期刊文献+

P2P文件共享网络中的用户隐私泄露 被引量:1

User privacy exposure in P2P file-sharing networks
原文传递
导出
摘要 针对当前流行的Kad文件共享网络,在真实网络中进行相关实验,对中国用户的内容隐私泄露情况进行了系统的测量和研究。实验采用Dragonfly监测系统,能够持续监测Kad网络中与敏感关键词相关的文件共享事件,获取被共享的隐私文件元信息;然后利用隐私文件的唯一性特性,可以有效识别出用户的隐私文件,从而评估整个网络中用户的隐私泄露情况。实验结果显示:针对随机选定的10个敏感关键词,在2个星期内中国Kad用户总共共享了超过900个隐私文件。这些隐私文件分布在中国各个地区,其中将近30%来自北京,凸显了该地区用户隐私保护意识的薄弱。这些实验结果表明:该类隐私泄露已经广泛存在于Kad网络中,并对P2P用户的隐私产生了巨大的威胁。 This study investigates Chinese user " content privacy " exposures in Kad,one of the biggest P2Pfile sharing networks,using the monitoring system Dragonfly.Dragonfly passively monitors sharing and downloading events related to privacy-sensitive keywords in Kad that reveal meta-information in private files.The uniqueness of this data can be used to identify private files,which could then be used to deduce privacy exposures in the whole network.Tests show that within two weeks,more than nine hundred private files related to ten sensitive keywords were shared by Kad users.These private files were widely distributed all over China with about 30% coming from Beijing,which indicates a serious lack of privacy protection awareness.These results show that this privacy problem has become a serious threat for P2Pusers.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第10期1435-1439,共5页 Journal of Tsinghua University(Science and Technology)
基金 智能电网业务应用安全防护关键技术研究与应用(EPRIXXKJ[2012]2986)
关键词 对等网络(P2P) 文件共享 KAD 隐私保护 peer-to-peer(P2P) file-sharing Kad privacy protection
  • 相关文献

参考文献18

  • 1Steiner M,Biersack E W,Ennajjary T.Actively monitoringpeers in Kad[C] //Proceedings of the 6th InternationalWorkshop on Peer-to-Peer Systems.Bellevue,USA:Microsoft Research,2007.
  • 2YU Jie,XIAO Peng,Li Zhoujun,et al.Toward an accuratesnapshot of DHT networks[J].IEEE CommunicationsLetters,2011,15(1):97-99.
  • 3Ipoque.Official homepage[Z/OL].(2012-06-12),http://www.ipoque.com.
  • 4Scarlata V,Levine B,Shield C.Responder anonymity andanonymous peer-to-peer file sharing[C] //Network ProtocolsNinth International Conference on ICNP 2001.Mission Inn,Riverside USA:IEEE Computer Society,2001:272-280.
  • 5Dingledine R,Freedman M,Molnar D.The free havenproject:Distributed anonymous storage service[C] //Designing Privacy Enhancing Technologies.Berkeley,USA:Springer,2001:67-95.
  • 6Clarke I,Sandberg O,Wiley B,et al.Freenet:A distributedanonymous information storage and retrieval system[C] //Designing Privacy Enhancing Technologies.Berkeley,USA:Springer,2001:46-66.
  • 7Bennett K,Grothoff C,Horozov T,et al.Gnunet—A trulyanonymous networking infrastructure[C] //PrivacyEnhancing Technologies Workshop.San Francisco,USA:Citeceer,2002.
  • 8Isdal T,Platek M,Krishnamurthy A,et al.Privacy-preserving P2P data sharing with oneswarm[J].ACM SIGCOMM Computer Communication Review,2010,40(2):111-122.
  • 9Good N,Krekelberg A.Usability and privacy:A study ofKazaa P2Pfile-sharing[C] //Proceedings of the SIGCHIConference on Human Factors in Computing Systems.Vienna,Austria:ACM,2003:137-144.
  • 10Davidson A.Peer-to-peer file sharing privacy and security[Z/OL].(2012-06-10),https://www.cdt.org/testimony/030515davidson.shtml.

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部