Survey of anonymity and authentication in P2P networks

被引:5
|
作者
Wang X. [1 ,2 ]
Yang L. [3 ]
Sun X. [1 ]
Han J. [4 ]
Liang W. [1 ]
Huang L. [5 ]
机构
[1] School of Computer and Communication, Hunan University, Changsha
[2] College of Information and Engineering, Xiangtan University, Xiangtan
[3] School of Journalism and Communication, Hunan University, Changsha
[4] School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi
[5] College of Mathematics and Econometrics, Hunan University, Changsha
关键词
Anonymity; Authentication; P2P; Traceability;
D O I
10.3923/itj.2010.1165.1171
中图分类号
学科分类号
摘要
Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. While anonymity related issues have been extensively studied in peer-to-peer (P2P) systems, numerous concerns have been raised about the issue of providing authentic partners in P2P systems. In addition, the network authority requires authentication so that misbehaving entities in the network remain traceable. This study analyzes this problem and reviews related researches. Besides, we also advise some possible methods for this problem. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:1165 / 1171
页数:6
相关论文
共 50 条
  • [31] Peer-to-Peer (P2P) Electricity Trading with Anonymity
    Ranasinghe, Sasanka N.
    Pussewalage, Harsha S. Gardiyawasam
    Chakravorty, Antorweep
    16TH IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING, UCC 2023, 2023,
  • [32] Analysis and survey on page ranking algorithms for web and P2P networks
    Qu, HC
    Fu, HG
    Yang, GC
    Proceedings of the 11th Joint International Computer Conference, 2005, : 226 - 229
  • [33] A Content Authentication Scheme in Hybrid P2P Network
    Shi, Liang
    Li, Zhongwen
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 486 - +
  • [34] A P2P Network Authentication Method Base on CPK
    Jiang, Zhuoming
    Xu, Rongsheng
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 3 - +
  • [35] Lightweight Authentication for Distributed Mobile P2P Communications
    Lim, Jiyoung
    Doh, Inshil
    Chae, Kijoon
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 580 - 589
  • [36] A SURVEY ON P2P BOTNETS DETECTION
    Ghalebandi, Seyedeh Ghazal
    Noor, Rafidah Binti Md
    Lashkari, Arash Habibi
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 725 - +
  • [37] Survey on P2P Traffic Managements
    Luo, Yingru
    PROCEEDINGS OF THE 2011 2ND INTERNATIONAL CONGRESS ON COMPUTER APPLICATIONS AND COMPUTATIONAL SCIENCE, VOL 2, 2012, 145 : 191 - 196
  • [38] Identifying P2P traffic: A survey
    Max Bhatia
    Mritunjay Kumar Rai
    Peer-to-Peer Networking and Applications, 2017, 10 : 1182 - 1203
  • [39] Identifying P2P traffic: A survey
    Bhatia, Max
    Rai, Mritunjay Kumar
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (05) : 1182 - 1203
  • [40] TAP: A novel tunneling approach for anonymity in structured P2P systems
    Department of ECECS, University of Cincinnati, United States
    International Association for Computers and Communications (IACC); McGill University, Canada; Ohio State University, 1600, 21-26 (2004):