Addressing Privacy: Matching User Requirements with Implementation Techniques

Size: px
Start display at page:

Download "Addressing Privacy: Matching User Requirements with Implementation Techniques"

Transcription

1 Addressing Privacy: Matching User Requirements with Implementation Techniques Evangelia Kavakli 1, Christos Kalloniatis 1 and Stefanos Gritzalis 2 Abstract--The paper considers the basic privacy requirements namely anonymity, pseudonimity, unlinkability and unobservability and how these requirements can be linked with related system implementation techniques thus guiding design decisions during system development. Index terms-- privacy, privacy requirements, privacy enhancing technologies I. INTRODUCTION Privacy as a social and legal issue, traditionally, has been the concern of social scientists, philosophers and lawyers. However, the extended use of modern IT systems and communication networks in the context of several daily activities (e.g. banking, shopping, communicating with friends, collaborating with government authorities, etc), sets additional requirements for protecting the electronic privacy of individuals. Indeed, on the way to a Global Information Society with different national and international programmes aiming at the further development of data highways, there are multiple privacy risks. In the last decade most of the Internet users have raised a great concern regarding their privacy since they can sense and see how easily their personal data can be exposed. According to a survey presented in Business Week (1998), privacy and anonymity are the fundamental issues of concern for most Internet users, ranked above issues like ease-of-use, spam-mail, security and cost. According to the same survey, 78 percent of online users would use the Internet more and 61 percent of non-users would start using the Internet if privacy policies and practices where disclosed. It is true that nowadays this specific fact is being exploited for attracting more Internet users, since according to a Federated Trade Commission study, only 16 percent of corresponded sites were found to have had any privacy statement or policy in 1998, while in 2000 this percentage has increased to 65.7 percent. Besides it being a contemporary data highway on which the global information society may be built, Internet is known for many security risks. Thus, the vast development of new information infrastructures might lead to a vulnerable information society based on insecure technologies. In the information society, privacy cannot be sufficiently protected solely by legislation. Privacy should also be 1 Department of Cultural Technology and Communication University of the Aegean, Harilaou Trikoupi & Faonos Str., Mytilene, Greece { kavakli, ch.kalloniatis}@ ct.aegean.gr 2 Information and Communication Systems Security Laboratory, Department of Information and Communications Systems Engineering, University of the Aegean, Samos, Greece sgritz@aegean.gr enforced by appropriate technologies and this is the subject matter of this paper. The work presented is structured as follows. Firstly, the basic privacy requirements that should be considered during system design and development are analysed. Secondly, the privacy implementation techniques that realize these requirements are presented. The paper concludes with a critical analysis of the above techniques. The aim of this analysis is twofold: (a) to understand the coverage of the area and (b) to understand the best fit for purpose of different privacy implementation techniques. II. DEFINING PRIVACY Review of current research in the area of user privacy highlights the path for user privacy protection in terms of four privacy requirements namely anonymity, pseudonymity, unlinkability and unobservability [1,5]. By addressing these requirements one aims to minimize or eliminate the collection of user identifiable data. The following A D describe the definition of each of the above privacy requirements as found in relevant literature. A. Anonymity J. C. Cannon in [5] expresses anonymity as the state of being anonymous or virtually invisible; having the ability to operate online without being tracked. S. Fischer-Hübner in [1] presents anonymity as the ability of a user to use a resource or service without disclosing his/her identity. A formal definition for anonymity is given by A. Pfitzmann in [7]. Let RU denote the event that an entity U (e.g. a user) performs a role R during an event E. Let A denote an attacker and NCA the set of entities that are not cooperating with A. An entity U is called anonymous in role R for an event E against an attacker A if for each observation B that A can make the following relation holds: U NC A :0 < P(R U B) < 1 (1) The outcome of the above definitions is that anonymity serves the great purpose of hiding personal identifiable information when there is no need of revealing them. Browsing the Internet only for collecting information is one of many issues that anonymity plays a significant role and must be attained. B. Pseudonimity Pseudonymity is the user s ability to use a resource or service by acting under one or many pseudonyms, thus hiding his/her real identity. However, under certain circumstances the possibility of translating pseudonyms to real identities exists. Pseudonyms are aliases for a user s real identity. Users are allowed to operate under different 1

