Improving Bitswap Privacy with Forwarding and Source Obfuscation

07/07/2023
by   Erik Daniel, et al.
0

IPFS is a content-addressed decentralized peer-to-peer data network, using the Bitswap protocol for exchanging data. The data exchange leaks the information to all neighbors, compromising a user's privacy. This paper investigates the suitability of forwarding with source obfuscation techniques for improving the privacy of the Bitswap protocol. The usage of forwarding can add plausible deniability and the source obfuscation provides additional protection against passive observers. First results showed that through trickle-spreading the source prediction could decrease to 40 an increased content fetching time. However, assuming short distances between content provider and consumer the content fetching time can be faster even with the additional source obfuscation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/06/2017

PSUM:Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting

The use of peer-to-peer (P2P) networks for multimedia distribution has s...
research
10/05/2017

Portable Tor Router: Easily Enabling Web Privacy for Consumers

On-line privacy is of major public concern. Unfortunately, for the avera...
research
02/02/2021

Statistical privacy-preserving message dissemination for peer-to-peer networks

Concerns for the privacy of communication is widely discussed in researc...
research
07/13/2022

Adaptive Edge Content Delivery Networks for Web-Scale File Systems

The InterPlanetary File System (IPFS) is an hyper-media distribution pro...
research
01/21/2020

Resilient Privacy Protection for Location-Based Services through Decentralization

Location-based Services (LBSs) provide valuable features but can also re...
research
05/18/2021

Enabling self-verifiable mutable content items in IPFS using Decentralized Identifiers

In IPFS content identifiers are constructed based on the item's data the...
research
03/21/2019

Repairing mappings under policy views

The problem of data exchange involves a source schema, a target schema a...

Please sign up or login with your details

Forgot password? Click here to reset