期刊文献+

一种安全性增强的Tor匿名通信系统 被引量:9

A Tor Anonymous Communication System with Security Enhancements
下载PDF
导出
摘要 网络用户对自身隐私信息保护意识的增强,促进了Tor,Crowds,Anonymizer等匿名通信系统的发展及广泛应用,从而为用户提供了隐私和信息安全保护.随着对匿名通信系统的深入研究,发现部分系统存在安全性不足,为提高Tor匿名通信系统的安全性,基于可信计算技术提出一种安全性增强的Tor匿名通信系统,改进后的系统提高了目录服务器的安全性,并基于可信计算技术确保了用户及匿名通信链路的可信性;通过与Tor匿名通信系统的比较,改进系统在具有可信性的同时,具有更高的安全性及抗攻击能力,解决了Tor匿名通信系统所存在的安全隐患;通过仿真分析可知,改进后的系统能够满足用户的匿名性需求. The improvement of network users' awareness of protecting private information promotes the wide application of anonymous communications systems, such as Tor, Crowds, Anoymizer, which can secure users' information. Studies have offered the evidence that security vulnerability existes in the Tor anonymous communications system. Thus, in order to improve its security, an enhanced system is proposed to improve the security of directory server and ensure the credibility of users and anonymous link through the trusted computing technology. Based on the trusted anonymous authentication protocol, the directory server of the enhanced system realizes mutual authentication between users and the server, and implements the credibility evaluation of the server on user platforms. Therefore, the bad effects of malicious forwarding nodes on the security and anonymity of anonymous link can be prevented; meanwhile, session key agreement reinforces its anti-attacking ability, because the anonymous communications link of the enhanced system is completely constructed by credible nodes. Compared with the original system, the enhanced one not only ensures credibility, but also has higher security and better anti-attack capability, thus the security risks are eliminated. Furthermore the simulation analysis proves that the proposed scheme can meet users' need of anonymity.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第7期1538-1546,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61173190 61272436 61370224) 广东省自然科学基金项目(10351806001000000)
关键词 网络安全 匿名通信 第2代洋葱路由系统 可信计算 抗攻击性 network security anonymous communication Tor trusted computing anti-attacking
  • 相关文献

参考文献16

  • 1Claessens J, Diaz C, Goemans C. et al. Revocable anonymous access to the Internet [J]. Internet Research: Electronic Networking Application and Policy, 2003, 13(4) :242-258.
  • 2吴艳辉,王伟平,陈建二.匿名通信研究综述[J].小型微型计算机系统,2007,28(4):583-588. 被引量:15
  • 3Serjantow A. Anon:cmizing censorship resistant systems [C] //Proc of the 1st Int Peer-to-Peer Systems Workshop. Berlin: Springer, 2002:111-120.
  • 4Goldschlag D, Reed M, Syverson P. Onion routing for anonymous and private Internet connections [J].Communications of the ACM, 1999, 42(2): 39-41.
  • 5Dingledine R, Mathewson N, Syverson P. Tor: The second- generation onion router [C] //Proe of the 13th USENIX Security Symp. Berkeley: USENIX Association, 2004: 303- 320.
  • 6陈周国,蒲石,祝世雄.匿名网络追踪溯源综述[J].计算机研究与发展,2012,49(S2):111-117. 被引量:14
  • 7Reiter M K, Rubin A D. Crowds: Anonymity for Web transactions [J]. ACM Trans on Information and System Security, 1998, 1(1): 66-92.
  • 8Freedman M J, Morris R. Tarzan: A peer-to-peer anonymizing network layer [C] //Proe of the 9th ACM Conf on Computer and Communications Security. New York: ACM, 2002: 193-206.
  • 9Danezis G, Dingledine R, Mathewson N. Mixminion: Design of a type Ⅲ anonymous remailer protocol [C] //Proc of the 2003 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2003:2-15.
  • 10Sherwood R, Bhattacharjee B, Srinivasan A. P5: A protocol for scalable anonymous communication [J]. Journal of Computer Security, 2005, 13(6): 839-876.

二级参考文献86

共引文献119

同被引文献104

  • 1杨元原,马文平,白晓峰.一种混合的Tor匿名通信系统[J].计算机应用研究,2007,24(10):141-144. 被引量:13
  • 2王平辉,郑庆华,牛国林,管晓宏,蔡忠闽.基于流量统计特征的端口扫描检测算法[J].通信学报,2007,28(12):14-18. 被引量:6
  • 3CULNAN M J, ARMSTRONG P K. Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation[J]. Organization Science, 1999, 10(1): 104-115.
  • 4DINEV T, HART P. Privacy concems and intemet use-a model of trade-off factors[C]//,~cademy of Management. c2003:1-6.
  • 5LI H, SARATHY R, XU H. Understanding situational online informa- tion disclosure as a privacy calculus[J]. Journal of Computer Informa- tion Systems, 2010, 51(1): 62-71.
  • 6KEHR F, KOWATSCH T, WENTZEL D, et al. Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and af- fect in the privacy calculus[J]. Information Systems Journal, 2015, 25(6): 607-635.
  • 7MACHANAVAJJHALA A, KIFER D, GEHRKE J, ~t al. /-diversity: privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2007, 1(1): 3.
  • 8AGRAWAL D, AGGARWAL C C. On the design and quantification of privacy preserving data mining algorithms[C]//The 20th ACM SIG- MOD-SIGACT-SIGART Symposium on Principles of Database Sys- tems. ACM, c2001 : 247-255.
  • 9LIU K, KARGUPTA H, RYAN J. Random projection-based multipli- eative data perturbation for privacy preserving distributed data min- ing[J]. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(1): 92-106.
  • 10OLIVEIRA S R M, ZAIANE O R. Privacy preserving clustering by data transformation[C]//The 18th Brazilian Symposium on Databases. c2003:304-318.

引证文献9

二级引证文献93

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部