透過您的圖書館登入
IP:3.133.83.94
  • 學位論文

運用雙層代理人達到傳送可靠及保護隱私的P2P通訊

Reliable and Privacy Preserving Communication Using the Agent in Agent in Peer-to-Peer systems

指導教授 : 鄭伯炤
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


由於近年來P2P網路(Peer-to-Peer Network)使用的普及化,已有越來越多人使用P2P平台下載自己想要的檔案,但在下載的過程中,卻隱藏著個人資訊隱私洩漏的潛在危險。在這樣情況下,我們需透過某些方法來使請求者與提供者雙方都能達到個人資訊隱私的保護。對於如何解決在尋求/提供檔案的過程中隱藏自己的個人資訊同時又能保障傳送品質,本論文提出了雙層代理人(Agent in Agent, AinA),即使用者(Initiator)/提供者(Responder)雙方各透過信任評分機制篩選三個可靠節點,並將其分做兩層代理人為使用者/提供者傳遞資料。經由實驗證實,透過雙層代理人的方法確實能夠保障訊息的傳遞且雙方也能達到保護彼此個人資訊隱私,進而提升P2P安全隱私方面的需求。

並列摘要


Due to the popularity of peer-to-peer networks (P2P)in recent years, an increasing number of people are using this platform to download files. However, there is a potential risk in hiding personal information during the process of downloading. In such cases, we need a method that ensures protection of personal information privacy for both, the requester and the provider. In order to hide the personal information in the process of searching or providing the files and guarantee the quality of the transmission, this paper proposes Agent in Agent (AinA). AinA means that each requester and provider will hide their personal information privacy by using three nodes, which are selected by trust evaluation mechanism, as the two-layer agents. With an experiment, we prove that AinA guarantees to protect the private information of the requester and the provider. Moreover, AinA guarantees message and file delivery. Further, it can enhance the privacy in P2P systems

參考文獻


[3] Li Xiao, Zhichen Xu, Xiaodong Zhang, “Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks,” Proc.14th Parallel and Distributed Systems., pp.829-840, Sept. 2003.
[4] Yunhao Liu, Jinsong Han, Jilong Wang,“Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems” Proc.14th Network Protocols, pp.22-31, Nov. 2006.
[6] Anh Tuan Nguyen, Frank Eliassen “An Efficient Solution for Max-min Fair Rate Allocation in P2P Simulation” Proc. Ultra Modern Telecommunications & Workshops, pp.12-14, Oct. 2009
[12] D. Chaum, “Untraceable Electronic Mail Return Addresses, and Digital Pseudonyms,” Comm. ACM, vol. 24, no. 2, pp. 84-90, Feb. 1981.
[14] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Second- Generation Onion Router,” Proc. 13th USENIX Security Symp., pp. 303-320, 2004.

延伸閱讀