Improving Privacy and Performance in Anonymous Communications PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Improving Privacy and Performance in Anonymous Communications PDF full book. Access full book title Improving Privacy and Performance in Anonymous Communications by Nayantara Mallesh. Download full books in PDF and EPUB format.

Improving Privacy and Performance in Anonymous Communications

Improving Privacy and Performance in Anonymous Communications PDF Author: Nayantara Mallesh
Publisher:
ISBN:
Category : Computer science
Languages : en
Pages :

Book Description
Anonymous communications systems provide an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, an attacker can use long-term statistical analysis of traffic sent to and from such a system to link senders with their receivers. While it is important to protect anonymous systems against such attacks, it is also important to ensure they provide good performance. In this thesis, we aim to make contributions to both these areas. In the statistical disclosure attack (SDA), an eavesdropper isolates his attack against a single user, whom we call Alice, with the aim of exposing her set of contacts. To study the SDA we introduce an analytical method to bound the time for the eavesdropper to identify a contact of Alice, with high probability. We analyze the attack in different scenarios beginning with a basic scenario in which Alice has a single contact. Defenses against this attack include sending cover traffic, which consists of sending dummy messages along with real messages. We extend our analysis to study the effect of two different types of cover traffic on the time for the attack to succeed. We further extend our analysis to investigate the effectiveness of the attack for a partial eavesdropper who can observe only a part of the network. We validate our analysis through simulations and show that the simulation results closely follow the results of analysis. Although our bounds are loose, they provide a way to compare between different amounts and types of cover traffic in various scenarios. In the second part of this thesis, we investigate how cover traffic can be used as an effective counter strategy against the SDA. We propose that the mix generate cover traffic that mimics the sending patterns of users in the system. This receiver-bound cover (RBC) helps to make up for users that arent there, confusing the eavesdropper. We show through simulation how this makes it difficult for the eavesdropper to discern cover from real traffic and perform attacks based on statistical analysis. Our results show that receiver-bound cover substantially increases the time required for this attack to succeed. When our approach is used in combination with usergenerated cover traffic, the attack takes a very long time to succeed. The original statistical disclosure attack has focused on finding the receivers to whom Alice sends. In this part of the thesis, we investigate the effectiveness of statistical disclosure in finding all of Alices contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observations of all users sending patterns to estimate both the targeted users sending pattern and her receiving pattern. The estimated patterns are combined to find a set of the targeted users most likely contacts. We study the performance of RSDA in simulation using di erent mix network configurations and also study the effectiveness of cover traffic as a countermeasure. Our results show that that RSDA outperforms the traditional SDA in finding the users contacts, particularly as the amounts of user traffic and cover traffic rise. In the final part of this thesis, we study how a sparse network topology affects the security of anonymous systems. We show that an expander topology such as a sparse, D-regular graph exhibits security properties comparable to a fully connected graph; in a reasonable number of hops and even for small values of degree D. Further, we show that if the expander graph is constructed with a bias towards lower roundtrip time links, there is a considerable gain in performance without compromise in security.

Improving Privacy and Performance in Anonymous Communications

Improving Privacy and Performance in Anonymous Communications PDF Author: Nayantara Mallesh
Publisher:
ISBN:
Category : Computer science
Languages : en
Pages :

Book Description
Anonymous communications systems provide an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, an attacker can use long-term statistical analysis of traffic sent to and from such a system to link senders with their receivers. While it is important to protect anonymous systems against such attacks, it is also important to ensure they provide good performance. In this thesis, we aim to make contributions to both these areas. In the statistical disclosure attack (SDA), an eavesdropper isolates his attack against a single user, whom we call Alice, with the aim of exposing her set of contacts. To study the SDA we introduce an analytical method to bound the time for the eavesdropper to identify a contact of Alice, with high probability. We analyze the attack in different scenarios beginning with a basic scenario in which Alice has a single contact. Defenses against this attack include sending cover traffic, which consists of sending dummy messages along with real messages. We extend our analysis to study the effect of two different types of cover traffic on the time for the attack to succeed. We further extend our analysis to investigate the effectiveness of the attack for a partial eavesdropper who can observe only a part of the network. We validate our analysis through simulations and show that the simulation results closely follow the results of analysis. Although our bounds are loose, they provide a way to compare between different amounts and types of cover traffic in various scenarios. In the second part of this thesis, we investigate how cover traffic can be used as an effective counter strategy against the SDA. We propose that the mix generate cover traffic that mimics the sending patterns of users in the system. This receiver-bound cover (RBC) helps to make up for users that arent there, confusing the eavesdropper. We show through simulation how this makes it difficult for the eavesdropper to discern cover from real traffic and perform attacks based on statistical analysis. Our results show that receiver-bound cover substantially increases the time required for this attack to succeed. When our approach is used in combination with usergenerated cover traffic, the attack takes a very long time to succeed. The original statistical disclosure attack has focused on finding the receivers to whom Alice sends. In this part of the thesis, we investigate the effectiveness of statistical disclosure in finding all of Alices contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observations of all users sending patterns to estimate both the targeted users sending pattern and her receiving pattern. The estimated patterns are combined to find a set of the targeted users most likely contacts. We study the performance of RSDA in simulation using di erent mix network configurations and also study the effectiveness of cover traffic as a countermeasure. Our results show that that RSDA outperforms the traditional SDA in finding the users contacts, particularly as the amounts of user traffic and cover traffic rise. In the final part of this thesis, we study how a sparse network topology affects the security of anonymous systems. We show that an expander topology such as a sparse, D-regular graph exhibits security properties comparable to a fully connected graph; in a reasonable number of hops and even for small values of degree D. Further, we show that if the expander graph is constructed with a bias towards lower roundtrip time links, there is a considerable gain in performance without compromise in security.

