Mistrustful P2P: Deterministic privacy-preserving P2P file sharing model to hide user content interests in untrusted peer-to-peer networks

P2P networks endowed individuals with the means to easily and efficiently distribute digital media over the Internet, but user legal liability issues may be raised as they also facilitate the unauthorized distribution and reproduction of copyrighted material. Traditional P2P file sharing systems focus on performance and scalability, disregarding any privacy or legal issues that may arise from their use. Lacking alternatives, and unaware of the privacy issues that arise from relaying traffic of insecure applications, users have adopted anonymity systems for P2P file sharing.This work aims at hiding user content interests from malicious peers through plausible deniability. The Mistrustful P2P model is built on the concept of mistrusting all the entities participating in the P2P network, hence its name. It provides a deterministic and configurable privacy protection that relies on cover content downloads to hide user content interests, has no trust requirements, and introduces several mechanisms to prevent user legal liability and reduce network overhead while enabling timely content downloads.We extend previous work on the Mistrustful P2P model by discussing its legal and ethical framework, assessing its feasibility for more use cases, providing a security analysis, comparing it against a traditional P2P file sharing model, and further defining and improving its main mechanisms.

[1]  Mohamed Ali Kâafar,et al.  Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.

[2]  Xiaoning Ding,et al.  A performance study of BitTorrent-like peer-to-peer systems , 2007, IEEE Journal on Selected Areas in Communications.

[3]  R. Spinello Intellectual Property: Legal and Moral Challenges of Online File Sharing , 2014 .

[4]  John Nagle,et al.  Congestion control in IP/TCP internetworks , 1984, CCRV.

[5]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[6]  Johan A. Pouwelse,et al.  Hiding user content interest while preserving P2P performance , 2014, SAC.

[7]  Angelos D. Keromytis,et al.  Detection and analysis of eavesdropping in anonymous communication networks , 2014, International Journal of Information Security.

[8]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[9]  Manuel Ricardo,et al.  Storm: Rateless MDS Erasure Codes , 2014, WICON.

[10]  Joongheon Kim,et al.  The Sybil Attacks and Defenses: A Survey , 2013, Smart Comput. Rev..

[11]  Tracey Ho,et al.  Modeling Flash Crowd Performance in Peer-to-Peer File Distribution , 2014, IEEE Transactions on Parallel and Distributed Systems.

[12]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[13]  Thomas E. Anderson,et al.  Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.

[14]  Rafael Capurro,et al.  Intercultural Information Ethics , 2018 .

[15]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[16]  Shi-Chun Tsai,et al.  On the inapproximability of maximum intersection problems , 2012, Inf. Process. Lett..

[17]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[18]  Keith W. Miller,et al.  Computer ethics : analyzing information technology , 2009 .

[19]  P. Savola The Ultimate Copyright Shopping Opportunity – Jurisdiction and Choice of Law in Website Blocking Injunctions , 2014 .

[20]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[21]  J. Quintais Private Copying and Downloading from Unlawful Sources , 2015 .

[22]  J. Clough Principles of Cybercrime , 2010, The Military Law and the Law of War Review.

[23]  Manuel Ricardo,et al.  Mistrustful P2P: Privacy-preserving file sharing over untrustworthy Peer-to-Peer networks , 2016, 2016 IFIP Networking Conference (IFIP Networking) and Workshops.

[24]  Sean W. Smith,et al.  Nymble: Blocking Misbehaving Users in Anonymizing Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[26]  Manuel Ricardo,et al.  CIDRarchy: CIDR-based ns-3 routing protocol for large scale network simulation , 2015, SimuTools.

[27]  Dan S. Wallach,et al.  The BitTorrent Anonymity Marketplace , 2011, ArXiv.

[28]  Dirk Grunwald,et al.  BitBlender: light-weight anonymity for BitTorrent , 2008, AIPACa '08.

[29]  Sachin Katti,et al.  Information Slicing: Anonymity Using Unreliable Overlays , 2007, NSDI.

[30]  Maher Khemakhem,et al.  Mitigation of Sybil Attacks in Structured P2P Overlay Networks , 2012, 2012 Eighth International Conference on Semantics, Knowledge and Grids.

[31]  Walid Dabbous,et al.  One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users , 2011, LEET.

[32]  K. Himma The Handbook of Information and Computer Ethics , 2007 .