Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Freenet: A Distributed Anonymous Information Storage and Retrieval System

  • Chapter
  • First Online:

Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 2009))

Abstract

We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and dificult for a node operator to determine or be held responsible for the actual physical contents of her own node.

Work of Theodore W. Hong was supported by grants from the Marshall Aid Commemoration Commission and the National Science Foundation.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. S. Adler, “The Slashdot effect: an analysis of three Internet publications,”Linux Gazette issue 38, March 1999.

    Google Scholar 

  2. R. Albert, H. Jeong, and A. Barabási, “Error and attack tolerance of complex networks,”Nature406, 378–382 (2000).

    Article  Google Scholar 

  3. American National Standards Institute, American National Standard X9.30.2-1997:Public Key Cryptography for the Financial Services Industry-Part 2: The Secure Hash Algorithm (SHA-1) (1997).

    Google Scholar 

  4. R. J. Anderson, “The Eternity service,” inProceedings of the 1st International Conference on the Theory and Applications of Cryptology (PRAGOCRYPT’ 96), Prague, Czech Republic (1996).

    Google Scholar 

  5. O. Berthold, H. Federrath, and S. Köpsell, “Web MIXes: a system for anonymous and unobservable Internet access,” inProceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer: New York (2001).

    Google Scholar 

  6. D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,”Communications of the ACM24(2), 84–88(1981).

    Article  Google Scholar 

  7. Y. Chen, J. Edler, A. Goldberg, A. Gottlieb, S. Sobti, and P. Yianilos, “A proto-type implementation of archival intermemory,” inProceedings of the Fourth ACM Conference on Digital Libraries (DL’ 99), Berkeley, CA, USA. ACM Press: New York (1999).

    Google Scholar 

  8. B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, “Private information retrieval,”Journal of the ACM45(6), 965–982 (1998).

    Article MATH MathSciNet  Google Scholar 

  9. I. Clarke, “A distributed decentralised information storage and retrieval system,” unpublished report, Division of Informatics, University of Edinburgh (1999). Available athttp://www.freenetproject.org/ (2000).

  10. L. Cottrell, “Frequently asked questions about Mixmaster remailers,”http://www.obscura.com/~loki/remailer/mixmaster-faq.html (2000).

  11. R. Dingledine, M. J. Freedman, and D. Molnar, “The Free Haven project: distributed anonymous storage service,” inProceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer: New York(2001).

    Google Scholar 

  12. D. J. Ellard, J. M. Megquier, and L. Park, “The INDIA protocol,”http://www.eecs.harvard.edu/~ellard/India-WWW/ (2000).

  13. I. Goldberg and D. Wagner, “TAZ servers and the rewebber network: enabling anonymous publishing on the world wide web,”First Monday3(4) (1998).

    Google Scholar 

  14. D. Goldschlag, M. Reed, and P. Syverson, “Onion routing for anonymous and private Internet connections,”Communications of the ACM42(2), 39–41 (1999).

    Article  Google Scholar 

  15. T. Hong, “Performance,” inPeer-to-Peer, ed. by A. Oram. O’Reilly: Sebastopol, CA, USA (2001).

    Google Scholar 

  16. B. A. Huberman and L. A. Adamic, “Internet: growth dynamics of the world-wide web,”Nature401, 131 (1999).

    Google Scholar 

  17. S. Milgram, “The small world problem,”Psychology Today1(1), 60–67 (1967).

    Google Scholar 

  18. M. K. Reiter and A. D. Rubin, “Anonymous web transactions with Crowds,”Communications of the ACM42(2), 32–38 (1999).

    Article  Google Scholar 

  19. M. Richtel and S. Robinson, “Several web sites are attacked on day after assault shut Yahoo,”The New York Times, February 9, 2000.

    Google Scholar 

  20. J. Rosen, “The eroded self,”The New York Times, April 30, 2000.

    Google Scholar 

  21. A. S. Tanenbaum,Modern Operating Systems. Prentice-Hall: Upper Saddle River, NJ, USA (1992).

    Google Scholar 

  22. M. Waldman, A. D. Rubin, and L. F. Cranor, “Publius: a robust, tamper-evident, censorship-resistant, web publishing system,” inProceedings of the Ninth USENIX Security Symposium, Denver, CO, USA (2000).

    Google Scholar 

  23. D. Watts and S. Strogatz, “Collective dynamics of’ small-world’ networks,”Nature393, 440–442 (1998).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Uprizer, Inc., 1007 Montana Avenue #323, CA 90403, Santa Monica, USA

    Ian Clarke

  2. Mörbydalen 12, 18252, Stockholm, Sweden

    Oskar Sandberg

  3. 2305 Rio Grande Street, TX 78705, Austin, USA

    Brandon Wiley

  4. Department of Computing, Imperial College of Science, Technology and Medicine, 180 Queen’s Gate, SW7 2BZ, London, UK

    Theodore W. Hong

Authors
  1. Ian Clarke
  2. Oskar Sandberg
  3. Brandon Wiley
  4. Theodore W. Hong

Editor information

Editors and Affiliations

  1. Institut Informatik, FU Berlin, Takustr. 9, 14195, Berlin, Germany

    Hannes Federrath

Rights and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Clarke, I., Sandberg, O., Wiley, B., Hong, T.W. (2001). Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath, H. (eds) Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol 2009. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44702-4_4

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp