Distributed ONS and its Impact on Privacy

The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with electronic product codes (EPC). A so-called object naming service (ONS) is used to locate information sources for these objects in the EPC Network. But ONS is based on DNS, which suffers from well-studied weaknesses in robustness, configuration complexity and security. There are promising approaches to enhance the performance and robustness of DNS by using structured P2P systems based on distributed hash tables (DHT) that have a high potential as a replacement for ONS as well. We investigate if and how a decentralized alternative to ONS based on DHT could additionally offer data access control and enhance the privacy of its clients. As it turns out, the strength of privacy protection will slightly increase by using DHT compared to DNS, but strong protection will depend on the feasibility of secure out- of-band key distribution mechanisms.

[1]  Thomas Santen,et al.  Eliciting confidentiality requirements in practice , 2005, CASCON.

[2]  George Danezis,et al.  On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?" , 2004, Privacy Enhancing Technologies.

[3]  James P. Titus,et al.  Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).

[4]  Emin Gün Sirer,et al.  The design and implementation of a next generation name service for the internet , 2004, SIGCOMM.

[5]  Rolf Oppliger,et al.  Why have public key infrastructures failed so far? , 2005, Internet Res..

[6]  Robert Tappan Morris,et al.  Serving DNS Using a Peer-to-Peer Lookup Service , 2002, IPTPS.

[7]  Bart Preneel,et al.  Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.

[8]  David R. Karger,et al.  Looking up data in P2P systems , 2003, CACM.

[9]  Duane Wessels Is your caching resolver polluting the internet? , 2004, NetT '04.

[10]  Oliver Günther,et al.  RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.

[11]  Srinivasan Seshan,et al.  Availability, usage, and deployment characteristics of the domain name system , 2004, IMC '04.

[12]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[13]  Yusuke Doi DNS meets DHT: treating massive ID resolution using DNS over DHT , 2005, The 2005 Symposium on Applications and the Internet.

[14]  Ellen W. Zegura,et al.  Diversity in DNS performance measures , 2002, IMW '02.

[15]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[16]  Oliver Günther,et al.  Security Analysis of the Object Name Service , 2005 .

[17]  Michael Walfish,et al.  A layered naming architecture for the internet , 2004, SIGCOMM '04.

[18]  Daniel Massey,et al.  Impact of configuration errors on DNS robustness , 2004, IEEE Journal on Selected Areas in Communications.

[19]  Ian Clarke,et al.  Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..

[20]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.

[21]  Rolf Oppliger,et al.  Why Public Key Infrastructures have failed so far , 2005 .