Improving Privacy and Performance in Anonymous Communications PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Improving Privacy and Performance in Anonymous Communications PDF full book. Access full book title Improving Privacy and Performance in Anonymous Communications by Nayantara Mallesh. Download full books in PDF and EPUB format.

Improving Privacy and Performance in Anonymous Communications

Improving Privacy and Performance in Anonymous Communications PDF Author: Nayantara Mallesh
Publisher:
ISBN:
Category : Computer science
Languages : en
Pages :

Book Description
Anonymous communications systems provide an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, an attacker can use long-term statistical analysis of traffic sent to and from such a system to link senders with their receivers. While it is important to protect anonymous systems against such attacks, it is also important to ensure they provide good performance. In this thesis, we aim to make contributions to both these areas. In the statistical disclosure attack (SDA), an eavesdropper isolates his attack against a single user, whom we call Alice, with the aim of exposing her set of contacts. To study the SDA we introduce an analytical method to bound the time for the eavesdropper to identify a contact of Alice, with high probability. We analyze the attack in different scenarios beginning with a basic scenario in which Alice has a single contact. Defenses against this attack include sending cover traffic, which consists of sending dummy messages along with real messages. We extend our analysis to study the effect of two different types of cover traffic on the time for the attack to succeed. We further extend our analysis to investigate the effectiveness of the attack for a partial eavesdropper who can observe only a part of the network. We validate our analysis through simulations and show that the simulation results closely follow the results of analysis. Although our bounds are loose, they provide a way to compare between different amounts and types of cover traffic in various scenarios. In the second part of this thesis, we investigate how cover traffic can be used as an effective counter strategy against the SDA. We propose that the mix generate cover traffic that mimics the sending patterns of users in the system. This receiver-bound cover (RBC) helps to make up for users that arent there, confusing the eavesdropper. We show through simulation how this makes it difficult for the eavesdropper to discern cover from real traffic and perform attacks based on statistical analysis. Our results show that receiver-bound cover substantially increases the time required for this attack to succeed. When our approach is used in combination with usergenerated cover traffic, the attack takes a very long time to succeed. The original statistical disclosure attack has focused on finding the receivers to whom Alice sends. In this part of the thesis, we investigate the effectiveness of statistical disclosure in finding all of Alices contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observations of all users sending patterns to estimate both the targeted users sending pattern and her receiving pattern. The estimated patterns are combined to find a set of the targeted users most likely contacts. We study the performance of RSDA in simulation using di erent mix network configurations and also study the effectiveness of cover traffic as a countermeasure. Our results show that that RSDA outperforms the traditional SDA in finding the users contacts, particularly as the amounts of user traffic and cover traffic rise. In the final part of this thesis, we study how a sparse network topology affects the security of anonymous systems. We show that an expander topology such as a sparse, D-regular graph exhibits security properties comparable to a fully connected graph; in a reasonable number of hops and even for small values of degree D. Further, we show that if the expander graph is constructed with a bias towards lower roundtrip time links, there is a considerable gain in performance without compromise in security.

Improving Privacy and Performance in Anonymous Communications

Improving Privacy and Performance in Anonymous Communications PDF Author: Nayantara Mallesh
Publisher:
ISBN:
Category : Computer science
Languages : en
Pages :

Book Description
Anonymous communications systems provide an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, an attacker can use long-term statistical analysis of traffic sent to and from such a system to link senders with their receivers. While it is important to protect anonymous systems against such attacks, it is also important to ensure they provide good performance. In this thesis, we aim to make contributions to both these areas. In the statistical disclosure attack (SDA), an eavesdropper isolates his attack against a single user, whom we call Alice, with the aim of exposing her set of contacts. To study the SDA we introduce an analytical method to bound the time for the eavesdropper to identify a contact of Alice, with high probability. We analyze the attack in different scenarios beginning with a basic scenario in which Alice has a single contact. Defenses against this attack include sending cover traffic, which consists of sending dummy messages along with real messages. We extend our analysis to study the effect of two different types of cover traffic on the time for the attack to succeed. We further extend our analysis to investigate the effectiveness of the attack for a partial eavesdropper who can observe only a part of the network. We validate our analysis through simulations and show that the simulation results closely follow the results of analysis. Although our bounds are loose, they provide a way to compare between different amounts and types of cover traffic in various scenarios. In the second part of this thesis, we investigate how cover traffic can be used as an effective counter strategy against the SDA. We propose that the mix generate cover traffic that mimics the sending patterns of users in the system. This receiver-bound cover (RBC) helps to make up for users that arent there, confusing the eavesdropper. We show through simulation how this makes it difficult for the eavesdropper to discern cover from real traffic and perform attacks based on statistical analysis. Our results show that receiver-bound cover substantially increases the time required for this attack to succeed. When our approach is used in combination with usergenerated cover traffic, the attack takes a very long time to succeed. The original statistical disclosure attack has focused on finding the receivers to whom Alice sends. In this part of the thesis, we investigate the effectiveness of statistical disclosure in finding all of Alices contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observations of all users sending patterns to estimate both the targeted users sending pattern and her receiving pattern. The estimated patterns are combined to find a set of the targeted users most likely contacts. We study the performance of RSDA in simulation using di erent mix network configurations and also study the effectiveness of cover traffic as a countermeasure. Our results show that that RSDA outperforms the traditional SDA in finding the users contacts, particularly as the amounts of user traffic and cover traffic rise. In the final part of this thesis, we study how a sparse network topology affects the security of anonymous systems. We show that an expander topology such as a sparse, D-regular graph exhibits security properties comparable to a fully connected graph; in a reasonable number of hops and even for small values of degree D. Further, we show that if the expander graph is constructed with a bias towards lower roundtrip time links, there is a considerable gain in performance without compromise in security.

