1. bookVolume 2017 (2017): Issue 4 (October 2017)
Journal Details
License
Format
Journal
First Published
16 Apr 2015
Publication timeframe
4 times per year
Languages
English
access type Open Access

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

Published Online: 10 Oct 2017
Page range: 404 - 426
Received: 28 Feb 2017
Accepted: 02 Jun 2017
Journal Details
License
Format
Journal
First Published
16 Apr 2015
Publication timeframe
4 times per year
Languages
English

Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial. We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future systems. We show that decentralized designs can enhance privacy, integrity, and availability but also require careful trade-offs in terms of system complexity, properties provided, and degree of decentralization. These trade-offs need to be understood and navigated by designers. We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful privacy-preserving decentralized systems.

Keywords

[1] B. Adida. Helios: Web-based open-audit voting. In 17th USENIX Security Symposium, 2008.Search in Google Scholar

[2] M. Akhoondi, C. Yu, and H. V. Madhyastha. LASTor: A low-latency as-aware tor client. In IEEE Symposium on Security and Privacy, 2012.Search in Google Scholar

[3] D. Alhadidi, N. Mohammed, B. C. M. Fung, and M. Debbabi. Secure distributed framework for achieving ε-differential privacy. In 12th Privacy Enhancing Technologies Symposium, 2012.10.1007/978-3-642-31680-7_7Open DOISearch in Google Scholar

[4] M. AlSabah, K. S. Bauer, and I. Goldberg. Enhancing Tor’s performance using real-time traffic classification. In 19th ACM Conference on Computer and Communications Security, 2012.Search in Google Scholar

[5] M. AlSabah, K. S. Bauer, I. Goldberg, D. Grunwald, D. McCoy, S. Savage, and G. M. Voelker. DefenestraTor: Throwing Out Windows in Tor. In 11th Privacy Enhancing Technologies Symposium, 2011.10.1007/978-3-642-22263-4_8Open DOISearch in Google Scholar

[6] A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004. https://law.resource.org/pub/us/case/reporter/F3/239/239.F3d.1004.00-16403.00-16401.html, 2001. Last accessed: September 27, 2017.Search in Google Scholar

[7] D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer. Seti@ home: an experiment in public-resource computing. Communications of the ACM, 45(11):56–61, 2002.Search in Google Scholar

[8] R. Anderson. The Eternity service. In Pragocrypt, 1996.Search in Google Scholar

[9] P. S. Andre. IETF RFC 6120 Extensible Messaging and Presence Protocol (xmpp): Core. https://www.ietf.org/rfc/rfc6120.txt, 2011. Last accessed: September 27, 2017.Search in Google Scholar

[10] M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek. Secure multiparty computations on Bitcoin. In IEEE Symposium on Security and Privacy, 2014.Search in Google Scholar

[11] M. S. Artigas and P. G. López. On routing in Distributed Hash Tables: Is reputation a shelter from malicious behavior and churn? In 9th IEEE Conference on Peer-to-Peer Computing, pages 31–40, 2009.Search in Google Scholar

[12] M. Backes, A. Kate, S. Meiser, and E. Mohammadi. (nothing else) MATor(s): Monitoring the anonymity of Tor’s path selection. In 21st ACM Conference on Computer and Communications Security, 2014.Search in Google Scholar

[13] P. Baran et al. On distributed communications. Volumes I-XI, RAND Corporation Research Documents, August, 1964.Search in Google Scholar

[14] K. S. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. C. Sicker. Low-resource routing attacks against Tor. In ACM Workshop on Privacy in the Electronic Society, 2007.Search in Google Scholar

[15] L. Bauer, S. Garriss, and M. K. Reiter. Distributed proving in access-control systems. In IEEE Symposium on Security and Privacy, 2005.Search in Google Scholar

[16] M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham. Randomizable proofs and delegatable anonymous credentials. In 29th International Cryptology Conference Advances in Cryptology, 2009.Search in Google Scholar

[17] M. Belenkiy, M. Chase, C. C. Erway, J. Jannotti, A. Küpçü, A. Lysyanskaya, and E. Rachlin. Making P2P accountable without losing privacy. In ACM Workshop on Privacy in the Electronic Society, 2007.Search in Google Scholar

[18] E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza. Zerocash: Decentralized anonymous payments from Bitcoin. In IEEE Symposium on Security and Privacy, 2014.Search in Google Scholar

