The Free Haven Project: Distributed Anonymous Storage Service
We present a design for a system of anonymous storage which resists the attempts of powerful adversaries to find or destroy any stored data. We enumerate distinct notions of anonymity for each party in the system, and suggest a way to classify anonymous systems based on the kinds of anonymity provided. Our design ensures the availability of each document for a publisher-specified lifetime. A reputation system provides server accountability by limiting the damage caused from misbehaving servers. We identify attacks and defenses against anonymous storage services, and close with a list of problems which are currently unsolved.
Unable to display preview. Download preview PDF.
- 1.Masayuki Abe. Universally verifiable mix-net with verification work independent of the number of servers. In Advances in Cryptology-EUROCRYPT’ 98, pages 437–447.Google Scholar
- 2.Ross Anderson. The Eternity Service. http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.
- 4.Adam Back. The Eternity Service. http://phrack.infonexus.com/search.phtml?view&article=p51-12.
- 5.Adam Back. Re: another distributed project. http://freehaven.net/archives/freehaven/dev/Aug-2000/msg00027.html.
- 6.Oliver Berthold, Hannes Federrath, and Marit Kohntopp. Anonymity and unob-servability on the Internet. In Workshop on Freedom and Privacy by Design: CFP 2000, 2000.Google Scholar
- 7.Ran Canetti, Cynthia Dwork, Moni Naor, and Rafail Ostrovsky. Deniable encryption. In Advances in Cryptology-CRYPTO’ 97.Google Scholar
- 8.David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1982.Google Scholar
- 10.Yuan Chen, Jan Edler, Andrew Goldberg, Allan Gottlieb, Sumeet Sobti, and Peter Yianilos. A prototype implementation of archival intermemory. In Proceedings of the fourth ACM Conference on Digital libraries (DL’ 99), 1999.Google Scholar
- 11.Ian Clarke. The Free Network Project. http://freenet.sourceforge.net/.
- 12.The Cleaner. Gnutella wall of shame. http://www.zeropaid.com/busted/.
- 13.Roger Dingledine. The Free Haven Project. Master’s thesis, MIT, 2000.Google Scholar
- 14.Roger Dingledine, Michael J. Freedman, and David Molnar. Accountability. In Peer-to-peer. O’Reilly and Associates, 2001.Google Scholar
- 15.Ian Hall-Beyer et. al. Gnutella. http://gnutella.wego.com/.
- 16.Michael J. Freedman. Design and Analysis of an Anonymous Communication Channel for the Free Haven Project. http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.
- 17.Electronic Frontiers Georgia (EFGA). Anonymous remailer information. http://anon.efga.org/Remailers/.
- 18.Ian Goldberg and Adam Shostack. Freedom network 1.0 architecture, November 1999.Google Scholar
- 19.Ian Goldberg, David Wagner, and Eric Brewer. Privacy-enhancing technologies for the internet. In Proceedings of IEEE COMPCON’ 97.Google Scholar
- 20.O. Goldreich, S. Even, and Lempel. A randomized protocol for signing contracts. In Advances in Cryptology-CRYPTO’ 82.Google Scholar
- 21.Oded Goldreich. Modern Cryptography, Probabilistic Proofs, and Pseudo-Randomness. Springer-Verlag, 1999.Google Scholar
- 22.C. Gulcu and G. Tsudik. Mixing e-mail with Babel. In Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 2–16, 1996.Google Scholar
- 23.Autonomous Zone Industries. Mojonation. http://www.mojonation.com/.
- 24.M. Jakobsson. Flash mixing. In Principles of Distributed Computing PODC’ 99.Google Scholar
- 25.M. Jakobsson. A practical mix. In Advances in Cryptology-EUROCRYPT’ 98.Google Scholar
- 26.Ari Juels and John Brainard. Client puzzles: A cryptographic defense against connection depletion attacks. In Proceedings of the 1999 Network and Distributed System Security Symposium, February 1999.Google Scholar
- 27.Clifford Kahn, David Black, and Paul Dale. MANET: Mobile agents for network trust. http://www.darpa.mil/ito/psum1998/F255-0.html, 1998.
- 28.Dogan Kesdogan, Jan Egner, and Roland Buschkes. Stop and go mixes: Providing probabilistic anonymity in an open system. In 1998 Information Hiding Workshop, pages 83–98.Google Scholar
- 29.Raph Levien. Advogato’s trust metric. http://www.advogato.org/trust-metric.html.
- 30.Mark Lewis. Metallica sues Napster, universities, citing copyright infringement and RICO violations. http://www.livedaily.com/archive/2000/2k04/wk2/MetallicaSuesNapster,Univ.html.
- 31.Tal Malkin. Private Information Retrieval. PhD thesis, MIT. see http://theory.lcs.mit.edu/cis/cis-theses.html.
- 33.Tim May. Cyphernomicon. http://www2.pro-ns.net/crypto/cyphernomicon.html.
- 34.David Mazieres and M. Frans Kaashoek. The design and operation of an e-mail pseudonym server. In 5th ACM Conference on Computer and Communications Security, 1998.Google Scholar
- 35.S. Micali. Certified e-mail with invisible post-offices. In Talk at RSA’ 97.Google Scholar
- 37.University of Michigan News and Information Services. Yugoslav phone books: perhaps the last record of a people. http://www.umich.edu/~newsinfo/Releases/2000/Jan00/r012000e.html.
- 38.A. Pfitzmann, B. Pfitzmann, and M. Waidner. ISDN-Mixes: Untraceable communication with small bandwidth overhead. In GI/ITG Conference: Communication in Distributed Systems, pages 451–463. Springer-Verlag, 1991.Google Scholar
- 40.Michael O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance, April 1989.Google Scholar
- 41.Michael K. Reiter and Aviel D. Rubin. Crowds: Anonymity for web transactions. DIMACS Technical Report, 97(15), April 1997.Google Scholar
- 42.Simon and Rackoff. Cryptographic defense against traffic analysis. In STOC 1993, pages 672–681, 1993.Google Scholar
- 43.Brian T. Sniffen. Trust Economies in the Free Haven Project. http://theory.lcs.mit.edu/~cis/cis-theses.html, May 2000.
- 44.Markus Stadler. Publicly verifiable secret sharing. In EUROCRYPT’ 96, 1996. http://citeseer.nj.nec.com/stadler96publicly.html.
- 45.Steve Steinberg. Gnutellanet maps. http://gnutella.wego.com/file depot/0-10000000/110000-120000/116705/folder/151713/network3.jpg.
- 46.Paul Syverson and Stuart Stubblebine. Group principals and the formalization of anonymity. In World Congress on Formal Methods 1999, 1999.Google Scholar
- 47.P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997.Google Scholar
- 48.Vernor Vinge. True Names. Short story.Google Scholar
- 49.Marc Waldman, Aviel Rubin, and Lorrie Cranor. Publius: A robust, tamperevident, censorship-resistant and source-anonymous web publishing system.Google Scholar
- 50.Alma Whitten and J. D. Tygar. Why johnny can’t encrypt. In USENIX Security 1999, 1999. http://www.usenix.org/publications/library/proceedings/sec99/whitten.html.