Octopus: A secure and anonymous DHT lookup

Qiyan Wang, Nikita Borisov

Research output: Contribution to conferencePaperpeer-review

Abstract

Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We present the design of Octopus, which uses attacker identification mechanisms to discover and remove malicious nodes, severely limiting an adversary's ability to carry out active attacks, and splits lookup queries over separate anonymous paths and introduces dummy queries to achieve high levels of anonymity. We analyze the security of Octopus by developing an event-based simulator to show that the attacker discovery mechanisms can rapidly identify malicious nodes with low error rate. We calculate the anonymity of Octopus using probabilistic modeling and show that Octopus can achieve near-optimal anonymity. We evaluate Octopus's efficiency on Planetlab and show that Octopus has reasonable lookup latency and low bandwidth overhead.

Original languageEnglish (US)
Pages325-334
Number of pages10
DOIs
StatePublished - 2012
Event32nd IEEE International Conference on Distributed Computing Systems, ICDCS 2012 - Macau, China
Duration: Jun 18 2012Jun 21 2012

Other

Other32nd IEEE International Conference on Distributed Computing Systems, ICDCS 2012
Country/TerritoryChina
CityMacau
Period6/18/126/21/12

Keywords

  • Anonymity
  • DHT
  • Lookup
  • Security

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Octopus: A secure and anonymous DHT lookup'. Together they form a unique fingerprint.

Cite this