Securing anonymity in P2P network

  • Authors:
  • Byung Ryong Kim;Ki Chang Kim;Yoo Sung Kim

  • Affiliations:
  • Inha university, Nam-gu, Incheon, Korea;Inha university, Nam-gu, Incheon, Korea;Inha university, Nam-gu, Incheon, Korea

  • Venue:
  • Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Basically flooding-based P2P systems provide anonymity and thus it is not possible to find the initial sender of packet and the designated receiver of that packet. However it does not provide anonymity where the IP addresses of nodes uploading and downloading contents are revealed. So in order to maintain anonymity we propose and test our techniques that the receiver node of response packets on retrieval query is agent node and the agent node provides contents service between server and client. Through the proposed techniques it was found that the identity of node is secured without using encryption techniques which have been deployed in the former anonymity protection techniques and control data communications through all the nodes located between server and client. The application of this concept of which result was evaluated may be extended to many other current P2P systems under operation.