Information leaks in structured peer-to-peer anonymous communication systems

Prateek Mittal, Nikita Borisov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations

Abstract

We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show that the techniques that are used to combat active attacks on the lookup mechanism dramatically increase information leaks and increase the efficacy of passive attacks. Thus there is a trade-off between robustness to active and passive attacks. We study this trade-off in two P2P anoirymous systems, Salsa and AP3. In both cases, we find that, by combining both passive and active attacks, anonymity can be compromised much more effectively than previously thought, rendering these systems insecure for most proposed uses. Our results hold even if security parameters are changed or other improvements to the systems are considered. Our study therefore motivates the search for new approaches to P2P anonymous communication.

Original languageEnglish (US)
Title of host publicationProceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08
Pages267-278
Number of pages12
DOIs
StatePublished - 2008
Externally publishedYes
Event15th ACM conference on Computer and Communications Security, CCS'08 - Alexandria, VA, United States
Duration: Oct 27 2008Oct 31 2008

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other15th ACM conference on Computer and Communications Security, CCS'08
Country/TerritoryUnited States
CityAlexandria, VA
Period10/27/0810/31/08

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Keywords

  • Anonymity
  • Attacks
  • Information-leaks
  • Peer-to-peer

Fingerprint

Dive into the research topics of 'Information leaks in structured peer-to-peer anonymous communication systems'. Together they form a unique fingerprint.

Cite this