Privacy In Peer-to-Peer Networks
暂无分享,去创建一个
A big part of Internet traffic is nowadays peer-to-peer (P2P) traffic. Various peer-to-peer softwares have millions of users, sharing data by means of decentralized network. Wellknown examples of such programs are Kazaa [1], Gnutella [2], and eDonkey [3], which allow their users to search and share their files within the P2P community. The Internet telephony system, VoIP, is an another interesting and widely used P2P application. This paper discusses the privacy aspect of today’s P2P networks and the information that can be collected from the users of P2P software. The importance of the collected information and possible ways to use it are also discussed. The main focus is on currently available file-sharing applications and analysis of how they handle sensitive information.
[1] Keith W. Ross,et al. The KaZaA Overlay : A Measurement Study , 2004 .
[2] Nathaniel Good,et al. Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.
[3] Martin Boldt,et al. Investigating Spyware in Peer-to-Peer Tools , 2003 .
[4] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.