[19] A. Bielenberg, L. Helm, A. Gentilucci, D. Stefanescu, and H. Zhang. The growth of diaspora-a decentralized online social network in the wild. In IEEE Conference on Computer Communications Workshops, 2012.Search in Google Scholar

[20] A. Birgisson, J. G. Politz, Úlfar Erlingsson, A. Taly, M. Vrable, and M. Lentczner. Macaroons: Cookies with contextual caveats for decentralized authorization in the cloud. In Network and Distributed System Security Symposium, 2014.Search in Google Scholar

[21] A. Biryukov, D. Khovratovich, and I. Pustogarov. Deanonymisation of clients in bitcoin P2P network. In 21st ACM Conference on Computer and Communications Security, 2014.Search in Google Scholar

[22] A. Biryukov, I. Pustogarov, and R. Weinmann. Trawling for Tor Hidden Services: Detection, measurement, deanonymization. In IEEE Symposium on Security and Privacy,, 2013.Search in Google Scholar

[23] J. Biskup and U. Flegel. Threshold-based identity recovery for privacy enhanced applications. In 7th ACM Conference on Computer and Communications Security, 2000.Search in Google Scholar

[24] BitTorrent. http://www.bittorrent.org/. Last accessed: September 27, 2017.Search in Google Scholar

[25] M. Blaze, J. Feigenbaum, and A. D. Keromytis. Keynote: Trust Management for Public-Key Infrastructures (position paper). In 6th International Workshop on Security Protocols, 1998.Search in Google Scholar

[26] D. Bogdanov, S. Laur, and J. Willemson. Sharemind: A framework for fast privacy-preserving computations. In 13th European Symposium on Research in Computer Security. 2008.Search in Google Scholar

[27] N. Borisov, G. Danezis, and I. Goldberg. DP5: A private presence service. Proceedings on Privacy Enhancing Technologies, 2015(2):4–24, 2015.Search in Google Scholar

[28] The Briar Project. https://briarproject.org. Last accessed: September 27, 2017.Search in Google Scholar

[29] S. Buchegger, D. Schiöberg, L. Vu, and A. Datta. Peer-SoN: P2P social networking: early experiences and insights. In 2nd ACM EuroSys Workshop on Social Network Systems, 2009.Search in Google Scholar

[30] J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich. How to win the clonewars: efficient periodic n-times anonymous authentication. In 13th ACM Conference on Computer and Communications Security, 2006.Search in Google Scholar

[31] J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In International Conference on the Theory and Application of Cryptographic Techniques Advances in Cryptology, 2001.Search in Google Scholar

[32] J. Camenisch, A. Lysyanskaya, and M. Meyerovich. Endorsed e-cash. In 2007 IEEE Symposium on Security and Privacy, 2007.Search in Google Scholar

[33] M. Castro, P. Druschel, A. J. Ganesh, A. I. T. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In 5th USENIX Symposium on Operating System Design and Implementation, 2002.Search in Google Scholar

[34] H. Chan and A. Perrig. Efficient security primitives derived from a secure aggregation algorithm. In 15th ACM Conference on Computer and Communications Security, 2008.Search in Google Scholar

[35] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems (TOCS), 2008.Search in Google Scholar

[36] D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 1981.10.1145/358549.358563Open DOISearch in Google Scholar

[37] D. Chaum. The Dining Cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology, 1988.Search in Google Scholar

[38] Y. Chen, R. Sion, and B. Carbunar. XPay: practical anonymous payments for tor routing and other networked services. In ACM Workshop on Privacy in the Electronic Society, 2009.Search in Google Scholar

[39] B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. J. ACM, 1998.Search in Google Scholar

[40] J. Claessens, C. Díaz, C. Goemans, J. Dumortier, B. Preneel, and J. Vandewalle. Revocable anonymous access to the Internet? Internet Research, 2003.10.1108/10662240310488933Open DOISearch in Google Scholar

[41] I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, 2000.Search in Google Scholar

[42] H. Corrigan-Gibbs, D. Boneh, and D. Mazières. Riposte: An anonymous messaging system handling millions of users. In 2015 IEEE Symposium on Security and Privacy, 2015.Search in Google Scholar

[43] E. Damiani, S. D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In 9th ACM Conference on Computer and Communications Security, 2002.Search in Google Scholar

[44] G. Danezis, C. Díaz, C. Troncoso, and B. Laurie. Drac: An architecture for anonymous low-volume communications. In 10th Privacy Enhancing Technologies Symposium, 2010.Search in Google Scholar

