Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer

We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Freedman, Michael J., Sit, Emil, Cates, Josh, Morris, Robert
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 129
container_issue
container_start_page 121
container_title
container_volume 2429
creator Freedman, Michael J.
Sit, Emil
Cates, Josh
Morris, Robert
description We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, without change to those applications. Performance tests show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route.
doi_str_mv 10.1007/3-540-45748-8_12
format Book Chapter
fullrecord <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_14881330</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3072851_18_130</sourcerecordid><originalsourceid>FETCH-LOGICAL-c381t-fdbb9d64279163f13ff4a6df1b285bbdeccf58d34f29f3523479a44dafd961ad3</originalsourceid><addsrcrecordid>eNotkM1PwzAMxcOnKLA7x164kRHXaZNIXBDiY9IEHOAcpU0CZVs7kiI0_nrSgS-W_N6zrR8hZ8CmwJi4RFpyRnkpuKRSQ7FDjjFNtgO5SzKoACgiV3tkooTcahyEwn2SMWQFVYLjIclUKcsChSiOyCTGD5YKi7KUVUauZt0QevvVtN1b_mLCj-kucpM_Oxfo0NOx59dd321W7c9oeXTDdx8W-dxsXDglB94so5v89xPyenf7cvNA50_3s5vrOW1QwkC9rWtlK14IBRV6QO-5qayHupBlXVvXNL6UFrkvlMf0KRfKcG6Nt6oCY_GEnP_tXZvYmKUPpmvaqNehXZmw0ZBoACJLvumfLyape3NB132_iBqYHnlq1ImQ3uLTI88UwP_Fof_8cnHQbkw0LkExy-bdrAcXokYm0qegIYXSmV8bEXJm</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3072851_18_130</pqid></control><display><type>book_chapter</type><title>Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer</title><source>Springer Books</source><creator>Freedman, Michael J. ; Sit, Emil ; Cates, Josh ; Morris, Robert</creator><contributor>Kaashoek, Frans ; Druschel, Peter ; Rowstron, Antony ; Kaashoek, Frans ; Rowstron, Antony ; Druschel, Peter</contributor><creatorcontrib>Freedman, Michael J. ; Sit, Emil ; Cates, Josh ; Morris, Robert ; Kaashoek, Frans ; Druschel, Peter ; Rowstron, Antony ; Kaashoek, Frans ; Rowstron, Antony ; Druschel, Peter</creatorcontrib><description>We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, without change to those applications. Performance tests show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540441793</identifier><identifier>ISBN: 3540441794</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540457488</identifier><identifier>EISBN: 9783540457480</identifier><identifier>DOI: 10.1007/3-540-45748-8_12</identifier><identifier>OCLC: 958523772</identifier><identifier>LCCallNum: TK5105.5-5105.9</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Chord Ring ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Overlay Network ; Private Address ; Relay Server ; Software ; Underlay Network</subject><ispartof>Lecture notes in computer science, 2002, Vol.2429, p.121-129</ispartof><rights>Springer-Verlag Berlin Heidelberg 2002</rights><rights>2003 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c381t-fdbb9d64279163f13ff4a6df1b285bbdeccf58d34f29f3523479a44dafd961ad3</citedby><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3072851-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-45748-8_12$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-45748-8_12$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=14881330$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Kaashoek, Frans</contributor><contributor>Druschel, Peter</contributor><contributor>Rowstron, Antony</contributor><contributor>Kaashoek, Frans</contributor><contributor>Rowstron, Antony</contributor><contributor>Druschel, Peter</contributor><creatorcontrib>Freedman, Michael J.</creatorcontrib><creatorcontrib>Sit, Emil</creatorcontrib><creatorcontrib>Cates, Josh</creatorcontrib><creatorcontrib>Morris, Robert</creatorcontrib><title>Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer</title><title>Lecture notes in computer science</title><description>We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, without change to those applications. Performance tests show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route.