Free Haven Project
The Free Haven Project was formed in 1999 by a group of Massachusetts Institute of Technology students with the aim to develop a secure, decentralized system of data storage.[1] The group's work led to a collaboration with the United States Naval Research Laboratory to develop Tor, funded by DARPA.[2][3]
Distributed anonymous storage system
The Project's early work focused on an anonymous storage system, Free Haven, which was designed to ensure the privacy and security of both readers and publishers.[4][5] It contrasts Free Haven to anonymous publishing services to emphasize persistence rather than accessibility. Free Haven is a distributed peer-to-peer system designed to create a "servnet" consisting "servnet nodes" which each hold fragments ("shares") of documents, divided using Rabin's Information dispersal algorithm such that the publisher or file contents cannot be determined by any one piece.[6][7][8] The shares are stored on the servnet along with a unique public key. To recover and recreate the file, a client broadcasts the public key to find fragments, which are sent to the client along anonymous routes. For greater security, Free Haven periodically moves the location of shares between nodes.[9][10]
Its function is similar to Freenet but with greater focus on persistence to ensure unpopular files do not disappear.[11] The mechanisms that enable this persistence, however, are also the cause of some problems with inefficiency.[12] A referral- or recommendation-based "metatrust" reputation system built into the servnet attempts to ensure reciprocity and information value by holding node operators accountable.[13][14][15] Although nodes remain pseudonymous, communication is facilitated between operators through anonymous email.[16]
Work with Tor
Tor was developed to by the US Naval Research Laboratory and the Free Haven Project to secure government communications, with initial funding from the US Office of Naval Research and DARPA. Tor was deployed in 2003, as their third generation of deployed onion routing designs.[2] In 2005, the Electronic Frontier Foundation provided additional funding to the Free Haven Project.[2] In 2006, the Tor Project was incorporated as a non-profit organization.[2]
References
- ↑ "Free Haven". Freehaven.net. Free Haven Project. Retrieved 4 June 2014.
- 1 2 3 4 Dingledine, R.; Mathewson, N.; Syverson, P. (2007). "Deploying Low-Latency Anonymity: Design Challenges and Social Factors" (PDF). IEEE Security & Privacy 5 (5): 83–87. doi:10.1109/MSP.2007.108.
- ↑ Jordan, Tim (2008). "The Politics of Technology: Three Types of 'Hacktivism'". In Häyhtiö, Tapio; Rinne, Jarmo. Net Working/Networking: Citizen Initiated Internet Politics. University of Tampere. p. 267. ISBN 9789514474644.
- ↑ Hansen, J. A. (March 2010). "Adding privacy and currency to social networking". 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). Mannheim. pp. 607–612. doi:10.1109/PERCOMW.2010.5470508.
- ↑ Hermoni, O.; Gilboa, N.; Felstaine, E.; Shitrit, S. (January 2008). "Deniability — an alibi for users in P2P networks" (PDF). 3rd International Conference on Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. Communication Systems Software and Middleware and Workshops. pp. 310–317. doi:10.1109/COMSWA.2008.4554432. Retrieved 3 June 2014.
- ↑ Dingledine, R., Freedman, M. J., & Molnar, D. (2001). "The Free Haven Project: Distributed Anonymous Storage Service" (PDF). Lecture Notes in Computer Science 2009. Proc. Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag. Retrieved 2 June 2014.
- ↑ Mayeba, M., Mirembe, D. P., Otto, F. (2007). "Analysis of Free Haven anonymous storage and publication system" (PDF). Proceedings of SREC'07, Kampala, Uganda. SREC'07. Kampala, Uganda. pp. 380–389. Retrieved 3 June 2014.
- ↑ Chothia, T.; Chatzikokolakis, K. (2005). "A Survey of Anonymous Peer-to-Peer File-Sharing" (PDF). Lecture Notes in Computer Science. Embedded and Ubiquitous Computing – EUC 2005 Workshops. Springer Berlin Heidelberg. pp. 744–755. doi:10.1007/11596042_77. Retrieved 3 June 2014.
- ↑ Perng, G.; Reiter, M. K.; Wang, C. (June 2005). "Censorship Resistance Revisited" (PDF). Information Hiding. 7th International Workshop, IH 2005. Barcelona, Spain: Springer Berlin Heidelberg. pp. 62–76. doi:10.1007/11558859_6. Retrieved 3 June 2014.
- ↑ Xiao, R. (July 2008). "Survey on Anonymity in Unstructured Peer-to-Peer Systems" (PDF). Journal of Computer Science and Technology 23 (4): 660–671. doi:10.1007/s11390-008-9162-7.
- ↑ Oram, Andy (2001). Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O'Reilly Media.
- ↑ Yianilos, P. N. & Sobti, S. (September–October 2001). "The evolving field of distributed storage" (PDF). IEEE Internet Computing 5 (5): 35–39. doi:10.1109/4236.957893.
- ↑ Sniffen, B. T. (22 May 2000). "Trust Economies in the Free Haven Project" (PDF). Thesis. Massachusetts Institute of Technology. Retrieved 3 June 2014.
- ↑ Caviglione, L. (2006). "Introducing emergent technologies in tactical and disaster recovery networks". International Journal of Computer Systems 19: 1045–1062. doi:10.1002/dac.802.
- ↑ Viljanen, L. (August 2005). "Towards an Ontology of Trust" (PDF). Trust, Privacy, and Security in Digital Business. Second International Conference, TrustBus 2005. Copenhagen, Denmark: Springer Berlin Heidelberg. pp. 175–184. doi:10.1007/11537878_18. Retrieved 3 June 2014.
- ↑ Oppliger, R. (October 2005). "Privacy-enhancing technologies for the world wide web". Computer Communications 28 (16): 1791–1797. doi:10.1016/j.comcom.2005.02.003.
External links
|