Abstract
As in any other system, privacy is a concerning issue in peer-to-peer (P2P) networks. In this chapter, we analyze the existing privacy issues when using P2P networks and the available solutions that can be used to prevent them. After the state of the art on P2P networks, we describe the different privacy issues that arise when using these kind of systems. Also, we present a plethora of solutions and analyze which ones are the best suited for each issue. This chapter presents a survey of the privacy challenges which must be considered when using peer-to-peer applications and a revision of the existing mechanisms that can be used to solve them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bryan DA, Lowekamp BB, Jennings C (2005) SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System. In: Proceedings of the First international workshop on advanced architectures and algorithms for internet delivery and applications, Washington, DC, USA. IEEE Computer Society, pp 42–49
The seti@home project website (1997) http://setiathome.berkeley.edu
The genome@home Project Website (2000) http://genomeathome.stanford.edu
HueBsch R, Hellerstein J, Lanham N, Thau Loo B (2003) Querying the internet with pier. In: Proceedings of the 29th VLDB conference
Halevy A, Ives Z, Mork P, Tatarinov I (2003) Piazza: data management infrastructure for semantic web applications. In: Proceedings of the 12th international conference on world wide web, pp 556–567
The Napster Website (2003) http://free.napster.com/
Gnutella A Protocol for a Revolution (2000) http://rfc-gnutella.sourceforge.net/index.html
Cohen B (2003) Incentives build robustness in BitTorrent. In: Proceedings of the 1st workshop on economics of peer-to-peer systems, P2PECON’03
Jennings C, Lowekamp B, Rescorla E, Baset S, Schulzrinne H (2011) Internet-draft: resource location and discovery (RELOAD) base protocol. draft-ietf-p2psip-base-13 (work in progress)
Skype Official Website (2003) http://www.skype.com, 2003
Jawad M, Serrano-Alvarado P, Valduriez P (2013) Supporting data privacy in p2p systems. In: Chbeir R, Al Bouna B (eds) Security and privacy preserving in social networks. Lecture notes in social networks, pp 195–244. Springer Vienna
Le Blond S, Zhang C, Legout A, Ross K, Dabbous W (2011) I know where you are and what you are sharing: Exploiting p2p communications to invade users’ privacy. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC ‘11, pp 45–60, New York, NY, USA. ACM
Kubiatowicz J, Bindel D, Chen Y, Czerwinski S, Eaton P, Geels D, Gummadi R, Rhea S, Weatherspoon H, Weimer W, Wells C, Zhao B (2000) OceanStore: an architecture for global-scale persistent storage. ACM SIGPLAN Notices 35(11):190–201
Druschel P, Rowstron A (2001) PAST: a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the Eighth workshop on hot topics in operating systems, pp 75–80, Washington, DC, USA, 2001. IEEE Computer Society
Suvanto M (2005) Privacy in peer-to-peer networks. In: Helsinki University of Technology T-110.551 Seminar on Internetworking
Camarillo G (2009) Peer-to-peer (p2p) architecture: definition, taxonomies, examples, and applicability. Request for comments
Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies. ACM Comput Surv (CSUR) 36(4):335–371
Schollmeier R (2001) Definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: Proceedings of the first international conference on peer-to-peer computing, pp 101–102
Ngo HG (2013) From Inter-connecting P2P overlays to co-operating P2P systems. PhD thesis, University of Nice—Sophia Antipolis
Bashir A (2012) Classifying p2p activities in netflow records: a case study (bittorrnet & skype). Master’s thesis, Carleton University, Ottawa, Ontario
Chervenak A, Bharathi S (2008) Peer-to-peer approaches to grid resource discovery. In: Proceedings of the CoreGRID workshop on programming models grid and P2P system architecture grid systems, tools and environments, pp 59–76
Ripeanu M, Foster I, Iamnitchi A (2002) Mapping the gnutella network: properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Comput J 6
Markatos EP (2002) Tracing a large-scale peer to peer system: an hour in the life of gnutella. In: The second international symposium on cluster computing and the grid, pp 65–70
Lua EK, Crowcroft J, Pias M (2005) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7(2):72–93
Clarke I, Miller SG, Hong TW, Sandberg O, Wiley B (2002) Protecting free expression online with freenet. IEEE Internet Comput 6(1):40–49
Ripeanu M (2001) Peer-to-peer architecture case study: Gnutella network. In: Proceedings of the first international conference on peer-to-peer computing (P2P 2001), pp 99–100
Klingberg T, Manfredi R (2002) Gnutella 0.6. http://rfc-gnutella.sourceforge.net/src/rfc-0_6-draft.html
Liang J, Kumar R, Ross KW (2006) The fasttrack overlay: a measurement study. Comput Netw 50(6):842–858
Liang J, Kumar R, Ross KW (2004) Understanding kazaa. http://infosec.pku.edu.cn/p2p/slides/2004
Bhagwan R, Savage S, Voelker GM (2003) Understanding availability. In: Peer-to-peer systems II. Springer, Berlin, pp 256–267
Heckmann O, Bock A (2002) The edonkey 2000 protocol, kom technical report 08/2002, ver. 0.8, dec. 2002. Technical report, Darmstadt University of Technology
Pouwelse J, Garbacki P, Epema D, Sips H (2005) The bittorrent p2p file-sharing system: measurements and analysis. In: 4th international workshop on peer-to-peer systems (IPTPS 2005), pp 205–216
Trifa Zied, Khemakhem Maher (2012) Taxonomy of structured p2p overlay networks security attacks. World Acad Sci Eng Technol 6(4):469–475
Ratnasamy S, Francis P, Handley M, Karp R, Shenker S (2001) A scalable content-addressable network. In: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM 2001), pp 161–172
Zhao BY, Kubiatowicz J, Joseph AD (2001) Tapestry: an infrastructure for fault-resilient wide-area location and routing. Technical Report UCB/CSD-01-1141, Computer Science Division (EECS), University of California, Berkeley
Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup protocol for internet applications. In: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM 2001), pp 149–160
Rowstron A, Druschel P (2001) Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Proceedings of the IFIP/ACM international conference on distributed systems platforms, Heidelberg (Middleware 2001), pp 329–350
Malkhi D, Naor M, Ratajczak D (2002) Viceroy: A scalable and dynamic emulation of the butterfly. In: Proceedings of the twenty-first annual symposium on principles of distributed computing (PODC 2002), pp 183–192
Maymounkov P, Mazières D (2002) Kademlia: A peer-to-peer information system based on the xor metric. In: First international workshop peer-to-peer systems (IPTPS 2002), pp 53–65
Sanchez Artigas M, Garcia Lopez P, Pujol Ahullo J, Gomez Skarmeta AF (2005) Cyclone: a novel design schema for hierarchical dhts. In: Proceedings of the Fifth IEEE international conference on peer-to-peer computing (P2P 2005), pp 49–56
Xu Z, Min R, Hu Y (2003) Hieras: a dht based hierarchical p2p routing algorithm. In: Proceedings. 2003 international conference on parallel processing, pp 187–194
Ganesan P, Gummadi K, Garcia-Molina H (2004) Canon in g major: designing dhts with hierarchical structure. In: IEEE international conference on distributed computing systems (ICDCS 2004), pp 263–272
Garces-Erice L, Ross KW, Biersack E, Felber PA, Urvoy-Keller G (2003) Toplus: topology centric lookup service. In: Fifth international workshop on networked group communications (NGC 2003), pp 58–69
Saroiu S, Gummadi KP, Gribble SD (2003) Measuring and analyzing the characteristics of napster and gnutella hosts. J Multim Syst 9(2):170–184
