earticle

논문검색

F-Crowds : An Anonymity Scheme for P2P File-Sharing

초록

영어

The traditional encryption methods pay more attention to the confidentiality of the message content, but ignore the protection of identity information to the communicating parties. By encrypting, the contents of the communication acquired by attackers became relatively difficult, but they can still found the identity information of the two sides to communicate easily because in the TCP / IP protocol, the sender and receiver of the message are exposed. The anonymity communication technology, is used to solve this problem. The first anonymity communication technology can date back to 1981, Chaum proposed MIX [1] which is a very important technology for reference by a number of researchers of anonymity communication. The rapid development of the Internet has made things convenience to people, but also led to more personal information exposed to the public. As a result, a growing number of areas that required anonymity communication technology to protect the user's privacy. P2P file-sharing is not exception. P2P is undoubtedly the most popular way for file-sharing, but popular P2P file-sharing protocols, such as BitTorrent, can’t provide users anonymity communication service. Many people choose to build upon existing anonymous communication tools, such as Tor, to achieve anonymous P2P file transfer, but Tor primarily provides anonymous service for web browsing, instant message or other low latency applications. A large number of P2P file traffic will seriously threaten the service of Tor. Therefore, the anonymity communication service specifically for P2P file sharing system is very important. In this paper, we presents an anonymity communication scheme specifically for P2P file-sharing networks called F-Crowds which based on Crowds [2] to provide an adjustable anonymity service for P2P file-sharing.

목차

Abstract
 1. Introduction
  1.1. Crowds
  1.2. BitTorrent
 2. F-NODE
 3. Tradeoff between Anonymity and Performance
 4. Anonymity Analysis
 5. Conclusion
 Acknowledgements
 References

저자정보

  • Tianbo Lu School of Software Engineering, Beijing University of Posts and Telecommunications, 100876, Beijing, China
  • Xinyuan Zhang School of Software Engineering, Beijing University of Posts and Telecommunications, 100876, Beijing, China
  • Xiaofeng Du School of Computer Science, Beijing University of Posts and Telecommunications, 100876, Beijing, China
  • Yang Li School of Software Engineering, Beijing University of Posts and Telecommunications, 100876, Beijing, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.