Academic
Publications
Privacy-preserving P2P data sharing with OneSwarm

Privacy-preserving P2P data sharing with OneSwarm,10.1145/1851182.1851198,Tomas Isdal,Michael Piatek,Arvind Krishnamurthy,Thomas E. Anderson

Privacy-preserving P2P data sharing with OneSwarm   (Citations: 6)
BibTex | RIS | RefWorks Download
Conference: ACM SIGCOMM Conference - SIGCOMM , pp. 111-122, 2010
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...In particular, the first assumption is widely used as in [30, 31, 32, 3, 29, 13, 18, 25], the second assumption is being used in [9] and the last assumption is being the assumption in almost all other work that uses social networks for security and communication designs, including the work in [31, 32, 29, 30, 13, 3, 18, 25, 23]...

    Abedelaziz Mohaisenet al. Mistaking friends for foes: an analysis of a social network-based Sybi...

    • ...RWAP cannot guarantee that the request will be served because two random walks might never meet at a common node. OneSwarm [20] also floods requests...
    • ...We also tried to obtain the best performance from TOR by taking measures to avoid some of its known problems such as the “congestion at exit node” reported in [20]...

    Fang Yuet al. Nemor: A congestion-aware protocol for anonymous peer-based content di...

    • ...Other examples of applications and properties used in building them include (node) betweenness for Sybil defense [19], betweenness and similarity for improving routing in delay tolerant networks [2], and closeness for efficient content sharing and anonymity [6], among others...

    Abedelaziz Mohaisenet al. Understanding Social Networks Properties for Trustworthy Computing

    • ...In a technical report [20], we explore a wider range of threats: associating search requests to users, identifying trusted links, impact of additional attacker capabilities, and so on. Because of space limitations, we restrict our attention to what we believe to be the most likely attackers conducting the most likely attacks: one or more colluding OneSwarm users bootstrapped via public community servers attempting to infer the source of a ...

    Tomas Isdalet al. Privacy-preserving P2P data sharing with OneSwarm

Sort by: