Skip to main content

Improving Content Availability in the I2P Anonymous File-Sharing Environment

  • Conference paper
Cyberspace Safety and Security (CSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7672))

Included in the following conference series:

Abstract

Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTorrent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content.

Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, USENIX 2004, San Diego, California, USA. USENIX (August 2004)

    Google Scholar 

  2. Manils, P., Chaabane, A., Le Blond, S., Kaafar, M.A., Castelluccia, C., Legout, A., Dabbous, W.: Compromising Tor Anonymity Exploiting P2P Information Leakage. In: Proceedings of the 3rd Hot Topics in Privacy Enhancing Technologies, HotPETs 2010, Berlin, Germany. IEEE Communications Society (July 2010)

    Google Scholar 

  3. Le Blond, S., Manils, P., Chaabane, A., Kaafar, M.A., Castelluccia, C., Legout, A., Dabbous, W.: One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users. In: Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats, LEET 2011. USENIX Association, Berkeley (2011)

    Google Scholar 

  4. I2P. The I2P network, http://www.i2p2.de/

  5. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Proccedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, California, USA. Springer-Verlag New York, Inc. (July 2001)

    Google Scholar 

  6. Cohen, B.: Incentives Build Robustness in BitTorrent. In: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkely, California, USA (June 2003)

    Google Scholar 

  7. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, California, USA. Springer-Verlag New York, Inc. (July 2001)

    Google Scholar 

  8. Bennett, K., Grothoff, C., Horozov, T., Patrascu, I., Stef, T.: GNUnet - A truly anonymous networking infrastructure. In: Proceedings of the Privacy Enhancing Technologies Workshop (PET), PET 2002. Springer (April 2002)

    Google Scholar 

  9. Berthold, O., Federrath, H., Köpsell, S.: A system for anonymous and unobservable Internet access. In: Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, California, USA. Springer-Verlag New York, Inc. (July 2001)

    Google Scholar 

  10. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  11. Isdal, T., Piatek, M., Krishnamurthy, A., Anderson, T.: Privacy-preserving P2P data sharing with OneSwarm. In: Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM 2010, New Delhi, India. ACM (August 2010)

    Google Scholar 

  12. Prusty, S., Levine, B.N., Liberatore, M.: Forensic investigation of the OneSwarm anonymous filesharing system. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011. ACM, New York (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Timpanaro, J.P., Chrisment, I., Festor, O. (2012). Improving Content Availability in the I2P Anonymous File-Sharing Environment. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35362-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35361-1

  • Online ISBN: 978-3-642-35362-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics