Font Size: a A A

Anonymous Communication System Theory And Applied Research

Posted on:2012-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y W ZhouFull Text:PDF
GTID:2208330335471182Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Internet is developing rapidly and accepted widely as an important means of communication and information dissemination. Meanwhile the issues of security and privacy of Internet become increasingly critical. According to domestic and international investigation, users'significant concern is their privacies while surfing on the Internet. Furthermore, in some special application fields (such as E-health, E-cash, E-commerce or E-voting), the protection degree of private information is one of the most important criteria to evaluate the overall system security. In order to solve these problems, anonymity technology was proposed to protect user's privacy. However, while there are extensive researches and applications of anonymity, the shortcomings and deficiencies of anonymity, such as the lack of supervision, control and solving measures, have already emerged. Accordingly, the anonymous communication system has an obvious disadvantage of controlability and security. In addition, the anonymous communication model in related network environment (such as e Internet, Wireless Local Area Network, Ubiquitous Computing, etc.) has focus on the maturation and development of network environment. In conclusion, this paper not only focuses on theory and application of anonymous communication model, moreover, but probes into the controllable and trusted anonymous communication scheme and the trusted of anonymous communication model for mobile Internet.The research content is as follow:(1) With the deep research on trusted computing, the security of PC and network has been improved greatly. Nevertheless the integration of anonymous technology and trusted computing is not so well and lacks the research on anonymous communication scheme based on trusted computing. Therefore, a controllable and trusted anonymous communication scheme is proposed in this paper, providing revocable anonymous service for the users. The scheme introduces Authentication Management Center to complete the users'identity registration based on the group signature, the encryption mechanism of layer upon layer to guarantee the anonymity of communication, the feedback mechanism between the target host and the AMC to control the user vicious anonymous behaviors, the node server to preserve and manage all the trusted nodes by renewing at times and removing the untrusted nodes, and the technologies of integrity measurement mechanism, transitive trusted chain, remote authentication and Direct Anonymous Attestation to assure the credibility, security and dependability of the communication system, the model of which provides the controllable anonymous services and advanced security protection for the users.(2) The publication of TCG MTM standard ensures the safety of mobile terminals, but its promotion results in the changes of communication on mobile terminals. So this thesis proposes an access mechanism to trusted mobile platform (mobile terminals with MTM chips, TMP) on mobile Internet. This mechanism introduces TMP and Internet ISP of strategy decider management field, defines an extended service set as a service field, and defines two visit mode of TMP on mobile Internet-self field service and cross field access. The progress of each mode is described in details. Cross field access mode is defined as roaming service and resource request. The trusted evaluation system of TMP access mechanism is specifically described. Universal combinational safe mode is used to analyze the safety of the two TMP access. The analysis shows that this mechanism brings about trusted TMP access on mobile Internet and is safe, practical and high efficient.(3) The integrated anonymous browser based on Linux and Tor is designed to protect the privacy of users'information, the broswer of which could offer privacy protection under Linux circumstance.The integration of software makes the anonymous service simple and convenient for users. The test shows that data packets sent through Tor by browser have been encrypted and the users'identity information has been concealed. It protects users'privacy effectively.(4) The trusted anonymous access authentication protocol was proved in this article based on TPM-Emulator which is simulation software of security chip Trusted Platform Model. This provement provides a basis for further model provement research...
Keywords/Search Tags:Anonymity Communication, Trust Computing, Mobile Internet, Trusted Platform Model (TPM)
PDF Full Text Request
Related items