Networks without user observability
Computers and Security
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Freenet: a distributed anonymous information storage and retrieval system
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
How to Make Personalized Web Browising Simple, Secure, and Anonymous
FC '97 Proceedings of the First International Conference on Financial Cryptography
P5: A Protocol for Scalable Anonymous Communication
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
An Optimal Strategy for Anonymous Communication Protocols
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Entropia: architecture and performance of an enterprise desktop grid system
Journal of Parallel and Distributed Computing - Special issue on computational grids
BRITE: An Approach to Universal Topology Generation
MASCOTS '01 Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Low-cost and reliable mutual anonymity protocols in peer-to-peer networks
IEEE Transactions on Parallel and Distributed Systems
International Journal of Business Information Systems
Hi-index | 0.00 |
As grid computing scales up in size and diversity, anonymous communications will be desirable, and sometimes vital, for certain applications. However, existing anonymity protocols, when being applied to grid applications, either dramatically degrade system efficiency or cause severe performance bottlenecks. We found that a distributed and highly efficient anonymity protocol can be designed if one considers the existing trust in grids. We have designed such a protocol based on controlled anonymity, which maintains an entity's anonymity against untrustable entities. To our best knowledge, this protocol is the first one of its kind. Using the existing methods from anonymity studies, we quantitatively analyze the degree of anonymity that could be offered by this protocol, and use a simulator to confirm its efficiency advantage over the existing protocols.