可信计算模式下P2P匿名通信系统设计
CSTR:
作者:
作者单位:

(华南师范大学 物理与电信工程学院, 广州 510006)

作者简介:

雷 涛(1973-),女,四川成都人,博士研究生,讲师,主要从事信息安全方向的研究。[FQ)]

通讯作者:

中图分类号:

基金项目:

广东省省级科技计划项目(2013B010204019)。


Design of P2P Anonymous Communication System Based on Trusted Computing
Author:
Affiliation:

(School of Physics and Electronic Engineering,South China Normal University, Guangzhou 510006,China)

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    为了提高P2P匿名通信系统的安全性与可信性,需要对P2P匿名通信系统进行设计;当前使用的匿名通信系统,无法在用户节点匿名的情况下,保证P2P匿名通信系统匿名节点的可信性;因此,提出一种基于可信计算模式的P2P匿名通信系统设计方法;该系统的硬件部分分为系统登录模块、通信模块、数据模块、可信计算模块4大模块,模块之间相互合作,形成一个完整的匿名通信系统,匿名通信系统软件设计部分通过建立可信计算的联接,实现在匿名通道中进行数据传递,并对待传递的数据进行层次性打包加密,同时采用可信度计算对匿名通信系统中节点、匿名通道进行计算,形成安全可信的匿名传递通道;实验仿真证明,该方法在保证该系统数据传递的效率的同时提高了匿名通信系统的安全性与可靠性。

    Abstract:

    In order to improve the safety and reliability of P2P anonymous communication system, the need to design P2P anonymous communication system. Anonymous communication system currently in use, not in the anonymous user node, to ensure the credibility of P2P anonymous communication system of anonymous nodes. Therefore, puts forward a design method of P2P anonymous communication system based on trusted computing model. The hardware part is divided into system login module, communication module, data module, trusted computing module 4 modules, mutual cooperation between modules, to form a complete anonymous communication system, anonymous communication system software design through the connection establishment of trusted computing, Realization of data transmission in the anonymous channel, and the level of data transfer encryption package to the credibility of the calculation, the node in anonymous communication system, anonymous channel is calculated, the formation of a safe and reliable delivery channel. Anonymous experiments show that this method improves the safety and reliability of the anonymous communication system to ensure efficiency the system of data transmission at the same time.

    参考文献
    相似文献
    引证文献
引用本文

雷涛.可信计算模式下P2P匿名通信系统设计计算机测量与控制[J].,2017,25(8):268-271.

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2017-04-18
  • 最后修改日期:2017-05-07
  • 录用日期:
  • 在线发布日期: 2017-09-08
  • 出版日期:
文章二维码