Application of anonymous communication technology in e-commerce
Abstract: With the rapid development and wide application of the Internet, security issues such as anonymity and privacy on the Internet have gradually become the focus of global attention, especially in the field of e-commerce. Starting with an overview of anonymous communication technology, this paper briefly discusses onion routing anonymous communication technology and its application in e-commerce.
[Keywords:] Internet security e-commerce anonymous communication onion routing
With the rapid development of internet technology, e-commerce based on network technology came into being and developed rapidly. As a new modern business model, e-commerce is gradually replacing the traditional business model. However, the security of online transactions has gradually become the core and key issue of e-commerce development. Especially with the increasing number of netizens, privacy and protection in information networks have become one of the most concerned issues for netizens. According to statistics, 58% of e-commerce consumers are worried that personal privacy cannot be effectively guaranteed and give up online shopping and other services. Therefore, protecting the privacy in the network will become an important guarantee for the development of e-commerce. Aiming at the problem of privacy protection in e-commerce activities, this paper briefly discusses anonymous communication and related technologies in e-commerce transactions.
I. Anonymous communication system technology
As a network security, its technology is always put forward to defend against some network attacks, and anonymous communication technology is no exception. Anonymous communication technology refers to hiding the communication relationship in the data stream through certain methods, so that eavesdroppers cannot directly know or infer the communication relationship between two parties and one party. An important purpose of anonymous communication is to hide the identity information or communication relationship between the two parties, so as to realize the privacy of personal communication of network users and better protect confidential communication. With the continuous development of electronic commerce, anonymous communication technology plays a very important role in effectively protecting electronic transactions in electronic commerce activities.
Usually, according to the different information to be hidden, anonymity can be divided into three forms: the sender's anonymity is to protect the identity information of the communication initiator, and the receiver's anonymity is to protect the identity information of the communication receiver. The unlinkability of the initiator or the receiver is to make the information in the communication reach the other party indirectly through some technology, so that the sender and the receiver cannot be related.
Second, Tor anonymous communication system.
The concept of 1 Tor anonymous communication system
Tor (Second Generation Onion Router) is the second generation onion routing system, which consists of a group of onion routers (also called Tor nodes). These onion routers are used to forward traffic from the starting point to the destination. Every onion router tries its best to ensure that there is no correlation between input data and output data in the eyes of external observers, that is, the output data packet cannot judge its corresponding input data packet, so that the attacker cannot analyze the communication traffic by tracking the data flow in the channel. Tor is a network composed of virtual channels, which groups and individuals use to protect their privacy and security on the Internet.
Different from the traditional anonymous communication system, Tor does not accurately mix data from different users, that is, it does not adopt batch processing technology, which can ensure that all connected data are forwarded fairly. When the stream cache of a connection is empty, it will skip the connection and forward the data in the next non-empty connection cache. Because one of Tor's goals is low latency, it does not perform traditional operations such as precise latency, reordering, batch processing and padding information discarding.
2.2 analysis. Tor anonymous communication technology
The main purpose of onion routing technology is to hide key information such as network structure and communication address on public network, and at the same time, it can effectively prevent attackers from analyzing traffic and eavesdropping on the Internet. Onion routing technology combines Mix technology and Agent mechanism, and does not need to make any changes to the application layer of the Internet. Through onion proxy router, using connection-oriented transmission technology and the idea of source routing technology, the routing nodes that onion packets pass through layer by layer are encrypted and encapsulated. The middle onion router decrypts the received onion packet, obtains the router address of the next hop, peels off the outermost layer of the onion packet, fills in any characters at the end of the packet, and delivers a new onion packet according to the indicated address.
Onion routing scheme adopts real-time bidirectional hidden path, which is an anonymous connection between the proxy server on the request site W and the target host, and its data flow reaches the destination site after passing through several intermediate onion routers, forming a hidden path. In order to establish a session path between the requesting site and the responding site, the agent of the requesting site determines a series of secure routers to form a path through the public network, and uses the public key of each onion router to construct an encapsulated routing packet, through which the bidirectional session encryption key and encryption function are distributed to each onion router. If the allocation is successful, an onion hidden path is established between the request and response sites. Loose source routing is used to establish this hidden path. In order to enhance the ability to resist path analysis, onion packets use padding technology, and the packet size transmitted between each onion router site is the same.
3. Research status at home and abroad
Tor is the implementation of the second generation onion routing, through which network users can communicate anonymously on the Internet. Initially, the project was sponsored by the United States Naval Research Laboratory. In 2004, Tor became a project of the Electronic Frontier Foundation. At the end of 2005, EFF stopped sponsoring the Tor project, but the developers continued to maintain the official website of Tor. We can easily download the Tor program from http://tor.eff.org website, and we can communicate anonymously through Tor. Moreover, Tor is mainly aimed at a large number of tools such as traffic filtering and sniffing analysis, which is improved on the basis of JAP and other software, and supports Socks5 and dynamic proxy chain, so it is difficult to be tracked and can effectively ensure the security of the network. In addition, Tor has realized the analysis and design of anonymity principle, but there is no standardized protocol standard, because it is constantly developing and changing. Tor is a tool set, the latest version (stable version 0.1.2.17; Beta 0.2.0.6-alpha) fixes some serious security vulnerabilities.
Three. Concluding remarks
In a word, the protection of network privacy is a huge project. In the e-commerce environment based on anonymous communication technology, which anonymous communication technology should be adopted depends on the actual situation, and other network security technical measures, such as firewall technology, virus protection technology, authentication technology, encryption technology, etc. Only in this way can we ensure safe electronic transactions between the two parties in e-commerce activities, thus further promoting the vigorous development of e-commerce in China.
References:
Zhang Guoyin. Discussion and analysis of e-commerce network security measures [J]. Computer knowledge and technology. 2007, (22)
[2] Wu Yanhui Wang Weiping: Research on anonymous communication system based on rerouting [J]. Computer Engineering and Application, 2006, (17)
For reference only, please learn by yourself.
I hope it helps you.
Supplement:
This is the latest information. If you need anything else, please leave a message for consultation.