2 aliases. Nevertheless revelation of user s real identity occurs when acting unlawfully. Pseudonymity has characteristics similar to anonymity in that user is not identifiable but can be tracked through the aliases he/she uses [5]. Pseudonymity is used for protecting user s identity in cases where anonymity cannot be provided (e.g. if the user has to be held accountable for his/her activities [1]. In [8] a classification of pseudonyms according to their degree of protection is presented. C. Unlinkability As J. C. Cannon states in [5], unlinkability expresses the inability to link related information. In particular, unlinkability is successfully achieved when an attacker is unable to link specific information with the user that processes that information. Also unlinkability can be successfully achieved between a sender and a recipient. In that case unlinkability means that though the sender and recipient can both be identified as participating in some communication, they cannot be identified as communicating with each other. A. Pfitzmann in [7] addresses unlinkability in the following formal way. Let XE,F denote the event that events E and F have a corresponding characteristic X. Two events E and F are unlinkable in regard of a characteristic X for an attacker A, if for each observation B that A can make, the probability that E and F are corresponding in regard of X given B is greater than zero and less than one: 0 < P(X E,F B) < 1 (2) The ability to link transactions could give a stalker an idea of your daily habits or an insurance company an idea of how much alcohol your family consumes over a month. Ensuring unlinkability is vital for protecting user s privacy. D. Unobservability Unobservability protects users from being observed or tracked while browsing the Internet or accessing a service. Unobservability is similar to unlinkability in the sense that the attacker aims to reveal users identifiable information by observing rather than linking the information he/she retrieves. In [7] a formal representation of unobservability is stated as follows. An event E is unobservable for an attacker A if for each observation B that A can make, the probability of E given B is greater than zero and less than 1. 0 < P(E B) < 1 (3) III. PRIVACY ENHANCING TECHNOLOGIES This section provides an overview of the software mechanisms, tools, protocols and services that have been designed for protecting user s privacy. An extended comparison of these architectures can be found in [6]. A. Anonymizer One of the best-known Web anonymity tools is the Anonymizer, a service that submits HTTP requests on behalf of its users. The main concept introduced by the Anonymizer tools is the existence of a third-party Web site [9], which acts as a middle layer between the user and the site to be visited. When the user wishes to visit a specific Web page, instead of establishing a direct link to the required Web server, he/she does so through the Anonymizer Web site. Having established the connection, Anonymizer forwards the information received from the desired Web site back to the user. Anonymizer is extremely easy to use but it has some inherent vulnerabilities. The first is that users should trust the Anonymizer service because the Anonymizer server monitors all the Web sites visited by the user, thus collecting information about his/her behaviour. The second vulnerability is that Anonymizer does not provide any assurance for the communication between the user s machine and the Anonymizer server. Finally, no anonymity is provided when user invokes helper applications like Real Audio, since these applications by pass the server and establish their own Net connections. B. Crowds Crowds is an anonymity agent based on the idea that people can be anonymous when they blend into the crowd. Crowds enables the retrieval of information over the Web without revealing so much potentially private information to several parties. The goal of Crowds is to make browsing anonymous, so that information about either the user or what information he/she retrieves is hidden from Web servers and other parties [11]. Specifically, Crowds concentrates Web users into a geographically diverse group, called crowd that performs Web transactions on behalf of its members. Each user is represented in the crowd through a process running on his/her local machine called jondo. According to [10] jondos interfere between the Crowds users and a Web server. When a user starts his/her jondo an automatic procedure is triggered through which the local jondo is informed about the current members of the crowd and viceversa. If this negotiation procedure is successful and the jondo is accepted as a member of the crowd, it can issue requests to Web servers ensuring that its identity is neither revealed to the Web servers nor to any other crowd member [6]. C. Onion Routing Onion Routing is a general-purpose infrastructure for private communications over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis [12, 13]. Onion Routing consists of two parts: the network infrastructure that accommodates the anonymous connections and a proxy interface that links these connections to unmodified applications. The network contains a set of onion routers. Each router is a store and forward device that accepts a number of fixedlength messages from numerous sources, performs cryptographic transformations on the messages and forwards them to the next destination in a random order. Proxies act as interfaces between the applications and the 2

3 network infrastructure. The functions of a proxy can be split into two: the part that links the initiator to the anonymous connection and the part that links the anonymous connection to the responder. After the initiator contacts his/her proxy, Onion Routing proceeds with the following steps: define the route, construct the anonymous connection, moves data through the anonymous connection, destroy the anonymous connection. D. DC-Nets A DC-Net (Dining Cryptographers Network) proposed in [14,15] allows participants to send and receive messages anonymously in an arbitrary network. It can be used to provide perfect sender anonymity. DC-Net is based on binary superposed sending. Each user station generates at least one key bit for each message bit and sends each key bit to exactly one other user station over a secure channel. For each single sending step, every user station adds modulo 2 (superposes) all the key bits it shares and its message bit, if there is one. Stations that do not wish to transmit messages send zeros by outputting the sums of their key bits (without any inversions). The sums are sent over the net and added up modulo 2. The result is distributed to all user stations. The result is the sum of all sent message bits, because every key bit was added twice. If a participant transmits a message, the message is successfully delivered as the result of the global sum to each participant. E. Mix-Nets The technique of Mix network, originally introduced in [16] and further discussed in [17] realises unlinkability of sender and recipient as well as sender anonymity against recipient and optionally recipient anonymity [1]. A mix is a network station, which collects a number of messages of equal length from the senders, discards repeats, changes their encodings, and forwards the messages to the recipients in a different order. By using only one mix, malicious users cannot identify the relation between sender and recipient but the mix and the sender can. A chain of independent mix stations is used for improving security. Using a chain of mixes a global attacker, who has access to all communication lines, can only trace a message through the mix network, if he/she has the cooperation of all mix nodes on the path or if he/she can break the cryptographic operations that mix stations use. Ensuring the trustworthiness of at least one mix, unlinkability of sender and recipient is ensured. F. Hordes Hordes is a protocol that engages multiple proxies for routing a packet to a responder in an anonymous way while it uses multicast services for routing the reply to the initiator again in an anonymous way. Hordes architecture is based on several proxies called jondos, which are logically positioned between a Hordes user and a Web server. Each user s request is forwarded, through a number of jondos, to the destination Web server. While Hordes has the same characteristics as Crowds (see 3.2.2) the functionality of these two is significantly different [6]. Hordes has been designed for gathering many participants in the same reception group. This is succeeded because Hordes takes advantage of the anonymity characteristics and performance benefits inherent in the IP multicast routing. Multicast addresses are not associated with any particular device attached to the network. They are just labels that refer to the receivers of the group as a whole. The number of hosts acting as receivers of a multicast routing tree, as well as, their status, is dynamic and unknown to routers and hosts. Hordes utilises multicast communication for the reverse path of anonymous connections, achieving not only anonymity but also sender unlinkability and unobservability. A detailed description of Hordes is given in [18]. G. GAP GNUnet s Anonymity Protocol GAP [19] is a recently presented protocol claiming to achieve anonymous data transfers. GNUnet is a peer-to-peer network and its framework provides peer discovery, link encryption and message batching. GAP has been designed for securing GNUnet. It aims to hide the identity of an initiator and a responder from all other entities, including GNUnet routers, active and passive adversaries and the responder or initiator respectively [6]. The communication between all network nodes is confidential; no host outside the network can observe the actual data travelling across the network. Data types are not identifiable since all packets are padded in order to have identical size. The most significant difference between GAP and prior mix-based protocols is that traditional mix-based protocols always perform source rewriting at each hope. GAP mixes can specify a return-to-address other than their own, thereby allowing the network to route replies more efficiently. However, GAP s greater vulnerability is that it has been customised to the functionality of a peer-to-peer network. H. Tor Tor, presented in [20], is an architecture based on the Onion Routing architecture described above. However, Tor has many improvements over the original Onion Routing. Firstly, Tor satisfies perfect forward secrecy by using an incremental path-building design, where the initiator negotiates session keys with each successive hop in the circuit. Once these keys are deleted, subsequently compromised nodes cannot decrypt old traffic. Secondly, Tor uses a standard SOCKS proxy interface allowing users to support most TCP-based programs without modification. Tor improves efficiency and anonymity by multiplexing multiple TCP streams along each circuit whereas Onion Routing builds a separate circuit for every application-level request. This technology addresses traffic bottleneck, while none of the well-known methodologies do, by allowing the nodes at the edges of the network to detect congestion or flooding and send less data until the congestion subsides. Another improvement is Tor s end-to-end integrity checking. Any node in the network has the ability to alter 3

4 data before sending them to the next one. Onion Routing did no integrity checking on data. Tor verifies data integrity before leaving the network by performing an end-to-end integrity checking. Finally, Tor provides an integrated mechanism for responder anonymity via location-protected servers. Clients negotiate rendezvous points to connect with hidden servers. While Onion Routing included reply onions that could be used to built circuits to a hidden server, these onions did not provide forward security and became useless if any node in the path went down or rotated its keys. In Tor s architecture reply onions are no longer required. IV. MATCHING PRIVACY REQUIREMENTS WITH IMPLEMENTATION TECHNIQUES Table 1 presents a summary of the basic privacy requirements and the relative implementation techniques that satisfy these requirements. It is obvious that all of the techniques mentioned in section III have as a primary concern the satisfaction of sender s anonymity. Most of these techniques aim to satisfy users that often communicate over insecure public networks and the Internet. The majority of Internet users wish to browse web sites anonymously and only when it is important (i.e e- banking services) to sacrifice their anonymity for using the services offered. Of course, there are always enterprises that decide to take the next step and offer, on a venerable degree, services that offer not only anonymity but also unlinkability and unobservability to users. Nowadays, many intruders learn perfectly how to use new technologies against unsuspected users especially when the latter try to realize a bank transaction over the Internet. Users trust for using e- services rises when enterprises provide not only perfect anonymity but also untraceability, unlinkability and unobservability services. Technologies and protocols like Onion Routing, Tor, Hordes, GAP and Mix-Nets promise such services. Anonymity Unlinkability Unobservability Anonymizer Y N N Crowds Y N N Onion Routing Y Y N DC-Nets Y N N Mix-Nets Y Y N Hordes Y Y Y GAP Y Y Y Tor Y Y Y Y: Yes / N: No Table 1. Matching Privacy Requirements with Implementation Techniques Despite the fact that most of the above techniques satisfy the majority of user privacy requirements another criterion must also be considered from the designers and the developers when selecting the most suitable implementation technique. The cost criterion. Providing anonymity through Crowds is a lot cheaper that providing it through Tor. Of course the Tor architecture provides more services and in a more reliable and robust way. Designers and developers should first decide what kind of services their enterprise will offer and how it will be offered and then choose the appropriate implementation technique. It should be noted that pseudonimity is not included in table 1 since as it is mentioned previously pseudonymity is provided mainly when anonymity is not allowed and most of the afore-mentioned techniques provide services for anonymity. Of course techniques that provide anonymity can easily provide pseudonimity as well. Additional techniques that are widely used for providing user pseudonimity, include: Hash Functions Biometrics Public Encryption Keys Certificates Trusted Third Parties V. CONCLUSIONS This paper presents the basic privacy requirements necessary for protecting users privacy, as well as the existing implementation techniques that satisfy these requirements. Analysis of the above techniques shows that most of the implementation techniques aim on satisfying anonymity and pseudonimity requirements whereas only three of the discussed techniques consider all basic privacy requirements. Nowadays, in a fully networked society, privacy is seriously endangered and cannot be sufficiently protected by privacy legislation or privacy codes of conduct alone. Data protection commissioners are therefore demanding that privacy requirements should also be technically enforced and that privacy should be a design criterion for information systems. VI. REFERENCES [1] Fischer-Hübner, S.: IT-Security and Privacy, Design and Use of Privacy Enhancing Security Mechanisms. Lecture Notes in Computer Science, Vol Springer-Verlag, Berlin Heidelberg New York (2001) [2] Kalloniatis, C., Kavakli, E., Gritzalis, S.: Security Requirements Engineering for e-government Applications: Analysis of Current Frameworks. DEXA EGOV 04 Conference, Lecture Notes in Computer Science, Vol Springer-Verlag, Berlin Heidelberg New York (2004) [3] Loucopoulos, P., Kavakli, V.: Enterprise Knowledge Management and Conceptual Modelling. Lecture Notes in Computer Science, Vol Springer-Verlag, Berlin Heidelberg New York (1999) [4] Loucopoulos, P.: From Information Modelling to Enterprise Modelling. In: Information Systems Engineering: State of the Art and Research Themes. 4

