Survey of anonymity and authentication in P2P networks

被引:5
|
作者
Wang X. [1 ,2 ]
Yang L. [3 ]
Sun X. [1 ]
Han J. [4 ]
Liang W. [1 ]
Huang L. [5 ]
机构
[1] School of Computer and Communication, Hunan University, Changsha
[2] College of Information and Engineering, Xiangtan University, Xiangtan
[3] School of Journalism and Communication, Hunan University, Changsha
[4] School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi
[5] College of Mathematics and Econometrics, Hunan University, Changsha
关键词
Anonymity; Authentication; P2P; Traceability;
D O I
10.3923/itj.2010.1165.1171
中图分类号
学科分类号
摘要
Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. While anonymity related issues have been extensively studied in peer-to-peer (P2P) systems, numerous concerns have been raised about the issue of providing authentic partners in P2P systems. In addition, the network authority requires authentication so that misbehaving entities in the network remain traceable. This study analyzes this problem and reviews related researches. Besides, we also advise some possible methods for this problem. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:1165 / 1171
页数:6
相关论文
共 50 条
  • [41] Low cost and reliable anonymity protocols in P2P reputation systems
    Peng H.
    Lu S.-N.
    Zhao D.-D.
    Zhang A.-X.
    Journal of Shanghai Jiaotong University (Science), 2010, 15 (02) : 207 - 212
  • [42] Low Cost and Reliable Anonymity Protocols in P2P Reputation Systems
    彭浩
    陆松年
    赵丹丹
    张爱新
    Journal of Shanghai Jiaotong University(Science), 2010, 15 (02) : 207 - 212
  • [43] Identity crisis: Anonymity vs. reputation in P2P systems
    Marti, S
    Garcia-Molina, H
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 134 - 141
  • [44] TAP: A novel Tunneling approach for Anonymity in structured P2P systems
    Zhu, YW
    Hu, YL
    2004 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2004, : 21 - 28
  • [45] A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator
    Surati, Shivangi
    Jinwala, Devesh C.
    Garg, Sanjay
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2017, 20 (02): : 705 - 720
  • [46] Trust management and Incentive mechanism for P2P Networks: Survey to cope challenges
    Samreen, Asia
    Hussain, Shahid
    INMIC: 2008 INTERNATIONAL MULTITOPIC CONFERENCE, 2008, : 301 - +
  • [47] Trust Model for P2P Networks
    Ma, Yi
    Wang, Dongqi
    Chen, Dongming
    INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND INTELLECTUALIZATION (ICEITI 2016), 2016, : 562 - 568
  • [48] The Research of Worms in P2P Networks
    Xie Chunyan
    Yin Zhiyu
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 389 - 392
  • [49] Neighbor definition in P2P networks
    Aliakbarian, Saeed
    Rahimabadi, Ali Movaghar
    Sadeghi, Fereshteh
    Haghani, Parisa
    Mirsatari, Negar Sadat
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1562 - +
  • [50] Cooperativeness prediction in P2P networks
    Niu, Changyong
    Wang, Jian
    Shen, Ruimin
    Shen, Liping
    Luo, Heng
    EXPERT SYSTEMS WITH APPLICATIONS, 2008, 35 (03) : 1267 - 1274