Font Size: a A A

P2p Anonymous Communication Technology Research

Posted on:2009-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:C Y HuoFull Text:PDF
GTID:2208360272472957Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With Internet developing, as an important distributed computing technology, P2P is used broadly in file sharing, peer computing and cooperative task. P2P network is valued by people more and more, but the safe problem is an important aspect that influences the P2P network development. Because of open and malicious node indeterminism in P2P networks, which makes the privacy of the network user be subjected to illegally eavesdrop more easily. An adversary can gain knowledge about not only the content of the files being transferred but also the identity of sender and receiver of the files. However, the best method of solving the privacy protection is an anonymous technique, so it has the important theory meaning and realistic meaning to study the anonymous technique in P2P network.Based on Studying previous anonymous technologies, analyzing characteristics of P2P networks and its anonymous requiring, there are two key contributions in this paper:(1)Designing and studying a bidirectional anonymity P2P communication protocol—BACP. It combines thoughts of Crowds and multicast and forwards messages randomly in members to achieve sender anonymity. When messages are decided to submit, the messages are submitted to responder by multicast so as to realize recipient anonymity, which makes both sender and receiver anonymous. And then we analyze and study security of protocol.(2)Studying and analyzing predecessor attack, one of well-known attacks in rerouting anonymous communication system based on P2P networks. Predecessor attack can make the attacker gain identity information of initiator that communicates with the same destination repeatedly over time, so destroy anonymity of system. Based on studying to construct rerouting path, we have shown that, in the case of invariable members in anonymous system, the probability of initiator identity revealed by attacker is related with the probability of path constructed by initiator and numbers of path.Finally, we prospect and summarize P2P anonymous communication technology, and announce direction and target for more.
Keywords/Search Tags:P2P networks, privacy protection, anonymous communication, anonymous protocol
PDF Full Text Request
Related items