Maintaining censorship resistance in the iTrust network for publication, search and retrieval

Yung-Ting Chuang*, Peter Michael Melliar-Smith, Louise Elizabeth Moser, Isaí Michel Lombera

*此作品的通信作者

研究成果: Article同行評審

1 引文 斯高帕斯(Scopus)

摘要

This paper presents the architecture of the iTrust system together with algorithms for maintaining censorship resistance. In iTrust, metadata describing documents, and requests containing keywords, are distributed to randomly chosen nodes in the iTrust network. If a node receives a request containing keywords that match metadata it holds, it sends the URL of the matching document to the requesting node, which then retrieves the document from the source node. A novel detection algorithm estimates the proportion of operational nodes in the iTrust network, by comparing the empirical probabilities of the number of responses received for a node’s request with the analytical probabilities for a match, for various proportions of operational nodes. A novel defensive adaptation algorithm increases the number of nodes to which the requests are distributed, in order to maintain the same high probability of a match when some of the nodes are non-operational or malicious as when all of the nodes are operational. Extensive experimental evaluations demonstrate the effectiveness of the architecture and the algorithms for maintaining censorship resistance in the iTrust network.

原文English
頁(從 - 到)266-283
頁數18
期刊Peer-to-Peer Networking and Applications
9
發行號2
DOIs
出版狀態Published - 1 3月 2016

指紋

深入研究「Maintaining censorship resistance in the iTrust network for publication, search and retrieval」主題。共同形成了獨特的指紋。

引用此