Anonymity scheme for interactive P2P services

Sharon Shitrit, Eyal Felstaine, Niv Gilboa, Ofer Hermoni

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The flourishing of Peer-to-Peer (P2P) applications has encouraged extensive research on end-to-end anonymity. In particular, interactive services such as VoIP and instant messaging are becoming extremely popular and require low latency. Preserving the anonymity of users in such services is becoming a major challenge. While existing schemes provide anonymity for the communicating parties; they incur high latency and are not suitable for interactive services. Even designs that attempt to reduce the latency, employ an encryption scheme that involves a comparatively high computation overhead and delay. In this paper, we describe a novel low-latency P2P scheme that provides anonymity for both senders and receivers while adhering to low bounds of delay, communication and bandwidth overheads. The design offers resistance against various attacks including a coalition of malicious peers. It has inherited scalability and fault tolerance and is applicable for various interactive P2P services

Original languageEnglish
Title of host publicationProceedings CCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid
Pages33-40
Number of pages8
DOIs
StatePublished - 5 Sep 2008
EventCCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid - Lyon, France
Duration: 19 May 200822 May 2008

Publication series

NameProceedings CCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid

Conference

ConferenceCCGRID 2008 - 8th IEEE International Symposium on Cluster Computing and the Grid
Country/TerritoryFrance
CityLyon
Period19/05/0822/05/08

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Software
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Anonymity scheme for interactive P2P services'. Together they form a unique fingerprint.

Cite this