A-Kad: an anonymous P2P protocol based on Kad network

被引:0
作者
Ni, YongQing [1 ]
Nyang, DaeHun [1 ]
Wang, Xu [1 ]
机构
[1] Inha Univ, Informat Secur Res Lab, Inchon 402751, South Korea
来源
2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009) | 2009年
关键词
anonymity; P2P; Kad; privacy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the growth of decentralized network users, preserving privacy becomes a critical issue in this open community. Kad-based network, as a typical decentralized system, has been widely used nowadays. However, there is not enough research to achieve anonymity on it. In this paper, we propose an anonymous protocol based on Kad network, named Anonymous Kad (A-Kad), which achieves complete privacy and security for le providers and requesters. A-Kad has the desired property of anonymity and still keeps high efficiency in publishing and querying phases. To achieve anonymity, we establish two anonymous channels which help le providers to anonymously publish le information and securely transfer les. Through these two channels, the le requester can also efficiently query and retrieve les without worrying about exposing its behavior. Moreover, we propose an anonymity degree evaluation model (ADEM) according to three different attacking capabilities and anonymity degree.
引用
收藏
页码:978 / 983
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 2006, Proc. 13th ACM Conf. Computer and Comm. Security
[2]  
Baumgart I, 2007, INT C PAR DISTRIB SY, P579
[3]  
CLARKE I, 1946, LECT NOTES COMPUTER
[4]  
Dingledine R, 2004, USENIX ASS P 13 USEN, P303
[5]  
HAN J, IPDPS IEEE COMP SOC
[6]  
Kelly D.J., 2009, THESIS AIR FORCE I T
[7]  
MAYMOUNKOV P, 2002, PEER TO PEER SYST 1
[8]  
SCARLATA V, ICNP IEEE COMP SOC, P272
[9]   Agyaat: mutual anonymity over structured P2P networks [J].
Singh, Aarneek ;
Gedik, Bugra ;
Liu, Ling .
INTERNET RESEARCH, 2006, 16 (02) :189-212
[10]  
STEINER M, 1922, INT MEAS C ACM, P117