期刊文献+

网络匿名度量研究综述 被引量:4

Survey on Anonymity Metrics in Communication Network
下载PDF
导出
摘要 保护网络空间隐私的愿望推动了匿名通信系统的研究,使得用户可以在使用互联网服务时隐藏身份和通信关系等敏感信息,不同的匿名通信系统提供不同强度的匿名保护.如何量化和比较这些系统提供的匿名程度,从开始就是重要的研究主题,如今愈发得到更多关注,成为新的研究焦点,需要开展更多的研究和应用.匿名度量可以帮助用户了解匿名通信系统提供的保护级别,帮助开发者在设计和改进匿名通信系统时提供客观和科学的依据.给出了匿名度量研究的通用框架,包含匿名通信、匿名攻击和匿名度量这3部分及其相互关系.综述了匿名度量领域的研究工作,寻找其发展脉络和特点,按时间线回顾和归纳基于多种理论和方法的匿名度量标准,结合匿名通信攻击技术,对典型的度量方法各自的特点和相互关系进行梳理和比较,介绍度量研究新的进展,展望研究的下一步方向和发展趋势.分析表明,匿名度量有助于判断匿名通信系统是否提供了所承诺的匿名性.用于表达匿名程度的度量标准越来越多样,基于信息论的度量方法应用最为广泛,随着Tor等匿名通信系统的大规模部署,出现了基于统计数据针对真实系统和基础设施进行的匿名性评估.随着匿名技术的进一步发展,如何扩展度量标准应用于新出现的匿名技术、如何组合度量标准以适用于新的匿名系统,都是有应用前景的研究方向. The desire to protect privacy in cyberspace has promoted the design of anonymous communication systems.Anonymity ensures that users do not expose sensitive information such as identity and communication relationship when using Internet services.Different anonymous communication systems provide different strength of anonymity protection.How to quantify and compare the degree of anonymity has been an important research topic since its beginning.And now it is getting more and more attention,and becoming a new research focus,more researches and applications are necessary to be carried out.Anonymity metrics can help users understand the levels of protection achieved through anonymous communication systems,and help developers gain objective and scientific basis for designing and improving anonymous communication systems.A general framework for anonymity metrics research is presented,including anonymous communication technology,attacks against anonymous communication technology,anonymity metrics,and their relationships.This study surveyed the researches in anonymity metric field,looking for their development and characteristics.A variety of theories and methods of anonymity metrics were reviewed and summarized following the time line.Considering attacks against anonymous communication,the characteristics and mutual relations of typical metric methods were sorted out,analyzed,and compared.And the new progresses were introduced,looking forward to the research direction and development trend.The analysis shows that anonymity metrics help to determine whether anonymous communication systems can provide promised anonymity,the metrics are becoming more diverse,and the metrics based on information theory are the most widely used.With the large-scale deployment of anonymous communication systems such as Tor,evaluations for real practical systems and infrastructures based on statistical data have emerged.New anonymous technologies have been developed rapidly recently,how to extend the metrics to the emerging technologies and how to combine different metrics to adapt to the emerging systems are the new research directions with solid application prospects.
作者 赵蕙 王良民 申屠浩 黄磊 倪晓铃 ZHAO Hui;WANG Liang-Min;SHEN Tu-Hao;HUANG Lei;NI Xiao-Ling(School of Computer Science and Communication Engineering,Jiangsu University,Zhenjiang 212013,China;Jiangsu Key Laboratory for Industrial Network Security Technology(Jiangsu University),Zhenjiang 212013,China)
出处 《软件学报》 EI CSCD 北大核心 2021年第1期218-245,共28页 Journal of Software
基金 国家自然科学基金(U1736216,61702233)。
关键词 网络匿名通信系统 匿名性 度量 匿名集 anonymous communication system anonymity metric anonymity set entropy
  • 相关文献

参考文献8

二级参考文献67

  • 1赵克勤.集对分析对不确定性的描述和处理[J].信息与控制,1995,24(3):162-166. 被引量:150
  • 2Bamford J. The NSA is building the country's biggest spy center (watch what you say) [OL]. [2015-05-23]. http:// www. wired, com/2012/03/ff_nsadatacenter.
  • 3Moghaddam H, Li B, Derakhshani M, et al. SkypeMorph: Protocol obfuscation for tor bridges [C] //Proc of the 19th ACM Conf on Computer and Communications Security. New York: ACM, 2012:97-108.
  • 4Weinberg Z, Wang J, Yegneswaran V, et al. StegoTorus: A camouflage proxy for the Tor anonymity system [C]//Proc of the 19th ACM Conf on Computer and Communications Security. New York: ACM, 2012:109-120.
  • 5Wang Q, Gong X, Nguyen G T K, et al. CensorSpoofer: Asymmetric communication using IP spoofing for censorship- resistant Web browsing [C] //Proc of the 19th ACM Conf on Computer and Communications Security. New York: ACM, 2012:121-132.
  • 6Houmansadr A, Riedl T J, Borisov N, et al. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention [C] //Proc of the 20th Annual Network and Distributed System Security Symp. Reston, VA: The Internet Society, 2013:1-17.
  • 7Chaum D L. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981, 24(2): 84-90.
  • 8Dingledine R, Mathewson N, Syverson P. Tor: The second- generation onion router [C] // Proc of the 13th Conf on USENIX Security Symp. Berkeley, CA: USENIX Association, 2004:303-320.
  • 9Department of Business Informatics, University of Regensburg. JAP: The JAP anonymity b- privacy homepage [OL]. [2015-05-23]. http://anon, inf. tu-dresden, de.
  • 10Pfitzmann A, Hansen M. A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management [OL]. [2015-05-23]. http://dud, inf. tu-dresden. de/literatur/Anon_Terminology_v0.34, pdf.

共引文献186

同被引文献14

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部