Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems
ACM SIGCOMM Computer Communication Review
Query-flood DoS attacks in gnutella
Proceedings of the 9th ACM conference on Computer and communications security
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
Analysing the MUTE anonymous file-sharing system using the pi-calculus
FORTE'06 Proceedings of the 26th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Hi-index | 0.00 |
Basically flooding-based P2P systems provide anonymity and thus it is not possible to find the initial sender of packet and the designated receiver of that packet. However it does not provide anonymity where the IP addresses of nodes uploading and downloading contents are revealed. So in order to maintain anonymity we propose and test our techniques that the receiver node of response packets on retrieval query is agent node and the agent node provides contents service between server and client. Through the proposed techniques it was found that the identity of node is secured without using encryption techniques which have been deployed in the former anonymity protection techniques and control data communications through all the nodes located between server and client. The application of this concept of which result was evaluated may be extended to many other current P2P systems under operation.