Secure and user privacy-preserving searching in peer-to-peer networks

被引:0
|
作者
Sen, Jaydip [1 ]
机构
[1] Tata Consultancy Serv Ltd, Innovat Labs, Kolkata 700091, India
关键词
P2P network; topology adaptation; trust; reputation; semantic community; malicious peer; user privacy; CONSISTENCY; EFFICIENT; SYSTEM;
D O I
10.1093/jigpal/jzs036
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Peer-to-peer (P2P) networks have found growing interest in the research community over the last decade. A P2P network is a distributed system in which peers deploy distributed resources to perform some functions in a decentralized manner. In an unstructured peer-to-peer system, there is no centralized administrative entity, and the contents in the peers are not related to their topological positions in the network. These networks suffer from several problems such as fake content distribution, free riding, whitewashing, poor search scalability, lack of a robust trust model and absence of user privacy protection mechanism. Moreover, the peers can join and leave the network frequently, which makes the designing of trust management frameworks and other protection mechanisms for such networks a complex and difficult task. In this article, a secure and efficient searching protocol for unstructured P2P networks has been proposed that utilizes topology adaptation by constructing an overlay of trusted peers where the neighbours are selected based on their trust ratings and content similarities. While increasing the search efficiency by intelligently exploiting the formation of semantic community structures among the trustworthy peers, the protocol provides a highly reliable module for protecting the privacy of the users and data in the network. Simulation results have demonstrated the effectiveness of the protocol.
引用
收藏
页码:603 / 629
页数:27
相关论文
共 50 条
  • [1] Vegas - A Secure and Privacy-Preserving Peer-to-Peer Online Social Network
    Duerr, Michael
    Maier, Marco
    Dorfmeister, Florian
    PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 868 - 874
  • [2] PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks
    Liang, Xiaohui
    Lu, Rongxing
    Lin, Xiaodong
    Shen, Xuemin
    2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [3] Asynchronous privacy-preserving iterative computation on peer-to-peer networks
    Naranjo, J. A. M.
    Casado, L. G.
    Jelasity, Mark
    COMPUTING, 2012, 94 (8-10) : 763 - 782
  • [4] Statistical privacy-preserving message broadcast for peer-to-peer networks
    Moedinger, David
    Lorenz, Jan-Hendrik
    Hauck, Franz J.
    PLOS ONE, 2021, 16 (05):
  • [5] Asynchronous privacy-preserving iterative computation on peer-to-peer networks
    J. A. M. Naranjo
    L. G. Casado
    Márk Jelasity
    Computing, 2012, 94 : 763 - 782
  • [6] Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks
    Zeilemaker, Niels
    Erkin, Zekeriya
    Palmieri, Paolo
    Pouwelse, Johan
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 79 - 84
  • [7] Privacy-Preserving Clustered Peer-to-Peer Learning
    Zheng, Xue
    Yener, Aylin
    FIFTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, IEEECONF, 2023, : 704 - 708
  • [8] Privacy-Preserving Peer-to-Peer Energy Trading via Hybrid Secure Computations
    Liu, Junhong
    Long, Qinfei
    Liu, Rong-Peng
    Liu, Wenjie
    Cui, Xin
    Hou, Yunhe
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (02) : 1951 - 1964
  • [9] Lightweight Privacy-Preserving Peer-to-Peer Data Integration
    Zhang, Ye
    Wong, Wai-Kit
    Yiu, S. M.
    Mamoulis, Nikos
    Cheung, David W.
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (03): : 157 - 168
  • [10] Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
    Zhu, Youwen
    Li, Xingxin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2272 - 2284