Hiding Data Sources in P2P Networks

  • Authors:
  • Marek Klonowski;Mirosław Kutyłowski;Bartłomiej Różański

  • Affiliations:
  • Wrocław University of Technology, Institute of Mathematics and Computer Science;Wrocław University of Technology, Institute of Mathematics and Computer Science;Wrocław University of Technology, Institute of Mathematics and Computer Science

  • Venue:
  • Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a peer-to-peer (P2P) architecture where the identity of nodes holding data remains hidden, but the information itself can be efficiently fetched. This architecture can be used to protect P2P networks against malicious attacks towards nodes holding important data. In particular, our protocol can be used for maintaining access to revocation lists, blacklists and similar data, which are of growing importance for modern P2P protocols.