• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Zhiyuan, Bi Junlei, Wang Ruchuan. Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks[J]. Journal of Computer Research and Development, 2014, 51(10): 2318-2328. DOI: 10.7544/issn1000-1239.2014.20120948
Citation: Li Zhiyuan, Bi Junlei, Wang Ruchuan. Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks[J]. Journal of Computer Research and Development, 2014, 51(10): 2318-2328. DOI: 10.7544/issn1000-1239.2014.20120948

Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks

More Information
  • Published Date: September 30, 2014
  • With the rapid development of mobile peer to peer (MP2P) applications, user privacy requirements have become increasingly urgent. However, in distributed, frequent mobility and decentralized MP2P environments, the existing schemes have various security vulnerabilities. To protect user privacy in MP2P environments, a mutual anonymity node privacy protection scheme (NMA) based on network coding is proposed. Our contributions are described as below. We first design a network coding scheme which can defend against various omniscient adversary attacks. Then, the network coding is used in the MP2P file-sharing application, including the resource searching, the resource requesting, the resource responding and the file download, to protect user’s identity, user’s location and routing information. The advantages of the scheme lie in the fact that the network coding and mutli-agent can improve the network load balance, the successful rate of information transmission and the anonymity degree. Both theoretical analysis and the experimental results demonstrate that when the percentage of malicious peers is lower than 50%, the NMA scheme not only can protect the efficient information transmission, but also can hide the user’s identity and other privacy information.
  • Related Articles

    [1]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [2]Meng Xiangfu, Bi Chongchun, Zhang Xiaoyan, Tang Xiaoliang, Tang Yanhuan. Web Database top-k Diverse Keyword Query Suggestion Approach[J]. Journal of Computer Research and Development, 2017, 54(7): 1577-1591. DOI: 10.7544/issn1000-1239.2017.20160005
    [3]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [4]Yang Tao, Wang Yonggang, Tang Liyong, Kong Lingbo, Hu Jianbin, Chen Zhong. A Practical Dynamic Integrity Protection Model[J]. Journal of Computer Research and Development, 2013, 50(10): 2082-2091.
    [5]Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.
    [6]Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252.
    [7]Wu Hao and Wu Guoqing. Dynamical Integrity of Codes: Model and Method[J]. Journal of Computer Research and Development, 2012, 49(9): 1874-1882.
    [8]Shen Qingni, Du Hong, Wen Han, Qing Sihan. A Data Sealing Approach Based on Integrity Measurement Architecture[J]. Journal of Computer Research and Development, 2012, 49(1): 210-216.
    [9]Liu Changping, Fan Mingyu, and Wang Guangwei. Integrity Measurement Model According to Needs Under Open Network Environment[J]. Journal of Computer Research and Development, 2011, 48(2): 317-326.
    [10]Zhang Xiangfeng and Sun Yufang. Dynamic Enforcement of the Strict Integrity Policy in Biba's Model[J]. Journal of Computer Research and Development, 2005, 42(5): 746-754.

Catalog

    Article views (1213) PDF downloads (1652) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return