期刊文献+

基于P2P网络的TreeMix匿名系统 被引量:1

Anonymous System TreeMix Based on P2P
下载PDF
导出
摘要 针对P2P匿名网络存在的网络稳定性和匿名安全性的隐患问题,在非结构化P2P网络拓扑结构中引入动态形成的索引节点和基于信誉度的IP前缀节点选择算法,通过采用多通道、动态中继组等策略实现一个新的基于P2P的匿名通信系统——TreeMix系统。通过模拟实验和对相关数据的分析,证明该系统在保持可扩展性的同时,具有较强的抵抗节点失效的能力,较好地解决了匿名通信效率问题。 In order to solve the problem on channel stability and anonymous security existing in P2P based anonymous communication network, this paper presents a new P2P based anonymous communication system called TreeMix. Strategies including dynamic index peers, reputation and IP prefix based peer selection, multi-channel, dynamic relay group are introduced into unstructured P2P network to build the TreeMix System. This system is proved more resistant to peer failure without loss of extensibility and can solve the communication efficient problem better by simulation experiment and data analysis.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第3期145-147,150,共4页 Computer Engineering
基金 上海市科委发展基金资助项目(7A05722)
关键词 匿名通信 动态中继组 多通道 anonymous communication dynamic relay group multi-channel
  • 相关文献

参考文献8

  • 1Reiter M K, Rubin A D. Crowds: Anonymity for Web Transactions[J]. ACM Transactions on Information and System Security, 1998, 1(1): 66-92.
  • 2Rennhard M, Plattner B. Practical Anonymity for the Masses with Morphmix[C]//Proc. of the 8th International Conference on Financial Cryptography. Heidelberg: Springer-Verlag, 2004.
  • 3Freedman M J, Morris R. Tarzan: A Peer-to-Peer Anonymizing Network Layer[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, D. C.: [s. n.], 2002.
  • 4邹亮亮,董健全,宋金龙.基于P2P网络的匿名通讯技术的研究与实现[J].计算机工程与设计,2007,28(2):354-357. 被引量:1
  • 5Li Zhuang, Feng Zhou, Ben Y, et al. Cashmere: Resilient Anonymous Routing[Z]. (2006-10-12). http://www.cs.ucsb.edu/-rave nben/publications/pdf/cashmere-nsdi05.pdf.
  • 6Zhu Yingwu, Hu Yiming. TAP: A Novel Tunneling Approach for Anonymity in Structured P2P System[R]. Department of ECECS, Uninversity of Cincinnati, 2003-09.
  • 7李智昕,董健全,李威.新的匿名通信机制:基于P2P的匿名Socket的研究[J].计算机工程与应用,2004,40(15):168-170. 被引量:5
  • 8Scarlata V, Levine B N, Shields C. Responder Anonymity and Anonymous Peer-to-Peer File Sharing[C]//Proceedings of IEEE International Conference on Network Protocols. [S. l.]: IEEE Press, 2001.

二级参考文献17

  • 1李智昕,董健全,李威.新的匿名通信机制:基于P2P的匿名Socket的研究[J].计算机工程与应用,2004,40(15):168-170. 被引量:5
  • 2JXTA.http://www.jxta. org
  • 3http://www.cryptix.org
  • 4EricRescorla著.崔凯译.SSL与TLS Designing and Building Secure Systems[M].中国电力出版社,2002-10..
  • 5M Rennhard. MorphMix:Peer-to-Peer based Anonymous Intemet Usage with Collusion Detection[R].Technical Report Nr 147,TIK,ETH Zurich, Switzerland, 2002-08
  • 6Freedom network.http://www.freedom.net
  • 7The Anonymizer. http://www.anonymizer.eom
  • 8Goldschlag D,Reed M,Syverson P.Onion routing for anonymous and private Internet connections[J].Communications of the ACM,1999,42(2):39-41.
  • 9Rennhard M,Plattner B.Introducing MorphMix:Peer-to-Peer based anonymous internet usage with collusion detection[C].Proceedings of the Workshop on Privacy in the Electronic Society,2002.
  • 10Freedman M,Morris R.Tarzan:A peer to peer anonymizing network layer[C].Proceedings of the 9th ACM Conference on Computer and Communications Security,2002.

共引文献4

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部