Efficient Caching Strategies for Gnutella-Like Systems to Achieve Anonymity in Unstructured P2P File Sharing

  • Byung Ryong Kim
  • Ki Chang Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4032)


A critical problem in a Peer-to-Peer file sharing system is how to protect the anonymity of agent nodes when providing efficient data access services. Most of existing technique mostly focus on how to provide the initiator anonymity and privacy, but leave the anonymity of the server. Our technique is similar to Onion routing in that it uses a proxy node to hide the identity of the client and the server. But it differs from it in that the proxy node is selected dynamically for each session and not fixed as in Onion routing. The fixed proxy might be convenient to use and is useful when loaded with additional features such as encryption as in Onion routing. However it is a sort of compromise from P2P point of view: we are introducing something similar to a control center that could become a bottleneck in the network. Temporary proxy doesn’t have this problem. And our technique provides caching of a retrieved data item on the reverse path back to the requestor. Caching in our paper is primarily for providing publisher anonymity and security. In this paper, we show a technique to find such proxy and caching, explain the rationale behind the decision, and prove its effectiveness through experimentation.


Distribute Hash Table Query Message Agent Node Original Server Private Information Retrieval 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Workshop on Design Issues in Anonymity and Unobservability, pp. 46–66 (2000),
  2. 2.
    The Gnutella Protocol Specification v0.41 Document Revision 1.2.,
  3. 3.
    Hildrum, K., Kubiatowicz, J., Rao, S., Zhao, B.Y.: Distributed Object Location in a Dynamic Network. Theory of Computing Systems (2004)Google Scholar
  4. 4.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)Google Scholar
  5. 5.
    Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A Resilient Global-scale Overlay for Service Deployment. IEEE Journal on Selected Areas in Communications (2004)Google Scholar
  6. 6.
    Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking (2003)Google Scholar
  7. 7.
    Daswani, N., Garcia-Molina, H.: Query-flood DoS attacks in gnutella. In: Proceedings of the 9th ACM conference on Computer and communications security table of contents (2002)Google Scholar
  8. 8.
    Gummadi, P.K., Saroiu, S., Gribble, S.D.: A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. ACM SIGCOMM Computer Communication Review (2002)Google Scholar
  9. 9.
    Back, A., Möller, U., Stiglic, A.: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245–257. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, p. 10. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
  12. 12.
    Gabber, E., Gibbons, P., Kristol, D., Matias, Y., Mayer, A.: Consistent, yet anonymous, Web access with LPWA. Commun. ACM 42(2), 42–47 (1999)CrossRefGoogle Scholar
  13. 13.
    Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web transactions. ACM Trans. Information and System Security 1(1), 66–92 (1998)CrossRefGoogle Scholar
  14. 14.
    Chaum, D.: Untraceable electronic mail, return addresses, and digitall pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRefGoogle Scholar
  15. 15.
    Shields, C., Levine, B.N.: A protocol for anonymous communication over the Internet. In: Proc. 7th ACM Conference on Computer and Communication Security (ACM CCS 2000) (November 2000)Google Scholar
  16. 16.
    Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)CrossRefGoogle Scholar
  17. 17.
    Cottrell, L.: Frequently asked questions about Mixmaster remailers (2000),
  18. 18.
    Zero-Knowledge Systems (2000),
  19. 19.
    Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. Journal of the ACM 45(6), 965–982 (1998)MATHCrossRefMathSciNetGoogle Scholar
  20. 20.
    The Rewebber (2000),
  21. 21.
    Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: a robust, tamper-evident, censorship-resistant, web publishing system. In: Proceedings of the Ninth USENIX Security Symposium, Denver, CO, USA (2000)Google Scholar
  22. 22.
    Anderson, R.J.: The Eternity service. In: Proceedings of the 1st International Conference on the Theory and Applications of Cryptology (PRAGOCRYPT 1996), Prague, Czech Republic (1996)Google Scholar
  23. 23.
    Dingledine, R., Freedman, M.J., Molnar, D.: The Free Haven project: distributed anonymous storage service. In: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer, New York (2001)CrossRefGoogle Scholar
  24. 24.
    MUTE: Simple, Anonymous File Sharing,
  25. 25.
    Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429. Springer, Heidelberg (2002)Google Scholar
  26. 26.
    Bono, S.C., Soghoian, C.A., Monrose, F.: Mantis: A Lightweight, Server-Anonymity Preserving, Searchable P2P, Information Security Institute of The Johns Hopkins University, Technical Report TR-2004-01-B-ISI-JHU (2004)Google Scholar
  27. 27.
    Gnutella Developer Forum,
  28. 28.
    Shirky, C.: Listening to Napster. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology. O’Reilly and Associates, Inc., Sebastopol (2001)Google Scholar
  29. 29.
    Scarlata, V., Levine, B.N., Shields, C.: Responder anonymity and anonymous peer-to-peer file sharing. In: Proc. IEEE Intl. Conference on Network Protocols (ICNP 2001) (November 2001)Google Scholar
  30. 30.
  31. 31.
    Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web Caching and Zipf-like Distributions: Evidence and Implications. IEEE INFOCOM (1999)Google Scholar
  32. 32.
    Sripanidkulchai, K.: The popularity of Gnutella queries and its implications on scalability (January 2004),

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Byung Ryong Kim
    • 1
  • Ki Chang Kim
    • 2
  1. 1.School of Computer and Science EngineeringInha Univ.IncheonKorea
  2. 2.School of Information and Communication EngineeringInha Univ.IncheonKorea

Personalised recommendations