Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Anonymous Communication Method Based on Distributed Hash Table Network

A distributed hash table and anonymous communication technology, which is applied in the field of computer networks, can solve problems such as not considering user privacy protection, P2P network user privacy threats, and affecting the normal operation of P2P networks.

Active Publication Date: 2018-01-05
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Today's traditional P2P network does not take into account the privacy protection of users, and the communication between user nodes is exposed on the Internet in plain text, which is easy to be exploited by criminals, thus threatening the privacy of users in the P2P network and even affecting the entire network. Normal operation of P2P network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Anonymous Communication Method Based on Distributed Hash Table Network
  • An Anonymous Communication Method Based on Distributed Hash Table Network
  • An Anonymous Communication Method Based on Distributed Hash Table Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The overall block diagram of the anonymous communication scheme based on the distributed hash table (DHT) network is as follows: figure 1 As shown, it includes the anonymous publishing process of resources, the anonymous search process of resources and the anonymous transmission process of resources. Specifically, the anonymous publishing process of resources is as follows: figure 2 As shown, the specific steps are as follows:

[0063] Step 1. At the initial moment, in the DHT network, the user node P owns a resource File and hashes it:

[0064] Hash(File)=FID

[0065] The obtained ID of the resource is set as FID. Node P selects a neighbor node I with the longest survival time from its routing table 1 , send the resource mapping message M_REQ (Map Request) to node I 1 , I 1 After receiving the M_REQ message, it will choose the probability P f1 ∈[0, 1] continue to forward backwards, or with probability (1-P f1 ) terminates forwarding to become the mapping node ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is an anonymous communication method based on a distributed hash table network, aiming at three types of basic operations in the traditional DHT network: resource release operation, resource search operation and resource transmission operation, by introducing a certain anonymous mechanism and security mechanism, Realize the anonymous communication problem in DHT network. Build an anonymous mapping path in the resource release stage and determine the mapping nodes, thereby providing an anonymous basis for resource release operations; adopt a probabilistic forwarding strategy in the resource search stage to make resource search operations anonymous; in the resource download and transmission stage, use mapping nodes The method of data transmission as a relay node and combined with session key encryption data ensures anonymous and secure transmission of data. The combination of the three aspects realizes the anonymity of the sender, the anonymity of the receiver and the anonymity of the communication relationship, so as to achieve the purpose of user privacy protection and the safe and stable operation of the entire DHT network.

Description

technical field [0001] The present invention is applicable to the distributed hash table network (Distributed Hash Table, abbreviated as DHT) environment, and the rerouting mode using probabilistic forwarding is applied to the resource query process and resource release process, thereby realizing the anonymous communication service of the DHT network . The technology belongs to the field of computer network. Background technique [0002] Nowadays, with the emergence of various network services, the interaction between network users has reached an unprecedented high period. Especially the P2P network, a file sharing network based on the distributed concept, has already accounted for a large proportion in people's Internet usage. And more and more people are willing to join this open platform to share and retrieve the resources or files they need. Among them, the DHT network has become a mainstream implementation of the P2P network, so the privacy protection of users has ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 孙力娟黄凯翔肖甫王汝传韩志杰王少辉蒋季宏
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products