[45] G. Danezis, R. Dingledine, and N. Mathewson. Mixminion: Design of a type III anonymous remailer protocol. In IEEE Symposium on Security and Privacy, 2003.Search in Google Scholar

[46] G. Danezis, C. Lesniewski-Laas, M. F. Kaashoek, and R. Anderson. Sybil-resistant dht routing. In European Symposium On Research In Computer Security, pages 305–318. Springer, 2005.Search in Google Scholar

[47] G. Danezis and P. Mittal. SybilInfer: Detecting sybil nodes using social networks. In Network and Distributed System Security Symposium, 2009.Search in Google Scholar

[48] Critical update re: Dao vulnerability. https://blog.ethereum.org/2016/06/17/critical-update-re-dao-vulnerability/. Last accessed: September 27, 2017.Search in Google Scholar

[49] J. Dean and S. Ghemawat. MapReduce: simplified data processing on large clusters. Communications of the ACM, 2008.Search in Google Scholar

[50] C. Decker, R. Eidenbenz, and R. Wattenhofer. Exploring and improving BitTorrent topologies. In 13th IEEE International Conference on Peer-to-Peer Computing, 2013.Search in Google Scholar

[51] diaspora*: The online social world where you are in control. https://diasporafoundation.org/. Last accessed: September 27, 2017.Search in Google Scholar

[52] C. Díaz, G. Danezis, C. Grothoff, A. Pfitzmann, and P. F. Syverson. Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? In Privacy Enhancing Technologies, pages 242–242, 2004.Search in Google Scholar

[53] C. Díaz, S. J. Murdoch, and C. Troncoso. Impact of network topology on anonymity and overhead in low-latency anonymity networks. In 10th Privacy Enhancing Technologies Symposium, 2010.Search in Google Scholar

[54] C. Diaz, O. Tene, and S. Gurses. Hero or villain: The data controller in privacy law and technologies. Ohio St. LJ, 74:923–963, 2013.Search in Google Scholar

[55] R. Dingledine and N. Mathewson. Anonymity loves company: Usability and the network effect. In 5th Workshop on the Economics of Information Security (WEIS), 2006.Search in Google Scholar

[56] R. Dingledine and N. Mathewson. Design of a blocking-resistant anonymity system. The Tor Project, Tech. Rep, 1, 2006.Search in Google Scholar

[57] R. Dingledine, N. Mathewson, and P. F. Syverson. Tor: The second-generation onion router. In 13th USENIX Security Symposium, 2004.Search in Google Scholar

[58] Dot-Bit: Secure Decentralized DNS. https://bit.namecoin.info/. Last accessed: September 27, 2017.Search in Google Scholar

[59] J. R. Douceur. The sybil attack. In 1st International Worksop on Peer-to-Peer Systems, 2002.Search in Google Scholar

[60] Y. Duan, N. Youdao, J. Canny, and J. Z. Zhan. P4P: practical large-scale privacy-preserving distributed computation robust against malicious users. In 19th USENIX Security Symposium, 2010.Search in Google Scholar

[61] M. Edman and P. F. Syverson. AS-awareness in tor path selection. In 16th ACM Conference on Computer and Communications Security, 2009.Search in Google Scholar

[62] e-gold. http://e-gold.com/. Last accessed: September 27, 2017.Search in Google Scholar

[63] T. Elahi, G. Danezis, and I. Goldberg. PrivEx: Private collection of traffic statistics for anonymous communication networks. In 21st ACM Conference on Computer and Communications Security, 2014.Search in Google Scholar

[64] C. M. Ellison. Establishing identity without certification authorities. In 6th USENIX Security Symposium, 1996.Search in Google Scholar

[65] L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In 9th ACM Conference on Computer and Communications Security, 2002.Search in Google Scholar

[66] Ethereum Project. https://www.ethereum.org/. Last accessed: September 27, 2017.Search in Google Scholar

[67] European Data Protection Supervisor. Opinion on privacy in the digital age (march 2010): “Privacy by Design” as a key tool to ensure citizen’s trust in ICTS, 2010.Search in Google Scholar

[68] A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten. Social networking with Frientegrity: Privacy and integrity with an untrusted provider. In 21th USENIX Security Symposium, 2012.Search in Google Scholar

[69] M. Feldotto, C. Scheideler, and K. Graffi. HSkip+: A selfstabilizing overlay network for nodes with heterogeneous bandwidths. In 14th IEEE International Conference on Peer-to-Peer Computing, 2014.Search in Google Scholar

