25
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      X-Vine: Secure and Pseudonymous Routing Using Social Networks

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Distributed hash tables suffer from several security and privacy vulnerabilities, including the problem of Sybil attacks. Existing social network-based solutions to mitigate the Sybil attacks in DHT routing have a high state requirement and do not provide an adequate level of privacy. For instance, such techniques require a user to reveal their social network contacts. We design X-Vine, a protection mechanism for distributed hash tables that operates entirely by communicating over social network links. As with traditional peer-to-peer systems, X-Vine provides robustness, scalability, and a platform for innovation. The use of social network links for communication helps protect participant privacy and adds a new dimension of trust absent from previous designs. X-Vine is resilient to denial of service via Sybil attacks, and in fact is the first Sybil defense that requires only a logarithmic amount of state per node, making it suitable for large-scale and dynamic settings. X-Vine also helps protect the privacy of users social network contacts and keeps their IP addresses hidden from those outside of their social circle, providing a basis for pseudonymous communication. We first evaluate our design with analysis and simulations, using several real world large-scale social networking topologies. We show that the constraints of X-Vine allow the insertion of only a logarithmic number of Sybil identities per attack edge; we show this mitigates the impact of malicious attacks while not affecting the performance of honest nodes. Moreover, our algorithms are efficient, maintain low stretch, and avoid hot spots in the network. We validate our design with a PlanetLab implementation and a Facebook plugin.

          Related collections

          Most cited references5

          • Record: found
          • Abstract: not found
          • Article: not found

          Mapping the Gnutella network

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              SPROUT: P2P Routing with Social Networks

                Bookmark

                Author and article information

                Journal
                05 September 2011
                Article
                1109.0971
                396bbdc9-a9ef-41a5-b13a-130a395e2506

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                15 pages
                cs.CR

                Comments

                Comment on this article