期刊文献+

可信计算模式下P2P匿名通信系统设计 被引量:1

Design of P2P Anonymous Communication System Based on Trusted Computing
下载PDF
导出
摘要 为了提高P2P匿名通信系统的安全性与可信性,需要对P2P匿名通信系统进行设计;当前使用的匿名通信系统,无法在用户节点匿名的情况下,保证P2P匿名通信系统匿名节点的可信性;因此,提出一种基于可信计算模式的P2P匿名通信系统设计方法;该系统的硬件部分分为系统登录模块、通信模块、数据模块、可信计算模块4大模块,模块之间相互合作,形成一个完整的匿名通信系统,匿名通信系统软件设计部分通过建立可信计算的联接,实现在匿名通道中进行数据传递,并对待传递的数据进行层次性打包加密,同时采用可信度计算对匿名通信系统中节点、匿名通道进行计算,形成安全可信的匿名传递通道;实验仿真证明,该方法在保证该系统数据传递的效率的同时提高了匿名通信系统的安全性与可靠性。 In order to improve the safety and reliability of P2P anonymous communication system,the need to design P2P anonymous communication system.Anonymous communication system currently in use,not in the anonymous user node,to ensure the credibility of P2P anonymous communication system of anonymous nodes.Therefore,puts forward a design method of P2P anonymous communication system based on trusted computing model The hardware part is divided into system login module,communication module,data module,trusted computing module 4 modules,mutual cooperation between modules,to form a complete anonymous communication system,anonymous communication system software design through the connection establishment of trusted computing,Realization of data transmission in the anonymous channel,and the level of data transfer encryption package to the credibility of the calculation,the node in anonymous communication system,anonymous channel is calculated,the formation of a safe and reliable delivery channel.Anonymous experiments show that this method improves the safety and reliability of the anonymous communication system to ensure efficiency the system of data transmission at the same time.
作者 雷涛
出处 《计算机测量与控制》 2017年第8期268-271,共4页 Computer Measurement &Control
基金 广东省省级科技计划项目(2013B010204019)
关键词 可信计算 匿名通信系统 P2P trusted computing P2P anonymous communication system
  • 相关文献

参考文献10

二级参考文献123

  • 1谢钧,许峰,黄皓.基于可信级别的多级安全策略及其状态机模型[J].软件学报,2004,15(11):1700-1708. 被引量:19
  • 2黄强,沈昌祥,陈幼雷,方艳湘.基于可信计算的保密和完整性统一安全策略[J].计算机工程与应用,2006,42(10):15-18. 被引量:26
  • 3李振宇,谢高岗.基于DHT的P2P系统的负载均衡算法[J].计算机研究与发展,2006,43(9):1579-1585. 被引量:26
  • 4刘柯萍,危韧勇,谷科.一种解决P2P网络路由热点问题的策略[J].计算机工程与应用,2007,43(6):108-111. 被引量:4
  • 5林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 6Hong J I,Landay J A.An architecture for privacy-sensitive ubiquitous computing[C] //Proceedings of the 2nd international conference on Mobile systems,applications,and services.New York:ACM,2004:177-189.
  • 7Yiu M L,Jensen C S,Huang X,et al.SpaceTwist Managing the Trade-Offs Among Location Privacy,Query Performance,and Query Accuracy in Mobile Services[C] // IEEE 24th International Conference on Data Engineering.Cancun:ICDE,2008:366-375.
  • 8Gruteser M,Grunwald D.Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking[C] //Proceedings of the 1st international conference on Mobile systems,applications and services.New York:ACM,2003:31-42.
  • 9Chow C Y,Mokbel M F,Aref W G.Casper *:Query processing for location services without compromising privacy[J].ACM Transactions on Database Systems,2009,34 (4):24-48.
  • 10Chow C Y,Mokbel M F.Enabling private continuous queries for revealed user locations[C] //Proceedings of the 10th international conference on Advances in spatial and temporal databases.Berlin Heidelberg:Springer-Verlag,2007:258-273.

共引文献45

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部