Anonymous communication model with dynamic negotiation of identifiers

被引:0
|
作者
Yang X. [1 ]
Zhuang H. [1 ]
机构
[1] School of Cyber Security and Computer, Hebei University, Baoding
关键词
anonymous communication; identification; identity Tracking; privacy-preserving techniques;
D O I
10.19665/j.issn1001-2400.2023.04.010
中图分类号
学科分类号
摘要
The past decade has been a big data era of rapid development in communication technology and computing paradigms. With the increasing application of big data, digital information transmission has become an important form of human communication. However, there are many hidden security risks in the process of digital information transmission. Data leakage often occurs in the process of information transmission. As one of the key means of privacy protection in the communication process, anonymous communication has been widely concerned. However, the existing anonymous communication models cannot effectively cope with attacks such as replay attack, man-in-the-middle attack, and statistical attack while ensuring the communication efficiency. This paper proposes an anonymous communication model based on identifier dynamic negotiation. In the preprocessing stage, an improved identifier negotiation method based on ECDH key exchange is adopted, which allows every two members in the network to negotiate the communication identifier and the symmetric key for encrypting messages, and improves the negotiation efficiency in the preprocessing stage. In the anonymous communication stage, identifiers can be dynamically changed with each communication, which effectively resists replay attacks and statistical attacks. The scheme also sets up a special investigation agency for giving the right to remove anonymity to the investigation agency, preventing malicious users from refusing to remove anonymity. Security analysis proves the robustness of the scheme. Performance experiments show that the scheme has a higher communication efficiency while ensuring security. © 2023 Science Press. All rights reserved.
引用
收藏
页码:100 / 110
页数:10
相关论文
共 23 条
  • [1] MAYER J, MUTCHLER P, MITCHELL J C., Evaluating the Privacy Properties of Telephone Metadata, Proceedings of the National Academy of Sciences, 113, 20, pp. 5536-5541, (2016)
  • [2] DE MONTJOYE Y A., Computational Privacy: Towards Privacy-Conscientious Uses of Metadata, (2015)
  • [3] JIANG L, LI T, LI X, Et al., Anonymous Communication via Anonymous Identity-Based Encryption and its Application in IoT[J], Wireless Communications and Mobile Computing, 2018, pp. 1-8, (2018)
  • [4] CHAUM D, DAS D, JAVANI F, Et al., cMx: Mxing with Mnimal Real-Time Asymmetric Cryptographic Operations [C], International Conference on Applied Cryptography and Network Security, pp. 557-578, (2017)
  • [5] XU Hua, TIAN Youliang, Protection of Privacy of the Weighted Social Network under Differential Privacy, Journal of Xidian University, 49, 1, pp. 17-25, (2022)
  • [6] JAYARAMAN I, STANISLAUS PANNEERSELVAM A., A Novel Privacy Preserving Digital Forensic Readiness Provable Data Possession Technique for Health Care Data in Cloud, Journal of Ambient Intelligence and Humanized Computing, 12, 5, pp. 4911-4924, (2021)
  • [7] SILVA P, CASALEIRO R, SIMOES P, Et al., Risk Management and Privacy Violation Detection in the PoSeID-on Data Privacy Platform, SN Computer Science, 1, 4, pp. 1-10, (2020)
  • [8] WANG X, XU Z, CAI Z, Et al., Novel Temporal Perturbation-Based Privacy-Preserving Mechanism for Smart Meters, Mobile Networks and Applications, 25, 4, pp. 1548-1562, (2020)
  • [9] ZUO Kaizhong, LIU Rui, ZHAO Jun, Et al., Method for the Protection of Spatiotemporal Correlation Location Privacy with Semantic Information, Journal of Xidian University, 49, 1, pp. 67-77, (2022)
  • [10] LI F, LIU Z, WANG Y, Et al., Aitac: An Identity-Based Traceable Anonymous Communication Model [J], Journal of Ambient Intelligence and Humanized Computing, 13, pp. 1353-1362, (2022)