The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai), which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC), which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request) and responder anonymity (i.e., hiding who responds to the request) for peers. APAC can ...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Downloading or uploading controversial information can put users at risk, making them hesitant to ac...
The recent literature has hailed the benefits of content-oriented network architectures. However, su...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
When a host discovers that it has a software vulnerability that is susceptible to an attack, the hos...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
Various systems offering anonymity for near real-time Internet traffic have been operational. Howeve...
Click on the DOI link below to access the article (may not be free).The benefits of caching for redu...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especi...
Anonymity is important in a peer-to-peer system to protect peers that offer/request services. We pro...
In today's interactive network environment, where various types of organizations are eager to monito...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Downloading or uploading controversial information can put users at risk, making them hesitant to ac...
The recent literature has hailed the benefits of content-oriented network architectures. However, su...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
When a host discovers that it has a software vulnerability that is susceptible to an attack, the hos...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
Various systems offering anonymity for near real-time Internet traffic have been operational. Howeve...
Click on the DOI link below to access the article (may not be free).The benefits of caching for redu...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especi...
Anonymity is important in a peer-to-peer system to protect peers that offer/request services. We pro...
In today's interactive network environment, where various types of organizations are eager to monito...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
There have been a number of protocols proposed for anonymous network communication. In this paper we...