Deaconescu R (2011) Protocol measurements and improvements in peer-to-peer systems. PhD thesis, University POLITEHNICA of Bucharest
Babaoglu Ö (2012) Introduction to peer-to-peer systems. Complex Syst Universitã 1/2 di Bologna 12:7
Anderson DP, Cobb J, Korpela E, Lebofsky M, Werthimer D (2002) Seti@home: an experiment in public-resource computing. Commun ACM 45(11):56–61
Larson SM, Snow CD, Shirts M, Pande VS (2002) Folding@home and genome@home: using distributed computing to tackle previously intractable problems in computational biology
van Renesse R, Birman K, Bozdog A, Dumitriu D, Singh M, Vogels W (2003) Heterogeneity-aware peer-to-peer multicast. In: Proceedings of the 17th international symposium on distributed computing (DISC2003)
Keromytis AD, Misra V, Rubenstein D (2002) Sos: secure overlay services. In: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM 2002), pp 61–72
Wu C, Li B (2008) rstream: Resilient and optimal peer-to-peer streaming with rateless codes. IEEE Trans Parallel Distrib Syst 19(1):77–92
Castro M, Druschel P, Kermarrec A-M, Nandi A, Rowstron A, Singh A (2003) Splitstream: high-bandwidth multicast in cooperative environments. In: Proceedings of the nineteenth ACM symposium on operating systems principles (SOSP 2003), pp 298–313
Ying L, Basu A (2005) cvod: internet peer-to-peer video-on-demand with storage caching on peers. In: 11th international conference on distributed multimedia systems (DMS 2005), pp 218–223
Liao X, Jin H, Liu Y, Ni LM, Deng D (2006) Anysee: peer-to-peer live streaming. In: 25th IEEE international conference on computer communications (INFOCOM 2006)
Chang H, Jamin S, Wang W (2009) Live streaming performance of the zattoo network. In: Proceedings of the 9th ACM SIGCOMM conference on internet measurement conference (IMC 2009), pp 417–429
Hei X, Liang C, Liang J, Liu Y, Ross KW (2006) Insights into pplive: a measurement study of a large-scale p2p iptv system. In: Workshop on Internet Protocol TV (IPTV) services over World Wide Web in conjunction with WWW2006
Carlsson N, Eager DL, Mahanti A (2009) Peer-assisted on-demand video streaming with selfish peers. In: Proceedings of the 8th international IFIP-TC 6 networking conference (NETWORKING 2009), pp 586–599
Solove DJ (2006) A taxonomy of privacy. Technical report, 154 U Pa L Rev 477
Fessi A, Evans N, Niedermayer H, Holz R (2010) Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM. In: Principles, systems and applications of IP telecommunications, IPTComm ‘10, New York, NY, USA. ACM, pp 134–145
Touceda D, Sierra JM, Izquierdo A, Schulzrinne H (2012) Survey of attacks and defenses on P2PSIP communications. IEEE Commun Surv Tutor 14(3):750–783
Good N, Krekelberg A (2003) Usability and privacy: a study of kazaa p2p file-sharing. In: Cockton G, Korhonen P (eds) CHI. pp 137–144. ACM
Camenisch Jan (2012) Information privacy?! Comput Netw 56(18):3834–3848
Chaum D (1981) Communications of the ACM. In: Rivest R, Chaum DL (eds) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24:84–90
Sandhu R, Zhang X (2005) Peer-to-peer access control architecture using trusted computing technology. In: Proceedings of the tenth ACM symposium on access control models and technologies, SACMAT ‘05, pp 147–158, New York, NY, USA. ACM
Freedman MJ, Morris R (2002) Tarzan: a peer-to-peer anonymizing network layer. In: Proceedings of the 9th ACM conference on computer and communications security, CCS ‘02, pp 193–206, New York, NY, USA. ACM
Rennhard M, Plattner B (2002) Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection. In: De Capitani di Vimercati S, Samarati P (eds) Proceeding of the ACM workshop on privacy in the electronic society (WPES-02), New York. ACM Press, pp 91–102
Choffnes DR, Duch J, Malmgren D, Guierma R, Bustamante FE, Amaral L (2009) Swarmscreen: privacy through plausible deniability in P2P systems. Technical report, Northwestern EECS Technical Report
