Reroute on loop in anonymous peer-to-peer content sharing networks

Detecting and handling routing loops is a critical issue in the design of anonymous peer-to-peer content sharing networks (apCSNs). A principal requirement of such a scheme is that it should not leak any message forwarding information that can undermine the user anonymity of the resulting apCSN. A number of loop handling schemes have been developed in apCSNs such as Freenet and GNUnet. However, they all leak certain level of message forwarding information, which can be exploited to undermine or compromise the user anonymity. In this paper we develop a new loop handling scheme named Reroute-on-Loop (ROL) that will not leak any message forwarding information. Using the Thynix simulator developed by the Freenet project, we show that overall ROL only has minor performance impacts on message path lengths compared to the current loop handling scheme of Freenet on various network topologies, ranging from small-world topologies to random topologies. For example, the average routing path lengths of ROL are only increased by less than 1 hop compared to those with the current loop handling scheme of Freenet on small-world network topologies. Our performance studies confirm that ROL is a practical scheme, and can be deployed on Freenet and similar apCSN systems.

[1]  Zhenhai Duan,et al.  A Routing Table Insertion (RTI) Attack on Freenet , 2012, 2012 International Conference on Cyber Security.

[2]  Jon M. Kleinberg,et al.  The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.

[3]  Oskar Sandberg,et al.  Distributed Routing in Small-World Networks , 2006, ALENEX.

[4]  Gade Krishna,et al.  A scalable peer-to-peer lookup protocol for Internet applications , 2012 .

[5]  Giuseppe Ciaccio,et al.  Improving Sender Anonymity in a Structured Overlay with Imprecise Routing , 2006, Privacy Enhancing Technologies.

[6]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[7]  Zhenhai Duan,et al.  A traceback attack on Freenet , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Zhenhai Duan,et al.  Thwarting traceback attack on Freenet , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[9]  Stefanie Roos,et al.  Provable Polylog Routing for Darknets , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[10]  Thomas E. Anderson,et al.  Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.

[11]  Christian Grothoff,et al.  R5N: Randomized recursive routing for restricted-route networks , 2011, 2011 5th International Conference on Network and System Security.

[12]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.