Font Size: a A A

Key Technology Of Distributed Anonymous Communication

Posted on:2013-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:H B YuFull Text:PDF
GTID:2248330374985178Subject:Information security
Abstract/Summary:PDF Full Text Request
With the popularization and development of computer networks, people call forthe higher protection of personal privacy and information security while they getconvenience afforded by computer networks. As an importment branch of research inthe field of network security, Anonymous communication is becoming one of the hotspots in the area of information security. Anonymous communication protects people’sprivacy and confidential communications via hiding the sender and recipient’s identityor the communication entities’ relationship. For special applications, Anonymouscommunication has practical significance on internet, as well as denfense and militarysecurity.At first, this thesis analysed the background, current situation, concepts andtechnologies of anonymous communication, gave a bief introduction of several provenanonymous conmmunication systems, classified the proven anonymous according totheir thchnology, explored the threats mechanism, anonymous performance andanonymity.Secondly, this thesis proposed a new anonymous communication system calledDAN which is based on onion routing and crowds. In particular, DAN proposed acustomizable anonymous level of groupig anonymous conmmunication model which isbased on P2P and re-routing technology. Anonymous level that can be customizedprovide users with a choice of anonymous services. DAN can provide senderanonymity service. In addition, there is no P2P node could get the sufficient knowledgeto acquire the DAN’s global network topology, which ensured the privacy of the entireanonymous network.According to DAN’s operation mode, this thesis has gave a detailed desription ofDAN’s deployment, delivery protocol and system architecture, elaborated the buildingprocess of anonymous circuit thoroughly, and delineated the agent node, intermediatenode, directory server and other key members in DAN explicitly.Finnally, implement the key modules of DAN prototype system and achieve a detailed testing on it. The result of test shows that the prototype system achieved thedesired goals in anonymity and efficieny.
Keywords/Search Tags:Anonymous communication, P2P, re-routing technology, customizableanonymous level, grouping
PDF Full Text Request
Related items