[70] M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. In 9th ACM conference on Computer and communications security, 2002.Search in Google Scholar

[71] J. Freudiger, M. H. Manshaei, J. Hubaux, and D. C. Parkes. On non-cooperative location privacy: a gametheoretic analysis. In 16th ACM Conference on Computer and Communications Security, 2009.Search in Google Scholar

[72] R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy. Vanish: Increasing data privacy with self-destructing data. In 18th USENIX Security Symposium, 2009.Search in Google Scholar

[73] Gnutella: File sharing and distribution network. http://rfcgnutella.sourceforge.net/. Last accessed: September 27, 2017.Search in Google Scholar

[74] G. Greenwald. No place to hide: Edward Snowden, the NSA, and the US surveillance state. Macmillan, 2014.Search in Google Scholar

[75] D. A. Gritzalis. Secure electronic voting, volume 7. Springer Science & Business Media, 2012.Search in Google Scholar

[76] E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. Eclipse attacks on Bitcoin’s peer-to-peer network. In 24th USENIX Security Symposium, 2015.Search in Google Scholar

[77] S. Helmers. A brief history of anon.penet.fi: the legendary anonymous remailer. CMC Magazine, 1997.Search in Google Scholar

[78] M. Herrmann and C. Grothoff. Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using I2P. In Privacy Enhancing Technologies, 2011.Search in Google Scholar

[79] K. J. Hoffman, D. Zage, and C. Nita-Rotaru. A survey of attack and defense techniques for reputation systems. ACM Comput. Surv., 2009.10.1145/1592451.1592452Open DOISearch in Google Scholar

[80] S. Hohenberger, S. Myers, R. Pass, and A. Shelat. ANONIZE: A large-scale anonymous survey system. In IEEE Symposium on Security and Privacy, 2014.Search in Google Scholar

[81] I2P: The invisible internet project. https://geti2p.net/en/. Last accessed: September 27, 2017.Search in Google Scholar

[82] R. Janakiraman, M. Waldvogel, and Q. Zhang. Indra: A peer-to-peer approach to network intrusion detection and prevention. In 12th IEEE International Workshops on Enabling Technologies, 2003.Search in Google Scholar

[83] A. Johnson, P. F. Syverson, R. Dingledine, and N. Mathewson. Trust-based anonymous communication: adversary models and routing algorithms. In 18th ACM Conference on Computer and Communications Security, 2011.Search in Google Scholar

[84] A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. F. Syverson. Users get routed: traffic correlation on Tor by realistic adversaries. In 20th ACM SIGSAC Conference on Computer and Communications Security, 2013.Search in Google Scholar

[85] P. C. Johnson, A. Kapadia, P. P. Tsang, and S. W. Smith. Nymble: Anonymous IP-address blocking. In 7th Privacy Enhancing Technologies Symposium, 2007.Search in Google Scholar

[86] J. Juen, A. Johnson, A. Das, N. Borisov, and M. Caesar. Defending Tor from network adversaries: A case study of network path prediction. PoPETs, 2015.Search in Google Scholar

[87] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In USENIX Conference on File and Storage Technologies, 2003.Search in Google Scholar

[88] A. Kapadia and N. Triandopoulos. Halo: High-assurance locate for distributed hash tables. In Network and Distributed System Security Symposium, 2008.Search in Google Scholar

[89] G. Karame, E. Androulaki, and S. Capkun. Double-spending fast payments in Bitcoin. In 19th ACM Conference on Computer and Communications Security, 2012.Search in Google Scholar

[90] R. Kumaresan and I. Bentov. How to use Bitcoin to incentivize correct computations. In 21st ACM SIGSAC Conference on Computer and Communications Security, 2014.Search in Google Scholar

[91] L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7), 1978.10.1145/359545.359563Open DOISearch in Google Scholar

[92] B. Laurie. Certificate transparency. Queue, 2014.Search in Google Scholar

[93] S. Le Blond, P. Manils, A. Chaabane, M. A. Kaafar, A. Legout, C. Castellucia, and W. Dabbous. Poster: Deanonymizing BitTorrent users on Tor. In 7th USENIX Symposium on Network Design and Implementation (NSDI’10), 2010.Search in Google Scholar

[94] C. Lesniewski-Laas, B. Ford, J. Strauss, R. Morris, and M. F. Kaashoek. Alpaca: extensible authorization for distributed services. In 14th ACM Conference on Computer and Communications Security, 2007.Search in Google Scholar

