高级检索
    李致远, 毕俊蕾, 王汝传. 移动对等环境下基于网络编码的隐私保护方案[J]. 计算机研究与发展, 2014, 51(10): 2318-2328. DOI: 10.7544/issn1000-1239.2014.20120948
    引用本文: 李致远, 毕俊蕾, 王汝传. 移动对等环境下基于网络编码的隐私保护方案[J]. 计算机研究与发展, 2014, 51(10): 2318-2328. DOI: 10.7544/issn1000-1239.2014.20120948
    Li Zhiyuan, Bi Junlei, Wang Ruchuan. Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks[J]. Journal of Computer Research and Development, 2014, 51(10): 2318-2328. DOI: 10.7544/issn1000-1239.2014.20120948
    Citation: Li Zhiyuan, Bi Junlei, Wang Ruchuan. Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks[J]. Journal of Computer Research and Development, 2014, 51(10): 2318-2328. DOI: 10.7544/issn1000-1239.2014.20120948

    移动对等环境下基于网络编码的隐私保护方案

    Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks

    • 摘要: 随着移动对等应用的快速发展,用户对自身隐私的需求变得越来越迫切.然而,由于在移动对等环境去中心化、拓扑变化性强的特点使得现有方案存在较多安全隐患.鉴于此,提出基于网络编码的节点隐私保护方案.主要工作包括:设计能够抵御万能敌手攻击的网络编码方案;将网络编码应用于移动对等资源共享,包括资源搜索、资源请求、应答及文件下载,实现了用户身份、用户位置及路由信息的隐私保护.方案的优势在于利用网络编码和多代理机制改善了网络的负载均衡、提高了信息传输成功率并增强了节点的隐私性.理论分析和仿真实验结果均表明,方案在网络中恶意节点比例低于50%的情况下,不仅可以保障信息的高效传输,同时可以隐藏用户的身份及其他隐私信息.

       

      Abstract: With the rapid development of mobile peer to peer (MP2P) applications, user privacy requirements have become increasingly urgent. However, in distributed, frequent mobility and decentralized MP2P environments, the existing schemes have various security vulnerabilities. To protect user privacy in MP2P environments, a mutual anonymity node privacy protection scheme (NMA) based on network coding is proposed. Our contributions are described as below. We first design a network coding scheme which can defend against various omniscient adversary attacks. Then, the network coding is used in the MP2P file-sharing application, including the resource searching, the resource requesting, the resource responding and the file download, to protect user’s identity, user’s location and routing information. The advantages of the scheme lie in the fact that the network coding and mutli-agent can improve the network load balance, the successful rate of information transmission and the anonymity degree. Both theoretical analysis and the experimental results demonstrate that when the percentage of malicious peers is lower than 50%, the NMA scheme not only can protect the efficient information transmission, but also can hide the user’s identity and other privacy information.

       

    /

    返回文章
    返回