Safe and effective privacy protection method of P2P system

A privacy protection and security technology, applied in the transmission system and key distribution, can solve problems such as complex algorithms, waste of bandwidth, and inconvenient implementation, and achieve the effect of privacy protection and privacy protection enhancement

Inactive Publication Date: 2010-05-12
BEIJING UNIV OF TECH
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the existing anonymity-based privacy protection methods waste a lot of bandwidth, the algorithm is complicated, and the implementation is inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and effective privacy protection method of P2P system
  • Safe and effective privacy protection method of P2P system
  • Safe and effective privacy protection method of P2P system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] Specific implementation examples such as figure 2 As shown, it has the following characteristics:

[0012] The whole P2P system includes several resource providers, resource requesters and their friendly nodes.

[0013] The implementation of the present invention includes three stages: the resource provider, the trust establishment between the resource requester and its friendly nodes, the resource requester requesting resources and the resource provider providing resources.

[0014] Trust building phase:

[0015] Due to the need to establish a certain degree of trust relationship with friendly nodes in advance, some privacy of nodes will be leaked to their friendly nodes, so the reliability and credibility of friendly nodes are very important to the maintenance of node privacy. We adopt a recommendation-based trust mechanism. Calculated as follows:

[0016] R ( p i ) = ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe and effective privacy protection method of a P2P system, which comprises the steps of: dynamically establishing a state of trust relationship between a network entity and entities of other friendly nodes, wherein the friendly nodes are used as agencies for requiring and obtaining files mainly comprising files required by a requester; sending the files to a provider through the friendly nodes of a resource provider; sending a public key certificate and a global trust value to the requester through the friendly nodes of the requester by the provider; once the resource provider of the files is selected, generating a symmetrical secret key, encrypting a public key of the provider and then sending the encrypted public key to the node of the provider through the friendly nodes; and encrypting the files by the resource provider by using the symmetrical secret key and sending the files to a request node through the friendly nodes. The invention conceals the identifies of a resource requester and a sender through an agency way, thereby blocking the relation between a source and the content of the files, and effectively protecting the privacy of the resource requester and the resource provider.

Description

technical field [0001] The present invention relates to a privacy protection method of a P2P system, specifically a privacy protection method that utilizes the trust between the resource provider and the acquirer and their friendly nodes in the P2P file sharing system, and uses the friendly nodes as agents to request and acquire files The protection method can be used to safely and effectively protect private information between a resource provider and a obtainer in a P2P system, and belongs to the field of computer networks. Background technique [0002] There are a lot of malicious behaviors such as fraud in the P2P network. Privacy is an important aspect considered in the P2P system. In order to prevent malicious attacks, nodes often need to protect privacy. Existing privacy protection solutions generally use anonymous methods to hide communication participants among numerous network entities, such as P2P personal privacy protocols. In order to achieve anonymous nodes, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
Inventor 何泾沙吴旭徐菲
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products