k-anonymity Chord for Anonymous Query Response


CAN A. B. , Bhargava B.

INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, vol.5, no.3, pp.274-289, 2014 (Journal Indexed in ESCI) identifier

  • Publication Type: Article / Article
  • Volume: 5 Issue: 3
  • Publication Date: 2014
  • Title of Journal : INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING
  • Page Numbers: pp.274-289

Abstract

Peer-to-peer systems provide a distributed way of sharing and storing information. Each peer stores some information and responds to queries. In some applications, protecting anonymity of a responding peer is important to increase availability of information. This paper presents a cryptographic protocol on Chord to protect anonymity of peers when responding to queries. In this protocol, peers form anonymity groups and generate responses inside groups. Responder of a query has k-anonymity protection against an adversary who can sniff all communication on the network. Validity of an anonymous reply can be verified so fake replies of malicious peers are prevented. The proposed approach can be adapted to other DHT structures to protect responder anonymity.