[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths

Published: 01 November 2009 Publication History

Abstract

An alternative to guarantee anonymity in overlay networks may be achieved by building a multi-hop path between the initiator and the destination. Random walks (also known by means of the Crowds algorithm) have been widely used for this purpose in IP networks. Therefore, we explore the use of a Crowds-based mechanism to provide anonymity in overlay networks. However, the original algorithm does not limit the length of the paths, and in an overlay network the associated costs may grow excessively. Thus, controlling the length of the Crowds-based paths is a crucial issue in this scenario. A straightforward implementation makes use of a time-to-live (TTL) field. However, this implementation will immediately reveal whether the predecessor node is the initiator or not. This paper presents a novel mechanism to control the path length without using the TTL field. We propose an analytical model to evaluate the degree of anonymity when the path length is limited using our scheme. We conclude that limiting the multi-hop path length does not have any relevant impact over the degree of anonymity. We also prove that the new mechanism does not increase the vulnerability of Crowds over the traffic analysis and predecessor attacks.

References

[1]
mCrowds: anonymity for the mobile Internet. Karlstad University Studies. v2003. 26
[2]
Freedom systems 2.1 security issues and analysis. Zero Knowledge Systems, Inc.
[3]
Borisov N. Anonymous routing in structured peer-to-peer overlays. Ph.D. thesis, UC Berkeley; 2005.
[4]
Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM. v4 i2. 84-88.
[5]
Comaniciu D, Meer P, Xu K, Tyker D. Retrieval performance improvement through low rank corrections. In: Proceedings of the IEEE workshop on content-based access of image and video libraries; 1999.
[6]
Dai W. Pipenet 1.1. Usenet post; 1996.
[7]
Mixminion: design of a type III anonymous remailer protocol. Proceedings of the IEEE Symposium on Security and Privacy.
[8]
Towards measuring anonymity. In: Proceedings of the privacy enhancing technologies workshop. LNCS 2482, Springer-Verlag.
[9]
Dingledine R, Mathewson N, Syverson P. Tor: the second generation onion router. In: Proceedings of the 13th USENIX security symposium; 2004.
[10]
Privacy-enhancing technologies for the Internet. In: Proceedings of the 42nd IEEE spring COMPCON, IEEE Computer Society Press.
[11]
The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology. v15 i1. 52-60.
[12]
Hordes - a multicast based protocol for anonymity. Journal of Computer Security. v10 i3. 213-240.
[13]
Lu T, Fang B, Sun Y, Cheng X. Performance analysis of WonGoo system. In: Proceedings of the fifth international conference on computer and information technology (CIT'2005); 2005.
[14]
On the generalised distance in statistics. Proceedings of the National Institute of Sciences of India. v2 i1. 49-55.
[15]
Mislove A, Oberoi G, Post A, Resi C, Durschel P, Wallach DS. AP3: cooperative, decentralized anonymous communication. In: EW11: proceedings of the 11th workshop on ACM SIGOPS European workshop; 2004.
[16]
Mixmaster protocol version 2. Draft.
[17]
http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
[18]
Rahman MM, Bhattacharya P, Desai BC. Statistical similarity measures in image retrieval systems with categorization & block based partition. In: Proceedings of the IEEE international workshop on imaging systems and techniques; 2005.
[19]
Raymond J-F. Traffic analysis: protocols, attacks, design issues, and open problems. In: Proceedings of the international workshop on design issues in anonymity and unobservability; 2001.
[20]
Crowds: anonymity for web transactions. ACM Transactions on Information and System Security. v1 i1. 66-92.
[21]
Rowstron A, Druschel P. Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Proceedings of the IFIP/ACM international conference on distributed systems platforms (middleware), LNCS 2218, Heidelberg, Germany, November 12-16; 2001. p. 329-50.
[22]
Advances in peer-to-peer streaming systems. IEEE Journal on Selected Areas in Communications. v25 i9.
[23]
Towards an analysis of onion routing security. In: Federrath, H. (Ed.), Proceedings of the designing privacy enhancing technologies: workshop on design issues in anonymity and unobservability, Springer-Verlag.
[24]
Wang W, Wang. J. A scalable anonymous communication system based on two-layers management scheme. In: Proceedings of the international conference on communication technology (ICCT'06); 2006.
[25]
The predecessor attack: an analysis of a threat to anonymous communications systems. ACM Transactions on Information and System Security (TISSEC). v4 i7. 489-522.
[26]
Passive-logging attacks against anonymous communications systems. ACM Transactions on Information and System Security (TISSEC). v11 i2.
[27]
The official PGP user's guide. MIT Press.
  1. Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Computers and Security
    Computers and Security  Volume 28, Issue 8
    November, 2009
    137 pages

    Publisher

    Elsevier Advanced Technology Publications

    United Kingdom

    Publication History

    Published: 01 November 2009

    Author Tags

    1. Anonymity evaluation
    2. Anonymous communication
    3. Entrophy
    4. Multi-hop paths
    5. Overlay networks
    6. Traffic analysis attacks

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 21 Dec 2024

    Other Metrics

    Citations

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media