[95] F. Lesueur, L. Mé, and V. V. T. Tong. An efficient distributed PKI for structured P2P networks. In 9th International Conference on Peer-to-Peer Computing, 2009.Search in Google Scholar

[96] N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003.10.3233/JCS-2003-11102Open DOISearch in Google Scholar

[97] Z. Li, S. Alrwais, Y. Xie, F. Yu, and X. Wang. Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures. In IEEE Symposium on Security and Privacy, 2013.Search in Google Scholar

[98] Y. Liu and J. Pan. The impact of NAT on BitTorrent-like P2P systems. In 9th International Conference on Peer-to-Peer Computing, 2009.Search in Google Scholar

[99] J. Maheswaran, D. I. Wolinsky, and B. Ford. Crypto-book: an architecture for privacy preserving online identities. In Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, page 14. ACM, 2013.Search in Google Scholar

[100] J. McLachlan, A. Tran, N. Hopper, and Y. Kim. Scalable onion routing with Torsk. In 16th ACM Conference on Computer and Communications Security, 2009.Search in Google Scholar

[101] M. S. Melara, A. Blankstein, J. Bonneau, E. W. Felten, and M. J. Freedman. CONIKS: bringing key transparency to end users. In 24th USENIX Security Symposium, 2015.Search in Google Scholar

[102] B. Mitra, F. Peruani, S. Ghose, and N. Ganguly. Analyzing the vulnerability of superpeer networks against attack. In 14th ACM Conference on Computer and Communications Security, 2007.Search in Google Scholar

[103] P. Mittal and N. Borisov. Information leaks in structured peer-to-peer anonymous communication systems. In 15th ACM Conference on Computer and Communications Security, 2008.Search in Google Scholar

[104] P. Mittal and N. Borisov. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. In 16th ACM Conference on Computer and Communications Security, 2009.Search in Google Scholar

[105] P. Mittal, M. Caesar, and N. Borisov. X-Vine: Secure and pseudonymous routing in DHTs using social networks. In 19th Network and Distributed System Security Symposium, 2012.Search in Google Scholar

[106] P. Mittal, F. G. Olumofin, C. Troncoso, N. Borisov, and I. Goldberg. PIR-Tor: Scalable anonymous communication using private information retrieval. In 20th USENIX Security Symposium, 2011.Search in Google Scholar

[107] P. Mittal, C. Papamanthou, and D. Song. Preserving link privacy in social network based systems. In 20th Network and Distributed System Security Symposium(NDSS). Internet Society, 2013.Search in Google Scholar

[108] P. Mittal, M. K. Wright, and N. Borisov. Pisces: Anonymous communication using social networks. In 20th Network and Distributed System Security Symposium, 2013.Search in Google Scholar

[109] F. Monrose and S. Krishnan. DNS prefetching and its privacy implications: When good things go bad. In 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010.Search in Google Scholar

[110] S. J. Murdoch and R. N. M. Watson. Metrics for security and performance in low-latency anonymity systems. In 8th Privacy Enhancing Technologies Symposium, 2008.Search in Google Scholar

[111] S. J. Murdoch and P. Zielinski. Sampled traffic analysis by Internet-exchange-level adversaries. In 7th International Symposium on Privacy Enhancing Technologies, 2007.Search in Google Scholar

[112] S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008.Search in Google Scholar

[113] A. Nambiar and M. K. Wright. Salsa: a structured approach to large-scale anonymity. In 13th ACM Conference on Computer and Communications Security (CCS, 2006.Search in Google Scholar

[114] A. Narayanan and V. Shmatikov. De-anonymizing social networks. In 30th IEEE Symposium on Security and Privacy, 2009.Search in Google Scholar

[115] A. Narayanan, V. Toubiana, S. Barocas, H. Nissenbaum, and D. Boneh. A critical look at decentralized personal data architectures. arXiv preprint arXiv:1202.4503, 2012.Search in Google Scholar

[116] M. A. U. Nasir, S. Girdzijauskas, and N. Kourtellis. Socially-aware distributed hash tables for decentralized online social networks. In IEEE International Conference on Peer-to-Peer Computing, 2015.Search in Google Scholar

[117] S. Nilizadeh, S. Jahid, P. Mittal, N. Borisov, and A. Kapadia. Cachet: a decentralized architecture for privacy preserving social networking with caching. In Conference on emerging Networking Experiments and Technologies, 2012.Search in Google Scholar

[118] A. Oram. Peer-to-Peer: Harnessing the power of disruptive technologies. O’Reilly, 2001.Search in Google Scholar