5 Springer-Verlag, Berlin Heidelberg New York (2000) [5] Cannon, J.,C.: Privacy, What Developers and IT Professionals Should Know. Addison-Wesley (2004) [6] Gritzalis, S.: Enhancing Web privacy and anonymity in the digital era. Information Management and Computer Security, Vol. 12, No. 3. Emerald Group Publishing Limited (2004) [7] Pfitzmann,A.:Diensteinte-grierende Kommunikationsmnetze mit teilnehmerüberprüfbaren Datenschutz. Informatik-Fachberichte 234. Springer-Verlag, Berlin Heidelberg New York (1990) [8] Pfitzmann, B., Waidner, M., Pfitzmann, A.: Rechsicherheit trotz Anonymität in offenen digitalen Systemen. Datenschutz und Datensicherheit(DuD) No. 6 (1990) (Part 1), No. 7 (1990) (Part 2) [9] Anonymizer, available at [10] Reiter, K.M., Rubin, D.A.: Crowds: Anonymity for Web Transactions. ACM Transactions of Information and System Security, Vol. 1, No. 1 (1998) [11] Reiter, K.M., Rubin, D.A.: Anonymous Web Transactions with Crowds. Communications of the ACM, Vol. 42, No. 2 (1999) [12] Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and Onion Routing. IEEE Journal on Selected areas in Communications, Vol. 16, No. 4 (1998) [13] Goldschlag, D., Syverson, P., Reed, M.: Onion Routing for anonymous and private Internet connections. Communications of the ACM, Vol. 42, No. 2 (1999) [14] Chaum, D.: Security without identification: Transactions Systems to make Big Brother Obsolete. Communications of the ACM, Vol. 28, No. 10 (1985) [15] Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology, Vol. 1, No. 1 (1988) [16] Chaum, D.: Untraceable Electronic Mail, return Addresses, and Digital Pseudonyms. Communications of the ACM, Vol. 24, No. 2 (1981) [17] Pfitzmann, A., Waidner, M.: Networks without user Observability. Computers & Security, Vol. 6, Issue 2 (1987) [18] Shields, C., Levine, N.B.: A protocol for anonymous communication over the Internet. In: Samarati, P. and Jajodia, S. (eds.): Proceedings of the 7 th ACM Conference on Computer and Communications Security. ACM Press New York NY, (2000) [19] Bennett, K., Grothoff, C.: GAP-Practical Anonymous networking. Proceeding of the Workshop on PET2003 Privacy Enhancing Technologies (2003), also available at [20] Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generator Onion Router. Proceedings of the 13 th USENIX Security Symposium, San Diego, CA, USA (2004) 5

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012 Anonymous Communication: DC-nets, Crowds, Onion Routing Simone Fischer-Hübner PETs PhD course Spring 2012 DC (Dining Cryptographers) nets [Chaum 1988 ] Chaum, CACM 28(10), October 1985 Who paid for the

More information

Protocols for Anonymous Communication

Protocols for Anonymous Communication 18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your

More information

Network Forensics and Privacy Enhancing Technologies living together in harmony

Network Forensics and Privacy Enhancing Technologies living together in harmony Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2006 Network Forensics and Privacy Enhancing Technologies living together

More information

Anonymous Connections and Onion Routing

Anonymous Connections and Onion Routing Anonymous Connections and Onion Routing David Goldschlag, Michael Reed, and Paul Syverson Center for High Assurance Computer Systems Naval Research Laboratory Washington, D.C. 1 Who is Talking to Whom?

More information

Towards measuring anonymity

Towards measuring anonymity Towards measuring anonymity Claudia Díaz, Stefaan Seys, Joris Claessens, and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 0, B-300 Leuven-Heverlee, Belgium claudia.diaz@esat.kuleuven.ac.be http://www.esat.kuleuven.ac.be/cosic/

More information

Social Networking for Anonymous Communication Systems: A Survey

Social Networking for Anonymous Communication Systems: A Survey Social Networking for Anonymous Communication Systems: A Survey Rodolphe Marques Instituto de Telecomunicações Aveiro, Portugal rmarques@av.it.pt André Zúquete Universidade de Aveiro/IEETA Aveiro, Portugal

More information

Analyzing the Dual-Path Peer-to-Peer Anonymous Approach

Analyzing the Dual-Path Peer-to-Peer Anonymous Approach Analyzing the Dual-Path Peer-to-Peer Anonymous Approach Ehsan Saboori K.N Toosi University of Technology Tehran, Iran Majid Rafigh Shahid Beheshti University (Former National University) Tehran, Iran Alireza

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

CS 134 Winter Privacy and Anonymity

CS 134 Winter Privacy and Anonymity CS 134 Winter 2016 Privacy and Anonymity 1 Privacy Privacy and Society Basic individual right & desire Relevant to corporations & government agencies Recently increased awareness However, general public

More information

ANONYMOUS CONNECTIONS AND ONION ROUTING

ANONYMOUS CONNECTIONS AND ONION ROUTING I J C I T A E Serials Publications 6(1) 2012 : 31-37 ANONYMOUS CONNECTIONS AND ONION ROUTING NILESH MADHUKAR PATIL 1 AND CHELPA LINGAM 2 1 Lecturer, I. T. Dept., Rajiv Gandhi Institute of Technology, Mumbai

More information

Payload analysis of anonymous communication system with host-based rerouting mechanism

Payload analysis of anonymous communication system with host-based rerouting mechanism Payload analysis of anonymous communication system with host-based rerouting mechanism Hongfei Sui Jianer Chen Songqiao Chen Jianxin Wang College of Information Science and Engineering Central South University

More information

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L Anonymity C S 6 8 2 A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L 2 0 1 9 Tor: The Second- Generation Onion Router R. DINGLEDINE N.

More information

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reed y Paul Syverson y January 28, 1999 1 Introduction Preserving privacy means not only hiding the content of messages,

More information

CS526: Information security

CS526: Information security Cristina Nita-Rotaru CS526: Information security Anonymity systems. Based on slides by Chi Bun Chan 1: Terminology. Anonymity Anonymity (``without name ) means that a person is not identifiable within

More information

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Onion Routing Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Motivation Public Network Encryption does not hide Routing Information Traffic Analysis Who is Talking to Whom? by analyzing the traffic

More information

ENEE 459-C Computer Security. Security protocols

ENEE 459-C Computer Security. Security protocols ENEE 459-C Computer Security Security protocols Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p and g public.

More information

Design and Analysis of Efficient Anonymous Communication Protocols

Design and Analysis of Efficient Anonymous Communication Protocols Design and Analysis of Efficient Anonymous Communication Protocols Thesis Defense Aaron Johnson Department of Computer Science Yale University 7/1/2009 1 Acknowledgements Joan Feigenbaum Paul Syverson

More information

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are!

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are! Context Protocols for anonymity The nternet is a public network: Myrto Arapinis School of nformatics University of Edinburgh Routing information is public: P packet headers contain source and destination

More information

ENEE 459-C Computer Security. Security protocols (continued)

ENEE 459-C Computer Security. Security protocols (continued) ENEE 459-C Computer Security Security protocols (continued) Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p

More information

Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981

Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981 Anonymizing Networks Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981 Reed, Syverson, Goldschlag, Anonymous Connections and Onion

More information

Anonymity. Assumption: If we know IP address, we know identity

Anonymity. Assumption: If we know IP address, we know identity 03--4 Anonymity Some degree of anonymity from using pseudonyms However, anonymity is always limited by address TCP will reveal your address address together with ISP cooperation Anonymity is broken We

More information

How Alice and Bob meet if they don t like onions

How Alice and Bob meet if they don t like onions How Alice and Bob meet if they don t like onions Survey of Network Anonymisation Techniques Erik Sy 34th Chaos Communication Congress, Leipzig Agenda 1. Introduction to Anonymity Networks Anonymity Strategies

More information

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring Onion Routing Varun Pandey Dept. of Computer Science, Virginia Tech 1 What is Onion Routing? a distributed overlay network to anonymize TCP based routing Circuit based (clients choose the circuit) Each

More information

Low Latency Anonymity with Mix Rings

Low Latency Anonymity with Mix Rings Low Latency Anonymity with Mix Rings Matthew Burnside and Angelos D. Keromytis Department of Computer Science, Columbia University {mb,angelos}@cs.columbia.edu Abstract. We introduce mix rings, a novel

More information

Anonymous communications: Crowds and Tor

Anonymous communications: Crowds and Tor Anonymous communications: Crowds and Tor Basic concepts What do we want to hide? sender anonymity attacker cannot determine who the sender of a particular message is receiver anonymity attacker cannot

More information

Chapter 13 Location Privacy

Chapter 13 Location Privacy Chapter 13 Location Privacy Security aspects of mobile communication Implicit addressing Pseudonyms Communication mixes [NetSec], WS 2007/2008 13.1 Security Aspects of Mobile Communication Mobile communication

More information

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms EJ Jung Goals 1. Hide what you wrote encryption of any kind symmetric/asymmetric/stream 2. Hide to whom you sent and when pseudonym?

More information

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul THE SECOND GENERATION ONION ROUTER Roger Dingledine Nick Mathewson Paul Syverson 1 -Presented by Arindam Paul Menu Motivation: Why do we need Onion Routing? Introduction : What is TOR? Basic TOR Design

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: Anonymity Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson

Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson Tor: The Second-Generation Onion Router Roger Dingledine, Nick Mathewson, Paul Syverson Introduction Second Generation of Onion Routing Focus on deployability Perfect forward secrecy Separation of protocol

More information

CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION

CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION #RSAC SESSION ID: CRYP-W04 CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION Adam Shull Recent Ph.D. Graduate Indiana University Access revocation on the cloud #RSAC sk sk Enc Pub Sym pk k

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012 Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

An Optimal Strategy for Anonymous Communication Protocols

An Optimal Strategy for Anonymous Communication Protocols An Optimal Strategy for Anonymous Communication Protocols Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao Department of Computer Science Texas A&M University College Station, TX 77843-3112 E-mail: yguan,

More information

Peer-to-Peer Systems and Security

Peer-to-Peer Systems and Security Peer-to-Peer Systems and Security Anonymity Christian Grothoff Technische Universität München May 16, 2013 The problem with losing your anonymity is that you can never go back. Marla Maples Motivation

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 25 April 18, 2012 CPSC 467b, Lecture 25 1/44 Anonymous Communication DISSENT- Accountable Anonymous

More information

Peer-to-Peer Networks 14 Security. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 14 Security. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Cryptography in a Nutshelf Symmetric Cryptography - AES - Affine Cryptosystems

More information

2 ND GENERATION ONION ROUTER

2 ND GENERATION ONION ROUTER 2 ND GENERATION ONION ROUTER Roger Dingledine, Nick Mathewson and Paul Syverson Presenter: Alejandro Villanueva Agenda Threat model Cells and circuits Other features Related work How does it work? Rendezvous

More information

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes

More information

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a private browsing modes Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,

More information

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

Anonymity With Tor. The Onion Router. July 21, Technische Universität München The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 21, 2011 Overview What is Tor? Motivation Background Material How Tor Works Hidden Services Attacks Specific Attack

More information

Introduction to Traffic Analysis. George Danezis University of Cambridge, Computer Laboratory

Introduction to Traffic Analysis. George Danezis University of Cambridge, Computer Laboratory Introduction to Traffic Analysis George Danezis University of Cambridge, Computer Laboratory Outline Introduction to anonymous communications Macro-level Traffic Analysis Micro-level Traffic Analysis P2P

More information

ANET: An Anonymous Networking Protocol

ANET: An Anonymous Networking Protocol ANET: An Anonymous Networking Protocol Casey Marshall csm@soe.ucsc.edu May 31, 2005 Abstract This paper presents a simple, anonymizing network protocol. Its primary goal is to provide untraceability of

More information

CE Advanced Network Security Anonymity II

CE Advanced Network Security Anonymity II CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Host Website from Home Anonymously

Host Website from Home Anonymously Abstract Host Website from Home Anonymously Prerna Mahajan 1 and Kashish Gupta 2 1 Professor, Department of Computer Science, IITM Janakpuri, New Delhi, India 2 Research Scholar, Department of Computer

More information

Defining Anonymity in Networked Communication, version 1

Defining Anonymity in Networked Communication, version 1 Defining Anonymity in Networked Communication, version 1 Joan Feigenbaum 1 Technical Report YALEU/DCS/TR- 1448 December 2011 Support for anonymous communication in hostile environments is the main goal

More information

Simulation on Agent-based Onion Routing Network *

Simulation on Agent-based Onion Routing Network * National Research Council Canada Institute for Information Technology Conseil national de recherches Canada Institut de technologie de l'information Simulation on Agent-based Onion Routing Network * Song,

More information

CS Paul Krzyzanowski

CS Paul Krzyzanowski Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide

More information

Denial of Service, Traceback and Anonymity

Denial of Service, Traceback and Anonymity Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network

More information

Efficiency Optimisation Of Tor Using Diffie-Hellman Chain

Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Kun Peng Institute for Infocomm Research, Singapore dr.kun.peng@gmail.com Abstract Onion routing is the most common anonymous communication channel.

More information

Privacy defense on the Internet. Csaba Kiraly

Privacy defense on the Internet. Csaba Kiraly Advanced Networking Privacy defense on the Internet Csaba Kiraly 1 Topics Anonymity on the Internet Chaum Mix Mix network & Onion Routing Low-latency anonymous routing 2 Anonymity: Chaum mix David L. Chaum

More information

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party Definition Anonymous Communication Hiding identities of parties involved in communications from each other, or from third-parties Who you are from the communicating party Who you are talking to from everyone

More information

Anonymity on the Internet. Cunsheng Ding HKUST Hong Kong

Anonymity on the Internet. Cunsheng Ding HKUST Hong Kong Anonymity on the Internet Cunsheng Ding HKUST Hong Kong Part I: Introduc

More information

Rendezvous Tunnel for Anonymous Publishing

Rendezvous Tunnel for Anonymous Publishing 1 Rendezvous Tunnel for Anonymous Publishing by Ofer Hermoni, Niv Gilboa, Eyal Felstaine, Yuval Elovici and Shlomi Dolev Technical Report #10-05 September 2010 2 Rendezvous Tunnel for Anonymous Publishing

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Privacy in the Cloud: Bridging the Gap between Design and Implementation

Privacy in the Cloud: Bridging the Gap between Design and Implementation Privacy in the Cloud: Bridging the Gap between Design and Implementation Vassilis Manousakis 1, Christos Kalloniatis 1, Evangelia Kavakli 1, and Stefanos Gritzalis 2 1 Cultural Informatics Laboratory,

More information

Toward Improving Path Selection in Tor

Toward Improving Path Selection in Tor Toward Improving Path Selection in Tor Fallon Chen Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 203-00 Email: ftchen@cs.ucsd.edu Joseph Pasquale Department

More information

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science The Tor Network Cryptography 2, Part 2, Lecture 6 Ruben Niederhagen June 16th, 2014 Tor Network Introduction 2/33 Classic goals of cryptography: confidentiality, data integrity, authentication, and non-repudiation.

More information

Analysing Onion Routing Bachelor-Thesis

Analysing Onion Routing Bachelor-Thesis Analysing Onion Routing Bachelor-Thesis Steffen Michels June 22, 2009 Abstract Although methods for reaching security goals such as secrecy, integrity and authentication are widely used in the Internet,

More information

CS232. Lecture 21: Anonymous Communications

CS232. Lecture 21: Anonymous Communications CS232 Lecture 21: Anonymous Communications November 21, 2018 2 You Are Not Anonymous 3 Your IP address can be linked directly to you ISPs store communications records Usually for several years (Data Retention

More information

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum Paul Syverson (U.S. Naval Research Laboratory) (U.S. Naval

More information

Analysis of an Anonymity Network for Web Browsing

Analysis of an Anonymity Network for Web Browsing Analysis of an Anonymity Network for Web Browsing Marc Rennhard Λ, Sandro Rafaeli y,laurentmathy y, Bernhard Plattner Λ and David Hutchison y Λ Swiss Federal Institute of Technology, Computer Engineering

More information

CNT Computer and Network Security: Privacy/Anonymity

CNT Computer and Network Security: Privacy/Anonymity CNT 5410 - Computer and Network Security: Privacy/Anonymity Professor Kevin Butler Fall 2015 When Confidentiality is Insufficient 2 Privacy!= Confidentiality Confidentiality refers to the property of the

More information

Tor: An Anonymizing Overlay Network for TCP

Tor: An Anonymizing Overlay Network for TCP Tor: An Anonymizing Overlay Network for TCP Roger Dingledine The Free Haven Project http://tor.freehaven.net/ http://tor.eff.org/ December 28, 21C3 2004 Talk Outline Motivation: Why anonymous communication?

More information

An Optimal Strategy for Anonymous Communication Protocols

An Optimal Strategy for Anonymous Communication Protocols Appeared in: Proceedings of the 22th International Conference on Distributed Computing Systems, Vienna, Austria, July 2002. An Optimal Strategy for Anonymous Communication Protocols Yong Guan, Xinwen Fu,

More information

MIX Network for Location Privacy First Draft

MIX Network for Location Privacy First Draft 2G1319 Communication Systems Design Department of Microelectronics and Information Technology, KTH csd2002-ipv6privacy@2g1319.ssvl.kth.se MIX Network for Location Privacy First Draft O. Sirovatcenko April

More information

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. Distributed Systems 1 06-06798 Distributed Systems Lecture 14: Security Distributed Systems 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015 Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, autumn 2015 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

Anonymous Communications

Anonymous Communications Anonymous Communications Andrew Lewman andrew@torproject.org December 05, 2012 Andrew Lewman andrew@torproject.org () Anonymous Communications December 05, 2012 1 / 45 Who is this guy? 501(c)(3) non-profit

More information

Distributed Systems. Lecture 14: Security. 5 March,

Distributed Systems. Lecture 14: Security. 5 March, 06-06798 Distributed Systems Lecture 14: Security 5 March, 2002 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Achieving Privacy in Mesh Networks

Achieving Privacy in Mesh Networks Achieving Privacy in Mesh Networks Xiaoxin Wu Intel China Research Center Ltd Beijing, China xiaoxin.wu@intel.com Ninghui Li Department of Computer Science Purdue University West Lafayette, IN 47907-2086,

More information

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks Rungrat Wiangsripanawan, Willy Susilo and Rei Safavi-Naini Center for Information Security School of Information

More information

scribed below in section 5. 2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non

scribed below in section 5. 2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non Onion Routing Access Congurations Paul F. Syverson, Michael G. Reed, and David M. Goldschlag Naval Research Laboratory Abstract Onion Routing is an infrastructure for private communication over a public

More information

Timestamps and authentication protocols

Timestamps and authentication protocols Timestamps and authentication protocols Chris J. Mitchell Technical Report RHUL MA 2005 3 25 February 2005 Royal Holloway University of London Department of Mathematics Royal Holloway, University of London

More information

A Privacy-Aware Service Protocol for Ubiquitous Computing Environments

A Privacy-Aware Service Protocol for Ubiquitous Computing Environments A Privacy-Aware Service Protocol for Ubiquitous Computing Environments Gunhee Lee, Song-hwa Chae, Inwhan Hwang, and Manpyo Hong Graduate School of Information Communication, Ajou University, Suwon, Korea

More information

Anonymity. Christian Grothoff.

Anonymity. Christian Grothoff. Anonymity christian@grothoff.org http://grothoff.org/christian/ You look at this and you say this is insane. It s insane. And if it is only Hollywood that has to deal with this, OK, that s fine. Let them

More information

VAST: Versatile Anonymous System for Web Users

VAST: Versatile Anonymous System for Web Users VAST: Versatile Anonymous System for Web Users IGOR MARGASISKI, KRZYSZTOF SZCZYPIORSKI Warsaw University of Technology, Institute of Telecommunications ul. Nowowiejska 15/19, 00-665 Warsaw, Poland e-mail:

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

anonymous routing and mix nets (Tor) Yongdae Kim

anonymous routing and mix nets (Tor) Yongdae Kim anonymous routing and mix nets (Tor) Yongdae Kim Significant fraction of these slides are borrowed from CS155 at Stanford 1 q Why? Anonymous web browsing 1. Discuss health issues or financial matters anonymously

More information

An Experimental Study and Analysis of Crowds based Anonymity

An Experimental Study and Analysis of Crowds based Anonymity An Experimental Study and Analysis of Crowds based Anonymity Lokesh Kumar Bhoobalan Digital Worlds Institute University of Florida Gainesville, Florida 326 5800 Email: lokesh@digitalworlds.ufl.edu Piyush

More information

An Experimental Study and Analysis of Crowds based Anonymity

An Experimental Study and Analysis of Crowds based Anonymity An Experimental Study and Analysis of Crowds based Anonymity Lokesh Bhoobalan, Piyush Harsh To cite this version: Lokesh Bhoobalan, Piyush Harsh. An Experimental Study and Analysis of Crowds based Anonymity.

More information

Comprehensive Study of Traffic Analysis In MANET

Comprehensive Study of Traffic Analysis In MANET Comprehensive Study of Traffic Analysis In MANET T. Parameswaran 1, Dr. C. Palanisamy 2, M.Karthigadevi 3 T. Parameswaran is with Assistant Professor, Department of Computer Science and Engineering, Anna

More information

Anonymity. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel

Anonymity. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel Anonymity Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 1 Anonymity 2 The Internet can t be censored The Net treats censorship as damage and routes around it. - John Gillmore

More information

Trust-Based Privacy Preservation for Peer-to-peer Data Sharing

Trust-Based Privacy Preservation for Peer-to-peer Data Sharing Trust-Based Privacy Preservation for Peer-to-peer Data Sharing Yi Lu yilu@cs.purdue.edu Weichao Wang wangwc@cs.purdue.edu Dongyan Xu dxu@cs.purdue.edu Department of Computer Sciences Purdue University,

More information

A framework for anonymizing GSM calls over a smartphone VoIP network

A framework for anonymizing GSM calls over a smartphone VoIP network A framework for anonymizing GSM calls over a smartphone VoIP network 529 A framework for anonymizing GSM calls over a smartphone VoIP network Ioannis Psaroudakis, Vasilios Katos, and Pavlos S. Efraimidis

More information

IP address. When you connect to another computer you send it your IP address.

IP address. When you connect to another computer you send it your IP address. Anonymity IP address When you connect to another computer you send it your IP address. It is very hard to communicate without revealing an address on which you can receive traffic. Recent court cases have

More information

Copy-Resistant Credentials with Minimum Information Disclosure

Copy-Resistant Credentials with Minimum Information Disclosure Copy-Resistant Credentials with Minimum Information Disclosure David Bauer and Douglas Blough Georgia Institute of Technology Public-key based certificates provide a standard way to prove one's identity,

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Anonymous communication with on-line and off-line onion encoding

Anonymous communication with on-line and off-line onion encoding Anonymous communication with on-line and off-line onion encoding Marek Klonowski, Mirosław Kutyłowski, and Filip Zagórski Institute of Mathematics, Wrocław University of Technology, Marek.Klonowski@im.pwr.wroc.pl

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

Anonymity and Privacy

Anonymity and Privacy Computer Security Spring 2008 Anonymity and Privacy Aggelos Kiayias University of Connecticut Anonymity in networks Anonymous Credentials Anonymous Payments Anonymous E-mail and Routing E-voting Group,

More information

Practical Anonymity for the Masses with Mix-Networks

Practical Anonymity for the Masses with Mix-Networks Practical Anonymity for the Masses with Mix-Networks Marc Rennhard and Bernhard Plattner Swiss Federal Institute of Technology, Computer Engineering and Networks Laboratory, Zurich, Switzerland {rennhard

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Strongly Anonymous Communications in Mobile Ad Hoc Networks Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer

More information

Anonymous Credentials through Acid Mixing

Anonymous Credentials through Acid Mixing Anonymous Credentials through Acid Mixing Alessandro Acquisti Carnegie Mellon University June 2003 Abstract Reliability and trust are open issues in the MIX-net literature. We present a variation on the

More information

The New Cell-Counting-Based Against Anonymous Proxy

The New Cell-Counting-Based Against Anonymous Proxy The New Cell-Counting-Based Against Anonymous Proxy Yadarthugalla Raju M.Tech Student, Department of CSE, Dr.K.V.S.R.I.T, Kurnool. K. Pavan Kumar Assistant Professor, Department of IT, Dr.K.V.S.R.I.T,

More information

Metrics for Security and Performance in Low-Latency Anonymity Systems

Metrics for Security and Performance in Low-Latency Anonymity Systems Metrics for Security and Performance in Low-Latency Anonymity Systems Tor user Entry node Tor Network Middle node Exit node Bandwidth per node (kb/s) (log scale) 1e+01 1e+03 1e+05 Encrypted tunnel Web

More information

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München Anonymity With Tor The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 5, 2012 It s a series of tubes. Ted Stevens Overview What is Tor? Motivation Background Material

More information

A Quantitative Analysis of Anonymous Communications

A Quantitative Analysis of Anonymous Communications IEEE TRANSACTIONS ON RELIABILITY, VOL. 53, NO. 1, MARCH 2004 103 A Quantitative Analysis of Anonymous Communications Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao Abstract This paper quantitatively

More information

Persona: Network Layer Anonymity and Accountability for Next Generation Internet

Persona: Network Layer Anonymity and Accountability for Next Generation Internet Persona: Network Layer Anonymity and Accountability for Next Generation Internet Yannis Mallios 1, Sudeep Modi 1, Aditya Agarwala 2, and Christina Johns 2 1 Carnegie Mellon University, Information Networking

More information