3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

Deniability — an alibi for users in P2P networks

  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554432,
        author={Ofer Hermoni and Niv  Gilboa and Eyal Felstaine and Sharon Shitrit},
        title={Deniability --- an alibi for users in P2P networks},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={},
        doi={10.1109/COMSWA.2008.4554432}
    }
    
  • Ofer Hermoni
    Niv Gilboa
    Eyal Felstaine
    Sharon Shitrit
    Year: 2008
    Deniability — an alibi for users in P2P networks
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554432
Ofer Hermoni1,*, Niv Gilboa1,*, Eyal Felstaine1,*, Sharon Shitrit1,*
  • 1: Department of Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel
*Contact email: oferher@bgu.ac.il, gilboan@bgu.ac.il, eyalfe@bgu.ac.il, shitrits@bgu.ac.il

Abstract

Peer to peer file sharing is dasiaboomingpsila, but meanwhile censorship of these networks and prosecution of users that share censored content are growing just as quickly. In this paper, we propose a novel notion of deniability as an easy and efficient method for users to avoid censorship and prosecution. The fundamental concept is that a given data element, which contains controversial or censored content, is also associated with neutral-content material. Hence, even a powerful adversary capable of monitoring all communication in the network and viewing the internal state of participating hosts is unable to prove a link between censored content and a user. The communication overhead required to retrieve a document is only four times greater than what is needed in a standard network. The storage required for a document is only twice as large as the document itself. Deniability is an elegant alternative to user anonymity in P2P file sharing networks. Systems that provide anonymity for users typically require greater overhead and do not guarantee anonymity against powerful, real-world adversaries.