TY - JOUR
T1 - Maintaining censorship resistance in the iTrust network for publication, search and retrieval
AU - Chuang, Yung-Ting
AU - Melliar-Smith, Peter Michael
AU - Moser, Louise Elizabeth
AU - Michel Lombera, Isaí
PY - 2016/3/1
Y1 - 2016/3/1
N2 - This paper presents the architecture of the iTrust system together with algorithms for maintaining censorship resistance. In iTrust, metadata describing documents, and requests containing keywords, are distributed to randomly chosen nodes in the iTrust network. If a node receives a request containing keywords that match metadata it holds, it sends the URL of the matching document to the requesting node, which then retrieves the document from the source node. A novel detection algorithm estimates the proportion of operational nodes in the iTrust network, by comparing the empirical probabilities of the number of responses received for a node’s request with the analytical probabilities for a match, for various proportions of operational nodes. A novel defensive adaptation algorithm increases the number of nodes to which the requests are distributed, in order to maintain the same high probability of a match when some of the nodes are non-operational or malicious as when all of the nodes are operational. Extensive experimental evaluations demonstrate the effectiveness of the architecture and the algorithms for maintaining censorship resistance in the iTrust network.
AB - This paper presents the architecture of the iTrust system together with algorithms for maintaining censorship resistance. In iTrust, metadata describing documents, and requests containing keywords, are distributed to randomly chosen nodes in the iTrust network. If a node receives a request containing keywords that match metadata it holds, it sends the URL of the matching document to the requesting node, which then retrieves the document from the source node. A novel detection algorithm estimates the proportion of operational nodes in the iTrust network, by comparing the empirical probabilities of the number of responses received for a node’s request with the analytical probabilities for a match, for various proportions of operational nodes. A novel defensive adaptation algorithm increases the number of nodes to which the requests are distributed, in order to maintain the same high probability of a match when some of the nodes are non-operational or malicious as when all of the nodes are operational. Extensive experimental evaluations demonstrate the effectiveness of the architecture and the algorithms for maintaining censorship resistance in the iTrust network.
KW - Information network
KW - Peer-to-peer network
KW - Performance evaluation
KW - Publication, search and retrieval
KW - Search and retrieval
UR - http://www.scopus.com/inward/record.url?scp=84957426194&partnerID=8YFLogxK
U2 - 10.1007/s12083-015-0327-1
DO - 10.1007/s12083-015-0327-1
M3 - Article
AN - SCOPUS:84957426194
SN - 1936-6442
VL - 9
SP - 266
EP - 283
JO - Peer-to-Peer Networking and Applications
JF - Peer-to-Peer Networking and Applications
IS - 2
ER -