O’Donnell CW, Vaikuntanathan V (2004) Information leak in the chord lookup protocol. In: Proceedings of the fourth international conference on peer-to-peer computing, P2P ‘04, Washington, DC, USA. IEEE Computer Society, pp 28–35
Borisov N, Waddle J (2005) Anonymity in structured peer-to-peer networks. Technical Report UCB/CSD-05-1390, EECS Department, University of California, Berkeley
Mislove A, Oberoi G, Post A, Reis C, Druschel P, Wallach DS (2004) AP3: cooperative, decentralized anonymous communication. In: Proceedings of the 11th workshop on ACM SIGOPS European workshop, EW 11, New York, NY, USA. ACM
Clarke I, Sandberg O, Wiley B, Hong TW (2001) Freenet: a distributed anonymous information storage and retrieval system. In: international workshop on designing privacy enhancing technologies: design issues in anonymity and unobservability, New York, NY, USA. Springer, New York, Inc, pp 46–66
Dierks T, Rescorla E (2008) The transport layer security (TLS) protocol version 1.2. RFC 5246 (Proposed Standard)
Rescorla E, Modadugu N (2006) Datagram transport layer security. RFC 4347 (Proposed Standard)
Kent S, Seo K (2005) Security architecture for the internet protocol. RFC 4301 (Proposed Standard)
Adya A, Bolosky WJ, Castro M, Cermak G, Chaiken R, Douceur JR, Howell J, Lorch JR, Theimer M, Wattenhofer RP (2002) FARSITE: federated, available, and reliable storage for an incompletely trusted environment. In: Proceedings of the 5th symposium on operating systems design and implementation, OSDI ‘02, New York, NY, USA. ACM, pp 1–14
Information Technology Laboratory, NIST, Gaithersburg, USA. In: FIPS 197. Advanced Encryption Standard (AES)
Bryan DA, Lowekamp B (2006) Innovations in peer-to-peer communications. In: Proceedings of the 2006 Virginia Space Grant consortium research conference
Cao F, Bryan DA, Lowekamp BB (2006) Providing secure services in peer-to-peer communications networks with central security servers. In: AICT-ICIW ‘06: Proceedings of the advanced international conference on telecommunications and int’l conference on internet and web applications and services, p 105, Washington, DC, USA, 2006. IEEE Computer Society
Qureshi A, Rifa-Pous H, Megias D (2013) A survey on security, privacy and anonymity in legal distribution of copyrighted multimedia content over peer- to-peer networks. Technical report, IN3-Universitat Oberta de Catalunya
Brands SA (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press
Touceda DS, Camara JMS, Villalba LJG, Marquez JT (2011) Advantages of identity certificate segregation in P2PSIP systems. IET Commun 5(6):879–889
Lu Y, Wang W, Bhargava B, Xu D (2006) Trust-based privacy preservation for peer-to-peer data sharing. IEEE Trans Syst Man Cybern Part A: Syst Hum 36(3):498–502
Dingledine R, Mathewson N, Syverson P (2004) TOR: the second-generation onion router. In: Proceedings of the 13th conference on USENIX security symposium, vol 13. SSYM’04, Berkeley, CA, USA. USENIX Association, pp 21–21
Wallach DS (2003) A survey of peer-to-peer security issues. In: Proceedings of the 2003 Mext-NSF-JSPS international conference on Software security: theories and systems, ISSS’03. Springer, Heidelberg, Germany, pages 42–57
Gheorghe G, Lo Cigno R, Montresor A (2010) Security and privacy issues in p2p streaming systems: a survey. In: Peer-to-peer network and applications
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Touceda, D.S., Cámara, J.M.S., Isaac, J.T. (2015). Privacy in Peer-to-Peer Networks. In: Zeadally, S., Badra, M. (eds) Privacy in a Digital, Networked World. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-08470-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-08470-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08469-5
Online ISBN: 978-3-319-08470-1
eBook Packages: Computer ScienceComputer Science (R0)