[119] B. Parno, A. Perrig, and V. D. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy, 2005.Search in Google Scholar

[120] T. Paul, A. Famulari, and T. Strufe. A survey on decentralized Online Social Networks. Computer Networks, 2014.Search in Google Scholar

[121] A. Pfitzmann and M. Hansen. Anonymity, unlinkability, unobservability, pseudonymity, and identity management – a consolidated proposal for terminology. Technical report, 2005.Search in Google Scholar

[122] Pluggable transports. https://obfuscation.github.io/. Last accessed: September 27, 2017.Search in Google Scholar

[123] J. Postel. IETF RFC 821 Simple Mail Transfer Protocol. https://www.ietf.org/rfc/rfc821.txt, 1982. Last accessed: September 27, 2017.Search in Google Scholar

[124] J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. J. T. Reinders, M. van Steen, and H. J. Sips. Tribler: A social-based peer-to-peer system. In 5th International workshop on Peer-To-Peer Systems (IPTPS), 2006.Search in Google Scholar

[125] T. Pulls, R. Peeters, and K. Wouters. Distributed privacy-preserving transparency logging. In 12th ACM Workshop on Privacy in the Electronic Society,, 2013.Search in Google Scholar

[126] M. A. Rajab, F. Monrose, and A. Terzis. On the effectiveness of distributed worm monitoring. In 14th USENIX Security Symposium, 2005.Search in Google Scholar

[127] M. Raya, M. H. Manshaei, M. Félegyházi, and J. Hubaux. Revocation games in ephemeral networks. In 15th ACM Conference on Computer and Communications Security, 2008.Search in Google Scholar

[128] Redecentralize.org. http://redecentralize.org/. Last accessed: September 27, 2017.Search in Google Scholar

[129] M. K. Reiter and A. D. Rubin. Crowds: Anonymity for web transactions. ACM Trans. Inf. Syst. Secur., 1998.Search in Google Scholar

[130] Y. Rekhter, T. Li, and S. Hares. A border gateway protocol 4 (BGP-4). Technical report, 2005.Search in Google Scholar

[131] Reproducible Builds - Provide a verifiable path from source code to binary. https://reproducible-builds.org/. Last accessed: September 27, 2017.Search in Google Scholar

[132] R. L. Rivest and B. Lampson. Sdsi-a simple distributed security infrastructure. Crypto, 1996.Search in Google Scholar

[133] P. Rogaway and M. Bellare. Robust computational secret sharing and a unified account of classical secret-sharing goals. In 14th ACM Conference on Computer and Communications Security, 2007.Search in Google Scholar

[134] C. Rossow, D. Andriesse, T. Werner, B. Stone-Gross, D. Plohmann, C. J. Dietrich, and H. Bos. SoK: P2PWNED - modeling and evaluating the resilience of peer-to-peer botnets. In 2013 IEEE Symposium on Security and Privacy, 2013.Search in Google Scholar

[135] J. M. Rushby. Design and verification of secure systems, volume 15. ACM, 1981.Search in Google Scholar

[136] P. Schaar. Privacy by design. Identity in the Information Society, 3(2):267–274, 2010.Search in Google Scholar

[137] S. Schiffner, A. Pashalidis, and E. Tischhauser. On the limits of privacy in reputation systems. In 10th ACM workshop on Privacy in the electronic society, 2011.Search in Google Scholar

[138] B. Schmidt, R. Sasse, C. Cremers, and D. A. Basin. Automated verification of group key agreement protocols. In 2014 IEEE Symposium on Security and Privacy, 2014.Search in Google Scholar

[139] M. Selimi and F. Freitag. Tahoe-LAFS distributed storage service in community network clouds. In 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014, pages 17–24, 2014.Search in Google Scholar

[140] S.-W. Seong, J. Seo, M. Nasielski, D. Sengupta, S. Hangal, S. K. Teh, R. Chu, B. Dodson, and M. S. Lam. PrPl: a decentralized social networking infrastructure. In 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, 2010.Search in Google Scholar

[141] A. Shamir. How to share a secret. Commun. ACM, 1979.Search in Google Scholar

[142] R. Sharma and A. Datta. SuperNova: Super-peers based architecture for decentralized online social networks. In 4th International Conference on Communication Systems and Networks, 2012.Search in Google Scholar

[143] M. Sherr, M. Blaze, and B. T. Loo. Scalable link-based relay selection for anonymous routing. In 9th Privacy Enhancing Technologies Symposium, 2009.Search in Google Scholar

