ダウンロード数: 311

このアイテムのファイル:
ファイル 記述 サイズフォーマット 
COMPSAC.2015.215.pdf241.51 kBAdobe PDF見る/開く
完全メタデータレコード
DCフィールド言語
dc.contributor.authorTsujio, Naokien
dc.contributor.authorOkabe, Yasuoen
dc.contributor.alternative岡部, 寿男ja
dc.date.accessioned2015-07-21T00:33:43Z-
dc.date.available2015-07-21T00:33:43Z-
dc.date.issued2015-
dc.identifier.isbn9781467365635-
dc.identifier.issn0730-3157-
dc.identifier.urihttp://hdl.handle.net/2433/198788-
dc.description2015 IEEE 39th Annual Computer Software and Applications Conference Workshop (COMPSACW): Taichung, Taiwan - July 1-5, 2015en
dc.description.abstractAnyone can publish various kinds of information on the Internet almost freely, but in some cases such information distribution is inhibited by the authorities. In order to resist such censorship, there have been developed many anonymous information distribution systems such as Freenet and Tor, but some people argue that such a system may also be a hotbed of crime since scrupulous anonymity disturbs investigations. In this paper, an article distribution system is proposed, which protects pseudonymity of users from surveillance by the authorities as with existing anticensorship systems. As a novel point, the proposed system allows a user to trace the publisher of an article by cooperation of the users who have relayed the article. This will suppress criminal acts abusing pseudonymity in the system. On the other hand, it is difficult to trace the publisher for a single government or an organization alone unless it obtains cooperation of multiple users. The proposed system will therefore be able to avoid authoritarian censorship or surveillance by the authorities. The system adopts P2P architecture, and a user can publish articles to other users like Netnews. A published article is relayed by node to node and spreads over the network of the system. In order to trace the publisher of an article, a user records a relaying log when he relays an article. A relaying log contains information about the predecessor from whom the user received the article. A user can trace the publisher by gathering relaying logs. Each user has responsibility to determine whether to disclose a relaying log or not, considering the content of the article. If all users along the path from the publisher agree to cooperate in gathering their logs, they will be able to trace to the publisher. The performance of the system is discussed in evaluation, how users’ actions affect traceability, and what should users do if governments intervene in the system.en
dc.format.mimetypeapplication/pdf-
dc.language.isoeng-
dc.rights© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en
dc.rightsこの論文は出版社版でありません。引用の際には出版社版をご確認ご利用ください。ja
dc.rightsThis is not the published version. Please cite only the published version.en
dc.subjectpeer-to-peeren
dc.subjectcensorshipen
dc.subjectprivacyen
dc.subjecttraceableen
dc.subjectinformation distributionen
dc.titleA Traceable and Pseudonymous P2P Information Distribution Systemen
dc.typejournal article-
dc.type.niitypeJournal Article-
dc.identifier.jtitle2015 IEEE 39th Annual International Computers, Software & Applications Conference Workshopsen
dc.identifier.spage67-
dc.identifier.epage72-
dc.relation.doi10.1109/COMPSAC.2015.215-
dc.textversionauthor-
dc.relation.urlhttp://www.computer.org/web/compsac/2015-homepage-
dc.relation.urlhttps://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=34892-
dcterms.accessRightsopen access-
出現コレクション:学術雑誌掲載論文等

アイテムの簡略レコードを表示する

Export to RefWorks


出力フォーマット 


このリポジトリに保管されているアイテムはすべて著作権により保護されています。