , 1990 .

[7]  Omer Tene What Google Knows: Privacy and Internet Search Engines , 2007 .

[8]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[9]  Ahmet Uyar,et al.  Investigation of the accuracy of search engine hit counts , 2009, J. Inf. Sci..

[10]  Bart Preneel,et al.  Description of the YaCy Distributed Web Search Engine , 2014 .

[11]  W. Harkness Properties of the extended hypergeometric distribution , 1965 .

[12]  Wolfgang Kerber,et al.  Digital Markets, Data, and Privacy: Competition Law, Consumer Law, and Data Protection , 2016 .

[13]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[14]  David Starobinski,et al.  Churn in the Bitcoin Network: Characterization and Impact , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[15]  Kishor S. Trivedi,et al.  Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).

[16]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[17]  Chun Chen,et al.  Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects , 2013, IEEE Communications Magazine.

[18]  Bart Preneel,et al.  Censorship-resistant and privacy-preserving distributed web search , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.

[19]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[20]  Mingwu Zhang,et al.  Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Atul Singh,et al.  Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[22]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[23]  Salil S. Kanhere,et al.  BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.

[24]  Mousa Farajallah,et al.  Survey Paper: Cryptography Is The Science Of Information Security , 2011 .