期刊文献+

Mapper:一种基于组播的Peer-to-Peer文件匿名访问协议 被引量:1

Mapper:A Multicast-Based Peer-to-Peer File Anonymous Retrieval Protocol
下载PDF
导出
摘要 Peer to Peer(P2P)文件系统的一个基本问题是如何在保护节点隐私的基础上为数据访问提供高效服务 .Mapper将IP组播技术和多级代理转发技术相结合 ,解决了P2P文件访问的相互匿名问题 .协议还通过MRFC算法将组成员筛选和缓存位置选择有机统一 ,在减少组播开销的同时保证了文件布局对用户访问模式的动态自适应性 .实验表明 ,Mapper能有效缓解网络负载 ,提高数据的易获取性 ,具有良好的伸缩性和自适应性 . A fundamental problem of Peer-to-Peer file sharing system is how to protect the privacy and anonymity of nodes while providing efficient data access service. We presented a Multicast-based Peer-to-Peer file anonymous retrieval protocol called Mapper. By the combination of IP multicast technology and Multi-proxy forwarding technology, Mapper satisfies the requirements of mutual anonymity during the file access process. The protocol also integrates group member selection with cache position selection via MRFC (Most Requested Frequency Caching) algorithm, thus file distribution can be adjusted adaptively with respect to dynamic usage patterns and multicast overhead can be controlled. The experimental results show that Mapper can alleviate network traffic, reduce access delay efficiently, and has the merits of scalability, reliability and adaptability.
出处 《电子学报》 EI CAS CSCD 北大核心 2004年第5期754-758,共5页 Acta Electronica Sinica
基金 国家重点基础研究发展规划项目 (No .2 0 0 2CB31 2 0 0 2 ) 国家 863高科技项目 (No .2 0 0 1AA1 1 30 50 )
关键词 P2P 匿名 IP组播 缓存 Algorithms Cache memory Data communication systems Multicasting Network protocols Reliability Routers
  • 相关文献

参考文献12

  • 1Oram A.Peer-to-Peer:Harnessing the Benefits of a Disruptive Technology[M].California:O'Reilly and Associates,Inc,Mar 2001.
  • 2Dingledine R,Freedman M J,Molnar D.The free haven project:Distributed anonymous storage service[A].In Proceedings of International Workshop on Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Unobservability[C].Berkeley.CA:Springer-
  • 3http://www.anonymizer.com.
  • 4Gabber E,Gibbons P,Kristol D,et al.Consistent,yet anonymous,web access with LPWA[J].Communications of the ACM,1999,42(2):42-47.
  • 5Chaum D.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88.
  • 6Reed M,Syverson P,Goldschlag D.Proxies for anonymous routing[A].In Proceedings of 12th Annual Computer Security Applications Conference[C].San Diego,CA:IEEE CS Press,December 1996.95-104.
  • 7Reiter M K,Rubin A D.Crowds:Anonymity for web transactions[J].ACM Transactions on Information and System Security,1998,1(1):66-92.
  • 8Shields C,Levine B N.A protocol for anonymous communication over the Internet[A].In proceedings of 7th ACM Conference on Computer and Communications Security[C].Athens,Greece:ACM Press,2000.33-42.
  • 9Clips.The Gnutella Protocol Specifications v0.4[EB/OL].http://dss.clip2.com/GnutellaProtocol04.pdf.
  • 10Clarke I,Sandberg O,Wiley B,et al.Freenet:A distributed anonymous information storage and retrieval system[A].In Proceedings of International Workshop on Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Unobservability[C].Berkeley.C

共引文献1

同被引文献8

  • 1Napster-file sharing system[EB/OL]. http://www.napster.com/,2005 - 05.
  • 2Clips. The Gnutella Protocol pecifications v0.4[EB/OL]. http:/dss. clio2. com/Gnutella Protocol 04. pdf, 2005 - 05.
  • 3Clarke I, Sandberg O, Wiley B, et al. Freenet: A distributed anonymous information storage and retrieval system[A]. Proceedings of International Workshop on Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Unobservability[C].Berkeley. CA: Springer'Verlag, 2001.46 -66.
  • 4Searlata V, Levine BN, Shields C. Responder anonymity and anonymous peer to peer file sharing[A]. Proceedings of the 9th International Conference on Network Protocols( ICNP2001 )[C].Riverside, CA: IEEE Computer Society, 2001.272 - 280.
  • 5Reed M, Syverson P, Goldschlag D. Proxies for anonymous routing[A]. Proceedings of 12th Annual Computer Security Applications Conference[C]. Sandiego, CA: IEEECS Press, 1996.95-104.
  • 6Reiter MK, Rubin AD. Crowds: Anonymity for Web transactions[J]. ACM Transaction Information and System Security, 1998, 1(1):66 - 92.
  • 7王伟平,陈建二,王建新,眭鸿飞.基于组群的有限路长匿名通信协议[J].计算机研究与发展,2003,40(4):609-614. 被引量:20
  • 8王伟平,陈建二,陈松乔,王建新.匿名通信中短距离优先分组重路由方法的研究[J].软件学报,2004,15(4):561-570. 被引量:17

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部