Securing anonymity in P2P network

B. R. Kim, Ki Chang Kim, Yoo-Sung Kim
{"title":"Securing anonymity in P2P network","authors":"B. R. Kim, Ki Chang Kim, Yoo-Sung Kim","doi":"10.1145/1107548.1107606","DOIUrl":null,"url":null,"abstract":"Basically flooding-based P2P systems provide anonymity and thus it is not possible to find the initial sender of packet and the designated receiver of that packet. However it does not provide anonymity where the IP addresses of nodes uploading and downloading contents are revealed. So in order to maintain anonymity we propose and test our techniques that the receiver node of response packets on retrieval query is agent node and the agent node provides contents service between server and client. Through the proposed techniques it was found that the identity of node is secured without using encryption techniques which have been deployed in the former anonymity protection techniques and control data communications through all the nodes located between server and client. The application of this concept of which result was evaluated may be extended to many other current P2P systems under operation.","PeriodicalId":391548,"journal":{"name":"sOc-EUSAI '05","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"sOc-EUSAI '05","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1107548.1107606","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Basically flooding-based P2P systems provide anonymity and thus it is not possible to find the initial sender of packet and the designated receiver of that packet. However it does not provide anonymity where the IP addresses of nodes uploading and downloading contents are revealed. So in order to maintain anonymity we propose and test our techniques that the receiver node of response packets on retrieval query is agent node and the agent node provides contents service between server and client. Through the proposed techniques it was found that the identity of node is secured without using encryption techniques which have been deployed in the former anonymity protection techniques and control data communications through all the nodes located between server and client. The application of this concept of which result was evaluated may be extended to many other current P2P systems under operation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
确保P2P网络的匿名性
基本上,基于泛洪的P2P系统提供匿名性,因此不可能找到数据包的初始发送者和该数据包的指定接收者。但是,由于上传和下载内容的节点的IP地址被公开,因此不能提供匿名性。因此,为了保持匿名性,我们提出并测试了我们的技术,即检索查询响应包的接收节点为代理节点,代理节点在服务器和客户端之间提供内容服务。通过所提出的技术,发现节点的身份是安全的,而不使用在以前的匿名保护技术中部署的加密技术,并通过位于服务器和客户端之间的所有节点控制数据通信。这一概念的应用结果进行了评估,可以扩展到许多其他当前的P2P系统在运行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Task planning for human-robot interaction Gesture spotting using wrist worn microphone and 3-axis accelerometer Wireless sensor network node with asynchronous architecture and vibration harvesting micro power generator Users want simple control over device selection User requirements for intelligent home environments: a scenario-driven approach and empirical cross-cultural study
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1