The Optimizing of the P2P Anonymous Network System in Security and Efficiency Aspects
|School||Shanghai Jiaotong University|
|Course||Electronics and Communication Engineering|
|Keywords||MSAN Anonymous Network Secure Communication Topological Structure of Anonymous Network|
Information technology is becoming more and more important and it has already become one necessary part in people’s life and work. With the basis of new technical computer science and information security technology. Nowadays more and more events about information hacking have been exposed in public. Scientists take more attention in this field. The anonymity is one part in information security field, and anonymity can make the network attendees anonymous and invisible. So anonymous communication technology appears and it is able to fix the problem which may cause the leak of users’private information and network address. In the initiation of the developing history of anonymous network, forwarding technology is the most popular technology. After that, with the development of P2P technology, anonymous network has absorbed this new technology, and based this new technology, anonymous network becomes securer. Single logic anonymous strategy is a kind of popular and simple strategy which is vastly used in information security field. However, multiple logic anonymous strategies will take the place of single logic anonymous network ,because the settled logic strategy is easily to be hacked because of the well-known strategy. At the mean time, the single logic anonymous network cannot meet the different requests from different users. In MSAN system, new tunnel has been used as the core part, and the whole system logic has a high efficiency and security and can meet different requests. In the communication of tunnel, MSAN has a mechanism of multi-encryption, and the hacker cannot decrypt the ciphertext or lots of effort will be spent in the decryption.With this background, author researches many models in anonymous network and make one become the candidate model. As the basis, candidate model is modified and optimized in both security and efficiency aspects. The main task is balancing the anonymous ability and efficiency. And finally , the anonymous ability and efficiency are tested in simulation platform.