Abstract
In this paper we propose a new Peer-to-Peer architecture for a censorship resistant system with user, server and active-server document anonymity as well as efficient document retrieval. The retrieval service is layered on top of an existing Peer-to-Peer infrastructure, which should facilitate its implementation. The key idea is to separate the role of document storers from the machines visible to the users, which makes each individual part of the system less prone to attacks, and therefore to censorship.
Indeed, if one server has been pressured into removal, the other server administrators may simply follow the precedent and remove the offending content themselves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. J. Anderson. The eternity service. In Pragocrypt. 1996. http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.
D. Chaum. Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the A.C.M., 24(2):84–88, 1981.
S. A. Craver, J. P. McGregor, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D. S. Wallach, D. Dean, and E. W. Felten. Reading between the lines: lessons from the SDMI challenge. In Information Hiding Workshop. 2001.
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Federrath [Fed01], pages 46–66. http://freenet.sourceforge.net.
R. Dingledine, M. J. Freedman, and D. Molnar. Peer-to-Peer: Harnessing the Power of Disruptive Technologies, chapter 16. O’Reilly, 2000.
R. Dingledine, M. J. Freedman, and D. Molnar. The Free Haven Project: Distributed anonymous storage service. In Federrath [Fed01], pages 67–95. http://freehaven.net.
J. R. Douceur. The sybil attack. In First International Workshop on Peer-to-Peer Systems (IPTPS’ 02). Cambridge, MA, 2002.
P. Druschel and A. Rowstron. Past: A large-scale, persistent peer-to-peer storage utility. In The 8th Workshop on Hot Topics in Operating Systems. 2001.
H. Federrath, editor. Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science. Springer-Verlag, 2001. ISBN 3-540-41724-9.
D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2):39–41, 1999.
A. Shamir. How to share a secret. Communications of the ACM, 22:612–613, 1979.
E. Sit and R. T. Morris. Security considerations for peer-to-peer distributed hash tables. In First International Workshop on Peer-to-Peer Systems (IPTPS’ 02). Cambridge, MA, 2002.
A. Stubblefield and D. Wallach. Dagster: Censorship-resistant publishing without replication. Technical report, Rice University, 2001.
M. Waldman and D. Mazieres. Tangler: A censorship resistant publishing system based on document entanglements. In 8th ACM Conference on Computer and Communcation Security (CCS-8). 2001.
M. Waldman, A. D. Rubin, and L. F. Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium. 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Serjantov, A. (2002). Anonymizing Censorship Resistant Systems. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds) Peer-to-Peer Systems. IPTPS 2002. Lecture Notes in Computer Science, vol 2429. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45748-8_11
Download citation
DOI: https://doi.org/10.1007/3-540-45748-8_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44179-3
Online ISBN: 978-3-540-45748-0
eBook Packages: Springer Book Archive