NON PATH-BASED MUTUAL ANONYMITY APPROACH FOR DECENTRALIZED AND UNSTRUCTURED DUMMY TRAFFIC FOR PEER-TO-PEER SYSTEMS

Abdul Majid, Amit Chaturvadi
2016 unpublished
Anonymous peer-to-peer systems frequently incurred additional expenses in order to do efficient transfer. Each and every Last node tries to copy themselves of which the information receive and they need all of their users for privacy considerations. Existing models of anonymous approaches are mainly non-path-based with unstructured: peers does not need any anonymous path before transmission of any files and queries. We propose Rumor Riding (RR), a approach for decentralized nodes in P2P systems
more » ... with a dummy traffic and speed up the queries. Applying random walk mechanism for lower overhead systems is mainly by using the symmetric cryptographic algorithm along with ELGamal algorithm in this approach. Dummy traffic generation will be used to hide the actual Cipher text and cipher data to confuse the attackers and accelerating query speed limited but in the new format speed increased genuinely. Dummy traffic generates traffic in a similar message with cipher and key to confuse the attacker. Evaluation is done by using anonymity approaches RSA, ElGamal and AES. we can show the how much effective by simulations by trace driven this protocol is very effective and efficient than previous protocols and this is illustrated with the experimental and analytical results.
fatcat:q6kbyemq3fhhpmrd4rmedp2f7e