Evaluation Indicators and Model of Network Technical Anonymity

被引:0
|
作者
Chen, Xi [1 ]
Li, Gang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Econ & Management, 10 Xitucheng Rd, Beijing 100876, Peoples R China
关键词
Network technical anonymity; Network real name system; AHP; Fuzzy theory; Network user identification;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The present study raises the concept of network technical anonymity, and designs its corresponding evaluation indicators and model, in order to provide the basis and methods for the evaluation of how anonymous a behavioral agent is on the net. Network technical anonymity is defined as the difficulty in tracking the real identity of a network agent. Five indicators have been designed as follows: name, valid address, alias and behaviors on the net and social attributions. Besides, based on AHP and the fuzzy theory, we have worked out the relative weights of the evaluation indicators and an evaluation model. With this model, we made evaluation of the network technical anonymity of several network applications that are commonly used now in China. The evaluation indicators and model can be applied to the evaluation of how anonymous a network user is in various kinds of network applications, and serve as references for management and design of web services.
引用
收藏
页码:181 / 192
页数:12
相关论文
共 50 条
  • [1] Evaluation indicators and model of network technical anonymity
    [J]. 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (06):
  • [2] Technical challenges of network anonymity
    Kesdogan, D
    Palmer, C
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (03) : 306 - 324
  • [3] The Causality Test of Network Technical Anonymity and Perceptive Anonymity
    Chen, Xi
    Li, Yujie
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (03): : 279 - 287
  • [4] Indicators for the evaluation of a pluviometric network. A technical note
    De, Bautista, S.H.
    Alvarado, J.
    Barrera, G.
    Ferrer, R.
    [J]. Revista Tecnica de la Facultad de Ingenieria Universidad del Zulia, 1994, 17 (03):
  • [5] Tor network anonymity evaluation based on node anonymity
    Cui, Jun
    Huang, Changqi
    Meng, Huan
    Wei, Ran
    [J]. CYBERSECURITY, 2023, 6 (01)
  • [6] Tor network anonymity evaluation based on node anonymity
    Jun Cui
    Changqi Huang
    Huan Meng
    Ran Wei
    [J]. Cybersecurity, 6
  • [7] Research on (α,β,l,k)-anonymity Model for Social Network
    Ren, Xiang-min
    Jiang, De-xun
    Wang, Ke-chao
    Ran, Qi
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK AND ARTIFICIAL INTELLIGENCE (CNAI 2018), 2018, : 176 - 181
  • [8] Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network
    Basyoni, Lamiaa
    Erbad, Aiman
    Alsabah, Mashael
    Fetais, Noora
    Guizani, Mohsen
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 635 - 642
  • [9] Technical Indicators for the Comparison of Power Network Development in Scenario Evaluations
    Dicorato, Maria
    Tricarico, Gioacchino
    Forte, Giuseppe
    Marasciuolo, Francesca
    [J]. ENERGIES, 2021, 14 (14)
  • [10] Convolutional neural network for stock trading using technical indicators
    S. Kumar Chandar
    [J]. Automated Software Engineering, 2022, 29