</description><subject>Applied sciences</subject><subject>Chord Ring</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Overlay Network</subject><subject>Private Address</subject><subject>Relay Server</subject><subject>Software</subject><subject>Underlay Network</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540441793</isbn><isbn>3540441794</isbn><isbn>3540457488</isbn><isbn>9783540457480</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2002</creationdate><recordtype>book_chapter</recordtype><recordid>eNotkM1PwzAMxcOnKLA7x164kRHXaZNIXBDiY9IEHOAcpU0CZVs7kiI0_nrSgS-W_N6zrR8hZ8CmwJi4RFpyRnkpuKRSQ7FDjjFNtgO5SzKoACgiV3tkooTcahyEwn2SMWQFVYLjIclUKcsChSiOyCTGD5YKi7KUVUauZt0QevvVtN1b_mLCj-kucpM_Oxfo0NOx59dd321W7c9oeXTDdx8W-dxsXDglB94so5v89xPyenf7cvNA50_3s5vrOW1QwkC9rWtlK14IBRV6QO-5qayHupBlXVvXNL6UFrkvlMf0KRfKcG6Nt6oCY_GEnP_tXZvYmKUPpmvaqNehXZmw0ZBoACJLvumfLyape3NB132_iBqYHnlq1ImQ3uLTI88UwP_Fof_8cnHQbkw0LkExy-bdrAcXokYm0qegIYXSmV8bEXJm</recordid><startdate>2002</startdate><enddate>2002</enddate><creator>Freedman, Michael J.</creator><creator>Sit, Emil</creator><creator>Cates, Josh</creator><creator>Morris, Robert</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2002</creationdate><title>Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer</title><author>Freedman, Michael J. ; Sit, Emil ; Cates, Josh ; Morris, Robert</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c381t-fdbb9d64279163f13ff4a6df1b285bbdeccf58d34f29f3523479a44dafd961ad3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2002</creationdate><topic>Applied sciences</topic><topic>Chord Ring</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Overlay Network</topic><topic>Private Address</topic><topic>Relay Server</topic><topic>Software</topic><topic>Underlay Network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Freedman, Michael J.</creatorcontrib><creatorcontrib>Sit, Emil</creatorcontrib><creatorcontrib>Cates, Josh</creatorcontrib><creatorcontrib>Morris, Robert</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Freedman, Michael J.</au><au>Sit, Emil</au><au>Cates, Josh</au><au>Morris, Robert</au><au>Kaashoek, Frans</au><au>Druschel, Peter</au><au>Rowstron, Antony</au><au>Kaashoek, Frans</au><au>Rowstron, Antony</au><au>Druschel, Peter</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer</atitle><btitle>Lecture notes in computer science</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2002</date><risdate>2002</risdate><volume>2429</volume><spage>121</spage><epage>129</epage><pages>121-129</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540441793</isbn><isbn>3540441794</isbn><eisbn>3540457488</eisbn><eisbn>9783540457480</eisbn><abstract>We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, without change to those applications. Performance tests show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/3-540-45748-8_12</doi><oclcid>958523772</oclcid><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2002, Vol.2429, p.121-129
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_14881330
source Springer Books
subjects Applied sciences
Chord Ring
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Exact sciences and technology
Overlay Network
Private Address
Relay Server
Software
Underlay Network
title Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T20%3A07%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Introducing%20Tarzan,%20a%20Peer-to-Peer%20Anonymizing%20Network%20Layer&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Freedman,%20Michael%20J.&rft.date=2002&rft.volume=2429&rft.spage=121&rft.epage=129&rft.pages=121-129&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540441793&rft.isbn_list=3540441794&rft_id=info:doi/10.1007/3-540-45748-8_12&rft_dat=%3Cproquest_pasca%3EEBC3072851_18_130%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540457488&rft.eisbn_list=9783540457480&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3072851_18_130&rft_id=info:pmid/&rfr_iscdi=true