Privacy in Peer-to-Peer Networks

As in any other system, privacy is a concerning issue in peer-to-peer (P2P) networks. In this chapter, we analyze the existing privacy issues when using P2P networks and the available solutions that can be used to prevent them. After the state of the art on P2P networks, we describe the different privacy issues that arise when using these kind of systems. Also, we present a plethora of solutions and analyze which ones are the best suited for each issue. This chapter presents a survey of the privacy challenges which must be considered when using peer-to-peer applications and a revision of the existing mechanisms that can be used to solve them.

[1]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[2]  Krishna P. Gummadi,et al.  Canon in G major: designing DHTs with hierarchical structure , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[3]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[4]  Miguel Castro,et al.  Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.

[5]  Patrick Valduriez,et al.  Supporting Data Privacy in P2P Systems , 2013, Security and Privacy Preserving in Social Networks.

[6]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[7]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[8]  Evangelos P. Markatos,et al.  Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[9]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[10]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[11]  Chuan Wu,et al.  rStream: Resilient and Optimal Peer-to-Peer Streaming with Rateless Codes , 2008, IEEE Transactions on Parallel and Distributed Systems.

[12]  Henning Schulzrinne,et al.  Survey of Attacks and Defenses on P2PSIP Communications , 2012, IEEE Communications Surveys & Tutorials.

[13]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[14]  Matei Ripeanu,et al.  Peer-to-peer architecture case study: Gnutella network , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[15]  Dan S. Wallach,et al.  AP3: cooperative, decentralized anonymous communication , 2004, EW 11.

[16]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM 2002.

[17]  Scott Shenker,et al.  Querying the Internet with PIER , 2003, VLDB.

[18]  Rüdiger Schollmeier,et al.  A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[19]  Vijay S. Pande,et al.  Folding@Home and Genome@Home: Using distributed computing to tackle previously intractable problem , 2009, 0901.0866.

[20]  Niklas Carlsson,et al.  Peer-assisted On-demand Video Streaming with Selfish Peers , 2009, Networking.

[21]  Internet Architecture Board,et al.  Peer-to-Peer (P2P) Architecture: Definition, Taxonomies, Examples, and Applicability , 2009, RFC.

[22]  Ian T. Foster,et al.  Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.

[23]  Nathaniel Good,et al.  Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.

[24]  L. Javier García-Villalba,et al.  Advantages of identity certificate segregation in P2PSIP systems , 2011, IET Commun..

[25]  Walid Dabbous,et al.  I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy , 2011, IMC '11.

[26]  Stefan A. Brands,et al.  Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .

[27]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[28]  Hoang Giang Ngo From inter-connecting P2P overlays to co-operating P2P systems , 2013 .

[29]  Amna Qureshi,et al.  A survey on security, privacy and anonymity in legal distribution of copyrighted multimedia content over peer-to-peer networks , 2013 .

[30]  Alberto Montresor,et al.  Security and privacy issues in P2P streaming systems: A survey , 2011, Peer-to-Peer Netw. Appl..

[31]  Jan Camenisch,et al.  Information privacy?! , 2012, Comput. Networks.

[32]  Anup Basu,et al.  pcVOD: Internet Peer-to-Peer Video-On-Demand with Storage Caching on Peers , 2005, DMS.

[33]  Alon Y. Halevy,et al.  Piazza: data management infrastructure for semantic web applications , 2003, WWW '03.

[34]  Nikita Borisov,et al.  Anonymity in Structured Peer-to-Peer Networks , 2003 .

[35]  Nathan S. Evans,et al.  Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM , 2010, IPTComm.

[36]  Yunhao Liu,et al.  AnySee: Peer-to-Peer Live Streaming , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[37]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[38]  Bernhard Plattner,et al.  Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.

[39]  Wenjie Wang,et al.  Live streaming performance of the Zattoo network , 2009, IMC '09.

[40]  Bharat K. Bhargava,et al.  Trust-based privacy preservation for peer-to-peer data sharing , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[41]  Eric Rescorla,et al.  Datagram Transport Layer Security , 2006, RFC.

[42]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[43]  Maher Khemakhem,et al.  Taxonomy of Structured P2P Overlay Networks Security Attacks , 2012 .

[44]  Ian Clarke,et al.  Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..

[45]  Moni Naor,et al.  Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.

[46]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[47]  Rakesh Kumar,et al.  The FastTrack overlay: A measurement study , 2006, Comput. Networks.

[48]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[49]  Ann L. Chervenak,et al.  Peer-to-Peer Approaches to Grid Resource Discovery , 2007, CoreGRID Workshop - Making Grids Work.

[50]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[51]  Antony I. T. Rowstron,et al.  PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[52]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM '02.

[53]  Antonio F. Gómez-Skarmeta,et al.  Cyclone: a novel design schema for hierarchical DHTs , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[54]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM 2001.

[55]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[56]  Krishna P. Gummadi,et al.  Measuring and analyzing the characteristics of Napster and Gnutella hosts , 2003, Multimedia Systems.

[57]  Ian T. Foster,et al.  Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems , 2002, IPTPS.

[58]  Dan S. Wallach,et al.  A Survey of Peer-to-Peer Security Issues , 2002, ISSS.

[59]  Ben Y. Zhao,et al.  An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .

[60]  Keith W. Ross,et al.  A Measurement Study of a Large-Scale P2P IPTV System , 2007, IEEE Transactions on Multimedia.

[61]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[62]  Cullen Jennings,et al.  SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System , 2005, First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05).

[63]  Zhiyong Xu,et al.  HIERAS: a DHT based hierarchical P2P routing algorithm , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..

[64]  Vinod Vaikuntanathan,et al.  Information leak in the Chord lookup protocol , 2004 .

[65]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[66]  Miguel Castro,et al.  SplitStream: high-bandwidth multicast in cooperative environments , 2003, SOSP '03.

[67]  Ravi S. Sandhu,et al.  Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.