An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables

Rouvik Ray and Zhao Zhang

In Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), Montreal, Canada, July 8-11, 2007. PDF

An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about other nodes in the system and therefore compromise privacy. In this paper, we use information theory to build a model to quantify the information leak from compromised routing tables for a given DHT with certain routing geometry and route table size. Based on this model, we have analyzed and compared how existing DHTs perform in face of anonymity attacks. We found that ring-based routing geometry (Chord) performs the best among the studied DHTs with the same routing complexity when no routing optimizations are used. The analysis of the interaction between routing geometries and recipient anonymity will help improve the design of future DHTs which can achieve a balance between routing efficiency and robustness against information leak.