[144] R. Snader and N. Borisov. A tune-up for Tor: Improving security and performance in the tor network. In 15th Network and Distributed System Security Symposium, 2008.Search in Google Scholar

[145] E. Sparrow, H. Halpin, K. Kaneko, and R. Pollan. LEAP: A next-generation client VPN and encrypted email provider. In International Conference on Cryptology and Network Security, pages 176–191. Springer, 2016.Search in Google Scholar

[146] E. Stefanov and E. Shi. Multi-cloud oblivious storage. In ACM SIGSAC Conference on Computer and Communications Security, 2013.Search in Google Scholar

[147] I. Stoica, R. Morris, D. R. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for Internet applications. In SIGCOMM, 2001.Search in Google Scholar

[148] M. W. Storer, K. M. Greenan, E. L. Miller, and K. Voruganti. POTSHARDS: secure long-term storage without encryption. 2007.Search in Google Scholar

[149] R. Süselbeck, G. Schiele, P. Komarnicki, and C. Becker. Efficient bandwidth estimation for peer-to-peer systems. In IEEE International Conference on Peer-to-Peer Computing, 2011.Search in Google Scholar

[150] P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In IEEE Symposium on Security & Privacy, 1997.Search in Google Scholar

[151] Taler: Taxable anonymous libre electronic reserve. https://taler.net/. Last accessed: September 27, 2017.Search in Google Scholar

[152] C. Tang and I. Goldberg. An improved algorithm for tor circuit scheduling. In 17th ACM Conference on Computer and Communications Security, 2010.Search in Google Scholar

[153] A. Tran, N. Hopper, and Y. Kim. Hashing it out in public: common failure modes of DHT-based anonymity schemes. In ACM Workshop on Privacy in the Electronic Society, 2009.Search in Google Scholar

[154] P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. Blacklistable anonymous credentials: blocking misbehaving users without ttps. In 14th ACM Conference on Computer and Communications Security, 2007.Search in Google Scholar

[155] P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. PEREA: towards practical TTP-free revocation in anonymous authentication. In 15th ACM Conference on Computer and Communications Security, 2008.Search in Google Scholar

[156] P. P. Tsang, A. Kapadia, C. Cornelius, and S. W. Smith. Nymble: Blocking misbehaving users in anonymizing networks. IEEE Trans. Dependable Sec. Comput., 2011.Search in Google Scholar

[157] E. Y. Vasserman, R. Jansen, J. Tyra, N. Hopper, and Y. Kim. Membership-concealing overlay networks. In 16th ACM Conference on Computer and Communications Security, 2009.Search in Google Scholar

[158] J. Verkamp and M. Gupta. Inferring mechanics of web censorship around the world. In 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012.Search in Google Scholar

[159] C. Wacek, H. Tan, K. S. Bauer, and M. Sherr. An empirical evaluation of relay selection in Tor. In 20th Network and Distributed System Security Symposium, 2013.Search in Google Scholar

[160] M. Wachs, F. Oehlmann, and C. Grothoff. Automatic transport selection and resource allocation for resilient communication in decentralised networks. In 14th IEEE International Conference on Peer-to-Peer Computing, 2014.Search in Google Scholar

[161] M. Wachs, M. Schanzenbach, and C. Grothoff. A censorship-resistant, privacy-enhancing and fully decentralized name system. In 13th International Conference on Cryptology and Network Security, 2014.Search in Google Scholar

[162] M. Waldman and D. Mazières. Tangler: a censorship-resistant publishing system based on document entanglements. In 8th ACM Conference on Computer and Communications Security, 2001.Search in Google Scholar

[163] M. Waldman, A. D. Rubin, and L. F. Cranor. Publius: A robust, tamper-evident, censorship-resistant, and source-anonymous web publishing system. In 9th USENIX Security Symposium, 2000.Search in Google Scholar

[164] L. Wang and J. Kangasharju. Measuring large-scale distributed systems: case of BitTorrent mainline DHT. In 13th IEEE International Conference on Peer-to-Peer Computing, 2013.Search in Google Scholar

[165] Q. Wang, Z. Lin, N. Borisov, and N. Hopper. rBridge: User reputation based Tor bridge distribution with privacy preservation. In 20th Network and Distributed System Security Symposium, 2013.Search in Google Scholar

[166] Q. Wang, P. Mittal, and N. Borisov. In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems. In 17th ACM Conference on Computer and Communications Security, 2010.Search in Google Scholar

[167] X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer VoIP calls on the Internet. In 12th ACM Conference on Computer and Communications Security, 2005.Search in Google Scholar

[168] B. Wilcox-O’Hearn. Experiences deploying a large-scale emergent network. In International Workshop on Peer-to-Peer Systems, pages 104–110. Springer, 2002.Search in Google Scholar

[169] M. Winslett, C. C. Zhang, and P. A. Bonatti. PeerAccess: a logic for distributed authorization. In 12th ACM Conference on Computer and Communications Security, 2005.Search in Google Scholar

[170] E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the taos operating system. ACM Transactions on Computer Systems (TOCS), 12(1):3–32, 1994.10.1145/174613.174614Open DOISearch in Google Scholar

[171] E. Wobber, M. Abadi, M. Burrows, and B. W. Lampson. Authentication in the Taos operating system. In 14th ACM Symposium on Operating System Principles, 1993.Search in Google Scholar

[172] S. Wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. A. Halderman, C. J. Rossbach, B. Waters, and E. Witchel. Defeating Vanish with low-cost sybil attacks against large DHTs. In Network and Distributed System Security Symposium, 2010.Search in Google Scholar

[173] D. I. Wolinsky, H. Corrigan-Gibbs, B. Ford, and A. Johnson. Dissent in numbers: Making strong anonymity scale. In 10th USENIX Symposium on Operating Systems Design and Implementation, 2012.Search in Google Scholar

[174] M. K. Wright, M. Adler, B. N. Levine, and C. Shields. An analysis of the degradation of anonymous protocols. In Network and Distributed System Security Symposium, 2002.Search in Google Scholar

[175] M. K. Wright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur., 2004.Search in Google Scholar

[176] J. J. Wylie, M. W. Bigrigg, J. D. Strunk, G. R. Ganger, H. Kiliççöte, and P. K. Khosla. Survivable information storage systems. IEEE Computer, 2000.Search in Google Scholar

[177] YaCy: The Peer to Peer Search Engine. http://yacy.net/en/index.html. Last accessed: September 27, 2017.Search in Google Scholar

[178] B. Yang and H. Garcia-Molina. PPay: micropayments for peer-to-peer systems. In 10th ACM Conference on Computer and Communications, 2003.Search in Google Scholar

[179] youbroketheinternet. http://youbroketheinternet.org/. Last accessed: September 27, 2017.Search in Google Scholar

[180] M. Young, A. Kate, I. Goldberg, and M. Karsten. Practical robust communication in DHTs tolerating a Byzantine adversary. In ICDCS, 2010.Search in Google Scholar

[181] H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybil-Limit: A near-optimal social network defense against Sybil attacks. IEEE/ACM Trans. Netw., 2010.Search in Google Scholar

[182] H. Yu, P. B. Gibbons, and C. Shi. DCast: sustaining collaboration in overlay multicast despite rational collusion. In 19th ACM Conference on Computer and Communications Security, 2012.Search in Google Scholar

[183] D. J. Zage and C. Nita-Rotaru. On the accuracy of decentralized virtual coordinate systems in adversarial networks. In 14th ACM Conference on Computer and Communications Security, 2007.Search in Google Scholar

[184] E. Zhai, R. Chen, Z. Cai, L. Zhang, E. K. Lua, H. Sun, S. Qing, L. Tang, and Z. Chen. Sorcery: Could we make P2P content sharing systems robust to deceivers? In 9th IEEE International Conference on Peer-to-Peer Computing, 2009.Search in Google Scholar

[185] E. Zhai, D. I. Wolinsky, R. Chen, E. Syta, C. Teng, and B. Ford. Anonrep: Towards tracking-resistant anonymous reputation. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pages 583–596. USENIX Association, 2016.Search in Google Scholar

[186] X. Zhang, H.-C. Hsiao, G. Hasker, H. Chan, A. Perrig, and D. G. Andersen. SCION: Scalability, control, and isolation on next-generation networks. In IEEE Symposium on Security and Privacy, 2011.Search in Google Scholar

[187] B. Zhu, S. Setia, and S. Jajodia. Providing witness anonymity in peer-to-peer systems. In 13th ACM Conference on Computer and Communications Security, 2006.Search in Google Scholar

[188] S. Zhu, S. Setia, and S. Jajodia. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN, 2006.Search in Google Scholar

[189] G. Zyskind, O. Nathan, and A. Pentland. Enigma: Decentralized computation platform with guaranteed privacy. CoRR, abs/1506.03471, 2015.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo