Privacy-conscious P2P data sharing scheme with bogus profile distribution

被引:1
作者
Iguchi, Makoto [1 ,2 ]
Goto, Shigeki [2 ]
机构
[1] Orange Labs Tokyo, Shinjuku-ku, Tokyo 160-0022
[2] School of Science and Engineering, Waseda University, Shinjuku-ku, Tokyo 169-8555
来源
Web Intelligence and Agent Systems | 2009年 / 7卷 / 02期
关键词
Anonymity; Data sharing; Peer-to-peer; Privacy; Profile;
D O I
10.3233/WIA-2009-0163
中图分类号
学科分类号
摘要
With the increasing use of P2P (peer-to-peer) network technology in everyday services, the issue of privacy protection has gained considerable importance. This paper describes a method to realize an anonymity-conscious P2P data sharing network. The proposed network allows users to extract data possessed by other users who have similar profiles, thereby providing them with a collaborative filtering-based data recommendation. In the proposed P2P network protocol, bogus user profiles are distributed intentionally throughout the network to protect users' anonymity without harming the overall effectiveness of the data exchange. We conduct a series of simulations to prove that our proposed method protects the profile's privacy and performs efficient data exchange. © 2009 - IOS Press.
引用
收藏
页码:209 / 222
页数:13
相关论文
共 50 条
[31]   Optimization of social welfare and mitigating privacy risks in P2P energy trading: Differential privacy for secure data reporting [J].
Ahmed, Syed Adrees ;
Huang, Qi ;
Zhang, Zhenyuan ;
Li, Jian ;
Amin, Waqas ;
Afzal, Muhammad ;
Hussain, Jawad ;
Hussain, Fazal .
APPLIED ENERGY, 2024, 356
[32]   Security and privacy issues in P2P streaming systems: A survey [J].
Gheorghe, Gabriela ;
Lo Cigno, Renato ;
Montresor, Alberto .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (02) :75-91
[33]   Security and privacy issues in P2P streaming systems: A survey [J].
Gabriela Gheorghe ;
Renato Lo Cigno ;
Alberto Montresor .
Peer-to-Peer Networking and Applications, 2011, 4 :75-91
[34]   An Efficient Searching Scheme in Unstructured P2P Networks [J].
Zhang Ming ;
Yang Jinqiu .
ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 :865-869
[35]   A Secure DHT Routing Scheme in P2P Networks [J].
Tan, Yunsong ;
Zheng, Zujun .
2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, :441-+
[36]   An Anonymity Scheme Based on Pseudonym in P2P Networks [J].
Peng Hao ;
Lu Songnian ;
Li Jianhua ;
Zhang Aixin ;
Zhao Dandan .
CHINA COMMUNICATIONS, 2010, 7 (06) :157-160
[37]   SCHEME OF INTEGRATING DNS INTO P2P SERVICE NETWORK [J].
Liu, Yinghui ;
Wang, Dan ;
Hu, Yongsheng .
2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, :8-11
[38]   Initialization Method for Communication and Data Sharing in P2P Environment Between Wireless Sensor Nodes [J].
Jamal, M. Asif ;
Rehman, Aziz Ur ;
Ahsan, Moonisa ;
Riaz, M. S. ;
Zafar, M. S. .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (08) :635-640
[39]   Achieving User-Defined Location Privacy Preservation Using a P2P System [J].
Liu, Shengchao ;
Wang, Jessie Hui ;
Wang, Jilong ;
Zhang, Qianli .
IEEE ACCESS, 2020, 8 :45895-45912
[40]   Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting [J].
Megias, David ;
Qureshi, Amna .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 71 :147-172