Skip to content

Privacy preserving DHTs #8

@gpestana

Description

@gpestana

Distributed hash tables are powerful protocols that enable content discovering and routing in P2P networks. In "vanilla" DHT implementations (e.g. Kademlia), peer interactions leak a lot of information about who is in the network, who stores what files and who are the producers and consumers of content. This gives potential attackers a good picture of the network very easily and hinders anonymous and private interactions over P2P DHT overlay networks.

The desirable properties of a private and metadata resistant DHT are:

  1. Anonymity for producers of content: tracking down who was the originator of content stored in the DHT should not be possible.
  2. Anonymity for consumers of content: nodes that request content from the DHT should not be linked to the requested content by external actors.
  3. Plausible deniability of the files hosted in the network nodes: when peers query for content in the DHT, they should not be able to identify which peers are storing the content.

The main goal of this research thread is to survey and develop schemes that would improve DHT protocol's privacy without affecting performance and usability.

Questions

  • What is the threat model for DHTs (security and anonymity)?
  • What are the solutions out there for private and metadata resistant DHTs?
  • What are the attack vectors for current DHT implementations and applications (e.g. IPFS)?
  • Are there any schemes and techniques for hiding metadata in large DHTs without relying on external systems (e.g. Tor), while keeping performance?

Enabler questions

  • What are the best techniques and tools for measuring DHT performance in the wild?

Development

  • PoC of protocol and primitives which improve DHT privacy

Metadata

Metadata

Assignees

No one assigned

    Labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions