Protecting Agent from Attack in Grid ComputingII

  • Byungryong Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4224)


Peer-to-peer computing has been emerged as very popular application due to the strong retrieval performance and the easiness of sharing resource and information. Nonetheless in reality p2p users are demanding more privacy rather than share of information. In this study we propose mutual anonymity technique based on length-restricted multi-path for identity of initiator and responder and the anonymous communication between initiator and responder. In this technique is not easily revealed to denial of service attack by ensuring the anonymity of initiator and responder and anonymous communication is possible by means of grouping technique of intermediate nodes. Compared with the previous studies privacy can easily be ensured without causing cryptography processing overhead by using former protocol only. Overhead, expected in the proposed technique of intermediate node grouping, is evaluated through test.


Neighbor Node Relay Node Intermediate Node Query Message Private Information Retrieval 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. The Gnutella Protocol Specification v0.41 Document Revision 1.2,
  2. Napster (2000),
  3. Gnutella (2000),
  4. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Workshop on Design Issues in Anonymity and Unobservability, pp. 46–66 (2000),
  5. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)CrossRefGoogle Scholar
  6. Cottrell, L.: Frequently asked questions about Mixmaster remailers (2000),
  7. Dingledine, R., Mathewson, N., Syverson, P.: Tor The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)Google Scholar
  8. Goldschlag, D., Reed, M., Syverson, P.: Onion routing for anonymous and private Internet connections. Communications of the ACM 42(2), 39–41 (1999)CrossRefGoogle Scholar
  9. Zero-Knowledge Systems (2000),
  10. Anonymizer (2000),
  11. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. Journal of the ACM 45(6), 965–982 (1998)MATHCrossRefMathSciNetGoogle Scholar
  12. Reiter, M.K., Rubin, A.D.: Anonymous web transactions with Crowds. Communications of the ACM 42(2), 32–38 (1999)CrossRefGoogle Scholar
  13. Berthold, O., Federrath, H., Kopsell, S.: Web MIXes: a system for anonymous and unobservable Internet access. In: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. Springer, New York (2001)Google Scholar
  14. Dingledine, R., Freedman, M.J., Molnar, D.: The Free Haven project: distributed anonymous storage service. In: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Springer, New York (2001)Google Scholar
  15. MUTE: Simple, Anonymous File Sharing,
  16. Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS 2002), Cambridge, MA, USA (2002)Google Scholar
  17. S.C. Bono, C.A. Soghoian, F. Monrose.: Mantis: A Lightweight, Server-Anonymity Preserving, Searchable P2P, Information Security Institute of The Johns Hopkins University, Technical Report TR-2004-01-B-ISI-JHU (2004) Google Scholar
  18. Kim, B.-R., Kim, K.-C.: Anonymous Communication System in P2P Network with Random Agent Nodes. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 767–775. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  19. Gnutella Developer Forum,

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Byungryong Kim
    • 1
  1. 1.DongBang Data Technology Co., Ltd.SeoulKorea

Personalised recommendations