Privacy Preserving Performance Enhancements for Anonymous Communication Networks

Privacy Preserving Performance Enhancements for Anonymous Communication Networks PDF Author: Robert G. Jansen
Publisher:
ISBN:
Category :
Languages : en
Pages : 199

Book Description


Improving Performance and Security in Anonymity Systems

Improving Performance and Security in Anonymity Systems PDF Author: Mohsen Imani
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 131

Book Description
Tor is an anonymity network that provides online privacy for the Internet users. Tor hides the user's traffic among the others' traffic. The more users Tor attracts, the stronger anonymity it provides. Unfortunately, users of the Tor anonymity system suffer from less than-ideal performance, in part because circuit building and selection processes are not tuned for speed. Moreover, there are some attacks like guard fingerprinting and website fingerprinting attacks that try to profile or de-anonymize the Tor users. In this dissertation, we propose methods to address both security and performance issues in Tor. We first examine the process of selecting among pre-built circuits and the process of selecting the path of relays for use in building new circuits to improve performance while maintaining anonymity. We also propose a method to improve the mechanism of picking guards in Tor.The guard selection mechanism in Tor suffers from security problems like guard fingerprinting and from performance issues. To address this problem, we propose a new method for forming guard sets based on Internet location. We construct a hierarchy that keeps clients and guards together more reliably and prevents guards from easily joining arbitrary guard sets. This approach also has the advantage of confining an attacker with access to limited locations on the Internet to a small number of guard sets. Tor is also known to be vulnerable to the traffic analysis attacks like Website Fingerprinting (WF) attacks. In WF attacks, the adversary attempts to identify the websites visited by the user. We also propose a method using adversarial examples to decrease the accuracy rate of the WF attack. We generate adversarial traces to cause misclassification in the WF attackers. We show that if the WF attacker trains its classifier on the adversarial traces, they are not effective WF defenses. We propose a method to solve this problem, and we show that our method can drop the WF attacker's accuracy from 98% to 60% with 47% bandwidth overhead.

Security, Privacy, and Anonymity in Computation, Communication, and Storage

Security, Privacy, and Anonymity in Computation, Communication, and Storage PDF Author: Guojun Wang
Publisher: Springer
ISBN: 3319723898
Category : Computers
Languages : en
Pages : 629

Book Description
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Financial Cryptography and Data Security

Financial Cryptography and Data Security PDF Author: Ahmad-Reza Sadeghi
Publisher: Springer
ISBN: 3642398847
Category : Computers
Languages : en
Pages : 419

Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

Data and Applications Security and Privacy XXXIII

Data and Applications Security and Privacy XXXIII PDF Author: Simon N. Foley
Publisher: Springer
ISBN: 3030224791
Category : Computers
Languages : en
Pages : 420

Book Description
This book constitutes the refereed proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2019, held in Charleston, SC, USA, in July 2018. The 21 full papers presented were carefully reviewed and selected from 52 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on attacks, mobile and Web security, privacy, security protocol practices, distributed systems, source code security, and malware.

Privacy Enhancing Technologies

Privacy Enhancing Technologies PDF Author: Nikita Borisov
Publisher: Springer
ISBN: 3540755519
Category : Computers
Languages : en
Pages : 281

Book Description
This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The papers cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

Handbook of Sharing Confidential Data

Handbook of Sharing Confidential Data PDF Author: Jörg Drechsler
Publisher: CRC Press
ISBN: 1040118747
Category : Business & Economics
Languages : en
Pages : 338

Book Description
Statistical agencies, research organizations, companies, and other data stewards that seek to share data with the public face a challenging dilemma. They need to protect the privacy and confidentiality of data subjects and their attributes while providing data products that are useful for their intended purposes. In an age when information on data subjects is available from a wide range of data sources, as are the computational resources to obtain that information, this challenge is increasingly difficult. The Handbook of Sharing Confidential Data helps data stewards understand how tools from the data confidentiality literature—specifically, synthetic data, formal privacy, and secure computation—can be used to manage trade-offs in disclosure risk and data usefulness. Key features: • Provides overviews of the potential and the limitations of synthetic data, differential privacy, and secure computation • Offers an accessible review of methods for implementing differential privacy, both from methodological and practical perspectives • Presents perspectives from both computer science and statistical science for addressing data confidentiality and privacy • Describes genuine applications of synthetic data, formal privacy, and secure computation to help practitioners implement these approaches The handbook is accessible to both researchers and practitioners who work with confidential data. It requires familiarity with basic concepts from probability and data analysis.

High Performance Computing and Applications

High Performance Computing and Applications PDF Author: Jiang Xie
Publisher: Springer
ISBN: 3319325574
Category : Computers
Languages : en
Pages : 238

Book Description
This book constitutes the thoroughly refereed proceedings of the Third International Conference on High Performance Computing and Applications, HPCA 2015, held in Shanghai, China, in July 2015. The 24 revised full papers presented were carefully reviewed and selected from 50 submissions. The papers cover the following research areas: numerical algorithms and solutions; high performance and grid computing; novel approached to high performance computing; massive data storage and processing; hardware acceleration; applications.

Security and Privacy in Communication Networks

Security and Privacy in Communication Networks PDF Author: Sushil Jajodia
Publisher: Springer Science & Business Media
ISBN: 364216160X
Category : Computers
Languages : en
Pages : 511

Book Description
This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions. They are organized in topical sections on malware and email security, anonymity and privacy, wireless security, systems security, network security, and security protocols.