首页 | 官方网站   微博 | 高级检索  
     


Structural‐based tunneling: preserving mutual anonymity for circular P2P networks
Authors:A Naghizadeh  S Berenjian  E Meamari  R Ebrahimi Atani
Affiliation:1. Department of Computer Engineering, University of Guilan, Rasht, Iran;2. Department of Computer and IT Engineering, Amirkabir University of Technology, Tehran, Iran;3. Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran
Abstract:Many methods are suggested to preserve anonymity of users for peer‐to‐peer (P2P) networks. Most of these methods, by relying on established anonymous solutions on client/server applications, are presented for unstructured P2P networks. However, structured overlays, by using distributed hash tables for their routing, do not resemble traditional paradigms. Therefore, current anonymous methods cannot be implemented for them easily. In this paper, we introduce structural‐based tunneling (SBT) to provide mutual anonymity for circular P2P structures. In this method, we get help from inherited features of network infrastructure to establish a standard way for making tunnels. SBT introduces a flexible design that is able to manage different parts of the tunnels on current infrastructures. For this purpose, we incorporate SBT with Chord to show how such design can be managed for real‐world applications. The results of applied method with simulations show that by managing critical features of SBT, a trade‐off can be made between stronger security and performance of the network. Copyright © 2015 John Wiley & Sons, Ltd.
Keywords:P2P  DHT  tunneling  anonymity  security  chord
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号