CFP last date
20 May 2024
Reseach Article

Analyzing the Dual-Path Peer-to-Peer Anonymous Approach

by Ehsan Saboori, Majid Rafigh, Alireza Nooriyan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 11
Year of Publication: 2012
Authors: Ehsan Saboori, Majid Rafigh, Alireza Nooriyan
10.5120/4729-6919

Ehsan Saboori, Majid Rafigh, Alireza Nooriyan . Analyzing the Dual-Path Peer-to-Peer Anonymous Approach. International Journal of Computer Applications. 37, 11 ( January 2012), 16-22. DOI=10.5120/4729-6919

@article{ 10.5120/4729-6919,
author = { Ehsan Saboori, Majid Rafigh, Alireza Nooriyan },
title = { Analyzing the Dual-Path Peer-to-Peer Anonymous Approach },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 11 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number11/4729-6919/ },
doi = { 10.5120/4729-6919 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:24:03.334457+05:30
%A Ehsan Saboori
%A Majid Rafigh
%A Alireza Nooriyan
%T Analyzing the Dual-Path Peer-to-Peer Anonymous Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 11
%P 16-22
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Dual-Path is an anonymous peer-to-peer approach which provides requester anonymity.This approach provides anonymity between a requester and a provider in peer-to-peer networks with trusted servers called suppernode so the provider will not be able to identify the requester and no other peers can identify the two communicating parties with certainty.Dual-Path establishes two paths for transmitting data. These paths called Request path and Response path. The first one is used for requesting data and the second one is used for sending the requested data to the requester. As Dual-Path approach is similar to Crowds approach, this article compares reliability and performance of Dual-Path and Crowds. For this purpose a simulator is developed and several scenarios are defined to compare Dual-Path and Crowds in different situations.In chapter 2 and 3 Dual-Path and Crowds approachesarebriefly described. Chapter 4 is talking about simulator. Chapter 5 explains the scenarios for comparison of performance. Chapter 6 is about comparison of reliability and chapter 7 is conclusion.

References
  1. A. K. Datta, M. Gradinariu, M. Raynal, G. Simon, "Anonymous Publish/Subscribe in P2P Networks," ipdps, pp.74a, International Parallel and Distributed Processing Symposium (IPDPS'03), 2003
  2. Saboori, Ehsan; Abbaspour, Maghsoud; , "Dual-Path Peer-to-Peer Anonymous Approach," Parallel and Distributed Systems (ICPADS), 2010 IEEE 16th International Conference on , vol., no., pp.835-838, 8-10 Dec. 2010 doi: 10.1109/ICPADS.2010.111
  3. Reiter M K, R. A. Crowds: Anonymity for web transaction. ACM Transactions on Information and System Security , 66-92, 1988
  4. Levine B N, S. C. Hordes: A multicast based protocol for anonymity. Journal of Computer Security , 213-240, 2002
  5. Ian Clarke, O. S. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science . 2001
  6. Dingledine R, M. N. Tor: The second-generation onion router. the 13th USENIX Security Symposium, San Diego, CA, USA , 303-320, 2004
  7. Freedman M, M. R. Tarzan: A peer-to-peer anonymizing network layer. the 9th ACM Conference on Computer and Communications Security (CCS) , 193-206, 2004
  8. Li Xiao, ZhichenXu, Xiaodong Zhang. (23). Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems. Proceedings of the 23rd International Conference on Distributed Computing Systems, 68.
  9. P F Syverson, D M Goldschlag, and M G Reed. "Anonymous connections and onion routing." IEEE Symposium on Security and Privacy, 1997.
  10. Tom Chothia, KonstantinosChatzikokolakis. A Survey of Anonymous Peer-to-Peer File-Sharing. Lecture Notes in Computer Science, 744-755, 2005
Index Terms

Computer Science
Information Sciences

Keywords

Dual-Path Peer-to-peer Networks Anonymity Onion Routing Crowds