2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (2010)
Apr. 20, 2010 to Apr. 23, 2010
Compared with traditional static Client/Server architecture, the P2P architecture is more suitable for anonymous communication systems because it is more flexible and can keep load balance better. However, in order to make the system usable and reliable, some system designs make tradeoffs between anonymity and performance such as reliability, latency and throughput. Tradeoffs are sometimes unavoidable in system design, but which tradeoffs are acceptable and which are not is very important for developers. This paper models the P2P anonymous communications and takes quantitative analysis of anonymity by information theory with entropy. Based on this analysis, it studies the effect of key system design strategies on anonymity in network architecture, routing and message relay, and measures which strategies should be used in anonymous communications and which are unreasonable. Some analysis results are contrary to our intuition. For example, it quantitatively concludes that in some cases the anonymity is not enhanced when the system scale increases, and too long an anonymous tunnel may not provide higher anonymity but lowers performance. These analysis results are valuable for developers of P2P anonymous communication systems.
Anonymity Analysis, Anonymous Communications, Peer-to-Peer, Network Security
W. Liu, J. Zhang, J. Wu and H. Duan, "Analysis of Anonymity in P2P Anonymous Communication Systems," 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops(WAINA), Perth, Australia, 2010, pp. 860-865.