Diversity of controllable anonymous communication system

With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable anonymous communication system (DC-ACS) was prop...

Full description

Saved in:
Bibliographic Details
Published inTongxin Xuebao Vol. 36; pp. 105 - 115
Main Authors Yan-wei ZHOU, Zhen-qiang WU, Bo YANG
Format Journal Article
LanguageChinese
Published Editorial Department of Journal on Communications 01.06.2015
Subjects
Online AccessGet full text

Cover

Loading…
Abstract With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable anonymous communication system (DC-ACS) was proposed based on the node regional management strategy.The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users’ needs,controls users’ malicious anonymous activities,and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link.Compared with the Tor anonymous communication system,DC-ACS not only has anonymity,but also has higher security and anti-attack capability,which eliminated potential security risks existed in the Tor anonymous communications system.
AbstractList With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable anonymous communication system (DC-ACS) was proposed based on the node regional management strategy.The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users’ needs,controls users’ malicious anonymous activities,and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link.Compared with the Tor anonymous communication system,DC-ACS not only has anonymity,but also has higher security and anti-attack capability,which eliminated potential security risks existed in the Tor anonymous communications system.
Author Zhen-qiang WU
Bo YANG
Yan-wei ZHOU
Author_xml – sequence: 1
  fullname: Yan-wei ZHOU
– sequence: 2
  fullname: Zhen-qiang WU
– sequence: 3
  fullname: Bo YANG
BookMark eNo1zd1KwzAcBfBcTHDOvUN9gNak-SdpLmV-DQbeKHhX8ikZbSJNJvbtLTqvDvzgnHOFVjFFh9ANwQ0hksnbYxNyjg3BGNdA-XfTYsII7VZo_W_vl2ibc9B4ccExJWvU3YcvN-VQ5ir5yqRYpjQMSg-uUsvDPKZTXngcTzEYVUKKVZ5zceM1uvBqyG57zg16e3x43T3Xh5en_e7uUFvCZaklcGk0FQKUbJkQLWMtk0AJBiYo8dR03FErmTBcMGENt9xYiWHpKN15ukH7v12b1LH_nMKoprlPKvS_kKaPXk0lmMH1xgOFznLJWQvYeoUZBgHEKWpAM01_AMOPWM8
ContentType Journal Article
DBID DOA
DOI 10.11959/j.issn.1000-436x.2015138
DatabaseName DOAJ Directory of Open Access Journals
DatabaseTitleList
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EndPage 115
ExternalDocumentID oai_doaj_org_article_cf4348d6965240dfa0504741ea3c4b5b
GroupedDBID -0Y
ALMA_UNASSIGNED_HOLDINGS
CCEZO
CUBFJ
GROUPED_DOAJ
U1G
U5S
ID FETCH-LOGICAL-d169t-9469cb3774a92577255259431045731f3c86e3d957c6757dc6d6cd904b37ab8f3
IEDL.DBID DOA
ISSN 1000-436X
IngestDate Mon Oct 28 19:36:34 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Language Chinese
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-d169t-9469cb3774a92577255259431045731f3c86e3d957c6757dc6d6cd904b37ab8f3
OpenAccessLink https://doaj.org/article/cf4348d6965240dfa0504741ea3c4b5b
PageCount 11
ParticipantIDs doaj_primary_oai_doaj_org_article_cf4348d6965240dfa0504741ea3c4b5b
PublicationCentury 2000
PublicationDate 2015-06-01
PublicationDateYYYYMMDD 2015-06-01
PublicationDate_xml – month: 06
  year: 2015
  text: 2015-06-01
  day: 01
PublicationDecade 2010
PublicationTitle Tongxin Xuebao
PublicationYear 2015
Publisher Editorial Department of Journal on Communications
Publisher_xml – name: Editorial Department of Journal on Communications
SSID ssib051376031
ssj0002912165
ssib001102965
ssib023646527
ssib023168036
ssib036439991
ssib050281523
ssib000968473
Score 2.1154752
Snippet With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors...
SourceID doaj
SourceType Open Website
StartPage 105
SubjectTerms anonymous communication system;Tor;credible appraisal;diversity
Title Diversity of controllable anonymous communication system
URI https://doaj.org/article/cf4348d6965240dfa0504741ea3c4b5b
Volume 36
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA6yB_EiiopvKniNmzSPZo6-lkXQkwt7K3kiIiiygvjrnaRdt568eGxKpzRp5vsmmXxDyLkQjQtOC-pVFtWWmlOX6kCN9hbAAnNFSPv-QU9n8m6u5oNSXzknrJMH7jpu7JMU0gQNWiH4hGSZYhJhMFrhpVOueF8Gg2CqJ-bodocnRlkNq_28OpdrYkKvrrVE-z9ALDJOw0pFRiEKI9D92FM855L0-2fZ59fAa17qVub1ciqFnq-Ts-KRQMH4uczoi-W9z5xShjbMr0IBBdEmW2Szp6LVZdcF22Tt62mHmJtlokb1mqo-kf0ln6-q7HKlAJsHp0qqTgx6l8wmt4_XU9pXV6CBa1hQwMDYO4H0zwLO2wZjCwyFkE8gyWsET8IbHUUA1XgMKprgddA-AJP4jHUmiT0ywvfGfVI1DiFOJqQm0chgJXBbR8ksOO5NDOaAXOXPbN86AY02S1qXBhzoth_o9q-BPvwPI0dkI3d9l-t1TEaL9494gqxi4U7LD_QN_bi7EQ
link.rule.ids 315,783,787,867,2109,27937,27938
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Diversity+of+controllable+anonymous+communication+system&rft.jtitle=Tongxin+Xuebao&rft.au=Yan-wei+ZHOU&rft.au=Zhen-qiang+WU&rft.au=Bo+YANG&rft.date=2015-06-01&rft.pub=Editorial+Department+of+Journal+on+Communications&rft.issn=1000-436X&rft.volume=36&rft.spage=105&rft.epage=115&rft_id=info:doi/10.11959%2Fj.issn.1000-436x.2015138&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_cf4348d6965240dfa0504741ea3c4b5b
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1000-436X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1000-436X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1000-436X&client=summon