{"title":"A secure and anonymous communication scheme based on Internet public service environment","authors":"Kaijun Wu, Bo Tian, Xue Wang, Qi Zhao","doi":"10.1109/NaNA56854.2022.00079","DOIUrl":null,"url":null,"abstract":"With the continuous expansion of the Internet and the full popularization of intelligent terminal devices, the risk of a large amount of personal privacy data such as identity, location, and preferences being leaked during Internet communication is getting higher and higher. Although the existing cryptographic technologies such as encryption and authentication can realize the security of information content and can effectively prevent attackers from obtaining information illegally, they cannot prevent attackers from obtaining important information such as the location and identity of nodes through eavesdropping and traffic analysis. The secure and anonymous communication technology represented by Tor has always been the focus of researchers. It is essential to realize free and open communication on today's Internet, but it is usually only when large institutions invest huge resources to complete the construction of a secure and anonymous system. This paper proposes a method for constructing a secure and anonymous transmission network based on Internet public services (such as VPS, cloud storage services, P2P networks, etc.), and at the same time, a redundant sharding mechanism is designed to improve the transmission capacity. Then complete the construction of the system prototype by renting a virtual host, and realize the practical ability test of the safe and anonymous system. Provide small-scale and convenient secure and anonymous transmission capabilities in emergencies such as epidemics.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA56854.2022.00079","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
With the continuous expansion of the Internet and the full popularization of intelligent terminal devices, the risk of a large amount of personal privacy data such as identity, location, and preferences being leaked during Internet communication is getting higher and higher. Although the existing cryptographic technologies such as encryption and authentication can realize the security of information content and can effectively prevent attackers from obtaining information illegally, they cannot prevent attackers from obtaining important information such as the location and identity of nodes through eavesdropping and traffic analysis. The secure and anonymous communication technology represented by Tor has always been the focus of researchers. It is essential to realize free and open communication on today's Internet, but it is usually only when large institutions invest huge resources to complete the construction of a secure and anonymous system. This paper proposes a method for constructing a secure and anonymous transmission network based on Internet public services (such as VPS, cloud storage services, P2P networks, etc.), and at the same time, a redundant sharding mechanism is designed to improve the transmission capacity. Then complete the construction of the system prototype by renting a virtual host, and realize the practical ability test of the safe and anonymous system. Provide small-scale and convenient secure and anonymous transmission capabilities in emergencies such as epidemics.