Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Distributed hash table network-based anonymous communication method

A distributed hash table and anonymous communication technology, which is applied in the field of computer networks, can solve the problems of P2P network user privacy threats, affecting the normal operation of P2P networks, and not considering user privacy protection, etc.

Active Publication Date: 2014-11-26
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Today's traditional P2P network does not take into account the privacy protection of users, and the communication between user nodes is exposed on the Internet in plain text, which is easy to be exploited by criminals, thus threatening the privacy of users in the P2P network and even affecting the entire network. Normal operation of P2P network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed hash table network-based anonymous communication method
  • Distributed hash table network-based anonymous communication method
  • Distributed hash table network-based anonymous communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The overall block diagram of the anonymous communication scheme based on the distributed hash table (DHT) network is as follows: figure 1 As shown, it includes the anonymous publishing process of resources, the anonymous search process of resources and the anonymous transmission process of resources. Specifically, the anonymous publishing process of resources is as follows: figure 2 As shown, the specific steps are as follows:

[0063] Step 1. At the initial moment, in the DHT network, the user node P owns a resource File and hashes it:

[0064] Hash(File)=FID

[0065] The obtained ID of the resource is set as FID. Node P selects a neighbor node I with the longest survival time from its routing table 1 , send the resource mapping message M_REQ (Map Request) to node I 1 , I 1 After receiving the M_REQ message, it will choose the probability P f1∈[0, 1] continue to forward backwards, or with probability (1-P f1 ) terminates forwarding to become the mapping node E...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a distributed hash table (DHT) network-based anonymous communication method. With regard to three kinds of basic operations, including the resource publishing operation, the resource searching operation, and the resource transmission operation, of the traditional DHT network, a certain anonymous mechanism and security mechanism are introduced, thereby solving an anonymous communication problem in the DHT network. An anonymous mapping path is constructed at the resource publishing stage and a mapping node is determined, so that an anonymous base is provided for the resource publishing operation; a probabilistic forwarding strategy is used at the resource searching stage, so that the resource searching operation has the anonymous property; and at the resource loading and transmission stage, the mapping node is used as a relay node to carry out data transmission and combination with the session key encryption data is used, thereby guaranteeing the anonymous transmission and secure transmission of data. On the basis of combination of the three parts, sender anonymity, receiver anonymity, and communication relation anonymity are realized, thereby achieving objectives of user privacy protection and secure and stable operation of the whole DHT network.

Description

technical field [0001] The present invention is applicable to the distributed hash table network (Distributed Hash Table, abbreviated as DHT) environment, and the rerouting mode using probabilistic forwarding is applied to the resource query process and resource release process, thereby realizing the anonymous communication service of the DHT network . The technology belongs to the field of computer network. Background technique [0002] Nowadays, with the emergence of various network services, the interaction between network users has reached an unprecedented high period. Especially the P2P network, a file sharing network based on the distributed concept, has already accounted for a large proportion in people's Internet usage. And more and more people are willing to join this open platform to share and retrieve the resources or files they need. Among them, the DHT network has become a mainstream implementation of the P2P network, so the privacy protection of users has ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 孙力娟黄凯翔肖甫王汝传韩志杰王少辉蒋季宏
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products