Skip to main content

Anonymizing Censorship Resistant Systems

  • Conference paper
  • First Online:
Peer-to-Peer Systems (IPTPS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2429))

Included in the following conference series:

Abstract

In this paper we propose a new Peer-to-Peer architecture for a censorship resistant system with user, server and active-server document anonymity as well as efficient document retrieval. The retrieval service is layered on top of an existing Peer-to-Peer infrastructure, which should facilitate its implementation. The key idea is to separate the role of document storers from the machines visible to the users, which makes each individual part of the system less prone to attacks, and therefore to censorship.

Indeed, if one server has been pressured into removal, the other server administrators may simply follow the precedent and remove the offending content themselves.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. J. Anderson. The eternity service. In Pragocrypt. 1996. http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html.

  2. D. Chaum. Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the A.C.M., 24(2):84–88, 1981.

    Google Scholar 

  3. S. A. Craver, J. P. McGregor, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D. S. Wallach, D. Dean, and E. W. Felten. Reading between the lines: lessons from the SDMI challenge. In Information Hiding Workshop. 2001.

    Google Scholar 

  4. I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Federrath [Fed01], pages 46–66. http://freenet.sourceforge.net.

  5. R. Dingledine, M. J. Freedman, and D. Molnar. Peer-to-Peer: Harnessing the Power of Disruptive Technologies, chapter 16. O’Reilly, 2000.

    Google Scholar 

  6. R. Dingledine, M. J. Freedman, and D. Molnar. The Free Haven Project: Distributed anonymous storage service. In Federrath [Fed01], pages 67–95. http://freehaven.net.

  7. J. R. Douceur. The sybil attack. In First International Workshop on Peer-to-Peer Systems (IPTPS’ 02). Cambridge, MA, 2002.

    Google Scholar 

  8. P. Druschel and A. Rowstron. Past: A large-scale, persistent peer-to-peer storage utility. In The 8th Workshop on Hot Topics in Operating Systems. 2001.

    Google Scholar 

  9. H. Federrath, editor. Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science. Springer-Verlag, 2001. ISBN 3-540-41724-9.

    MATH  Google Scholar 

  10. D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2):39–41, 1999.

    Article  Google Scholar 

  11. A. Shamir. How to share a secret. Communications of the ACM, 22:612–613, 1979.

    Article  MATH  MathSciNet  Google Scholar 

  12. E. Sit and R. T. Morris. Security considerations for peer-to-peer distributed hash tables. In First International Workshop on Peer-to-Peer Systems (IPTPS’ 02). Cambridge, MA, 2002.

    Google Scholar 

  13. A. Stubblefield and D. Wallach. Dagster: Censorship-resistant publishing without replication. Technical report, Rice University, 2001.

    Google Scholar 

  14. M. Waldman and D. Mazieres. Tangler: A censorship resistant publishing system based on document entanglements. In 8th ACM Conference on Computer and Communcation Security (CCS-8). 2001.

    Google Scholar 

  15. M. Waldman, A. D. Rubin, and L. F. Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium. 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Serjantov, A. (2002). Anonymizing Censorship Resistant Systems. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds) Peer-to-Peer Systems. IPTPS 2002. Lecture Notes in Computer Science, vol 2429. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45748-8_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-45748-8_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44179-3

  • Online ISBN: 978-3-540-45748-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics