[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SP.2012.37guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

LAP: Lightweight Anonymity and Privacy

Published: 20 May 2012 Publication History

Abstract

Popular anonymous communication systems often require sending packets through a sequence of relays on dilated paths for strong anonymity protection. As a result, increased end-to-end latency renders such systems inadequate for the majority of Internet users who seek an intermediate level of anonymity protection while using latency-sensitive applications, such as Web applications. This paper serves to bridge the gap between communication systems that provide strong anonymity protection but with intolerable latency and non-anonymous communication systems by considering a new design space for the setting. More specifically, we explore how to achieve near-optimal latency while achieving an intermediate level of anonymity with a weaker yet practical adversary model (i.e., protecting an end-host's identity and location from servers) such that users can choose between the level of anonymity and usability. We propose Lightweight Anonymity and Privacy (LAP), an efficient network-based solution featuring lightweight path establishment and stateless communication, by concealing an end-host's topological location to enhance anonymity against remote tracking. To show practicality, we demonstrate that LAP can work on top of the current Internet and proposed future Internet architectures.

Cited By

View all
  • (2024)OnionVPN: Onion Routing-Based VPN-Tunnels with Onion ServicesProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695043(17-33)Online publication date: 20-Nov-2024
  • (2022)Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and ChallengesACM Transactions on Internet Technology10.1145/352044022:4(1-30)Online publication date: 14-Nov-2022
  • (2021)How Lightning’s Routing Diminishes its AnonymityProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3465761(1-10)Online publication date: 17-Aug-2021
  • Show More Cited By
  1. LAP: Lightweight Anonymity and Privacy

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SP '12: Proceedings of the 2012 IEEE Symposium on Security and Privacy
    May 2012
    600 pages
    ISBN:9780769546810

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 20 May 2012

    Author Tags

    1. location privacy
    2. low-latency anonymous routing
    3. topological anonymity

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)OnionVPN: Onion Routing-Based VPN-Tunnels with Onion ServicesProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695043(17-33)Online publication date: 20-Nov-2024
    • (2022)Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and ChallengesACM Transactions on Internet Technology10.1145/352044022:4(1-30)Online publication date: 14-Nov-2022
    • (2021)How Lightning’s Routing Diminishes its AnonymityProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3465761(1-10)Online publication date: 17-Aug-2021
    • (2019)Bootstrapping privacy services in today's internetACM SIGCOMM Computer Communication Review10.1145/3310165.331016948:5(21-30)Online publication date: 28-Jan-2019
    • (2018)Progressive Scrambling for Social MediaInternational Journal of Digital Crime and Forensics10.4018/IJDCF.201804010410:2(56-73)Online publication date: 1-Apr-2018
    • (2018)Securing Named Data NetworksProceedings of the 23nd ACM on Symposium on Access Control Models and Technologies10.1145/3205977.3205996(51-59)Online publication date: 7-Jun-2018
    • (2018)A Survey on Routing in Anonymous Communication ProtocolsACM Computing Surveys10.1145/318265851:3(1-39)Online publication date: 12-Jun-2018
    • (2015)HerdACM SIGCOMM Computer Communication Review10.1145/2829988.278749145:4(639-652)Online publication date: 17-Aug-2015
    • (2015)HerdProceedings of the 2015 ACM Conference on Special Interest Group on Data Communication10.1145/2785956.2787491(639-652)Online publication date: 17-Aug-2015
    • (2014)Balancing accountability and privacy in the networkACM SIGCOMM Computer Communication Review10.1145/2740070.262630644:4(75-86)Online publication date: 17-Aug-2014
    • Show More Cited By

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media