Privacy Preserving Performance Enhancements for Anonymous Communication Networks

Privacy Preserving Performance Enhancements for Anonymous Communication Networks PDF Author: Robert G. Jansen
Publisher:
ISBN:
Category :
Languages : en
Pages : 199

Book Description


Security, Privacy, and Anonymity in Computation, Communication, and Storage

Security, Privacy, and Anonymity in Computation, Communication, and Storage PDF Author: Guojun Wang
Publisher: Springer
ISBN: 3030249077
Category : Computers
Languages : en
Pages : 506

Book Description
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Security, Privacy, and Anonymity in Computation, Communication, and Storage

Security, Privacy, and Anonymity in Computation, Communication, and Storage PDF Author: Guojun Wang
Publisher: Springer
ISBN: 3030053458
Category : Computers
Languages : en
Pages : 534

Book Description
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 45 revised full papers were carefully reviewed and selected from 120 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Privacy and anonymity in the digital era

Privacy and anonymity in the digital era PDF Author:
Publisher: Emerald Group Publishing
ISBN: 1845449649
Category : Internet
Languages : en
Pages : 112

Book Description
This e-book discusses the issues surrounding informational privacy - assuming that privacy is the indefeasible right of an individual to control the ways in which personal information is obtained, processed, distributed, shared and used by any other entity. The review of current research work in the area of user privacy has indicated that the path for user privacy protection is through the four basic privacy requirements namely anonymity, pseudonymity, unlinkability and unobservability. By addressing these four basic requirements one aims to minimize the collection of user identifiable data.

Security, Privacy, and Anonymity in Computation, Communication, and Storage

Security, Privacy, and Anonymity in Computation, Communication, and Storage PDF Author: Guojun Wang
Publisher: Springer
ISBN: 3319723898
Category : Computers
Languages : en
Pages : 629

Book Description
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Improving Performance and Security in Anonymity Systems

Improving Performance and Security in Anonymity Systems PDF Author: Mohsen Imani
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 131

Book Description
Tor is an anonymity network that provides online privacy for the Internet users. Tor hides the user's traffic among the others' traffic. The more users Tor attracts, the stronger anonymity it provides. Unfortunately, users of the Tor anonymity system suffer from less than-ideal performance, in part because circuit building and selection processes are not tuned for speed. Moreover, there are some attacks like guard fingerprinting and website fingerprinting attacks that try to profile or de-anonymize the Tor users. In this dissertation, we propose methods to address both security and performance issues in Tor. We first examine the process of selecting among pre-built circuits and the process of selecting the path of relays for use in building new circuits to improve performance while maintaining anonymity. We also propose a method to improve the mechanism of picking guards in Tor.The guard selection mechanism in Tor suffers from security problems like guard fingerprinting and from performance issues. To address this problem, we propose a new method for forming guard sets based on Internet location. We construct a hierarchy that keeps clients and guards together more reliably and prevents guards from easily joining arbitrary guard sets. This approach also has the advantage of confining an attacker with access to limited locations on the Internet to a small number of guard sets. Tor is also known to be vulnerable to the traffic analysis attacks like Website Fingerprinting (WF) attacks. In WF attacks, the adversary attempts to identify the websites visited by the user. We also propose a method using adversarial examples to decrease the accuracy rate of the WF attack. We generate adversarial traces to cause misclassification in the WF attackers. We show that if the WF attacker trains its classifier on the adversarial traces, they are not effective WF defenses. We propose a method to solve this problem, and we show that our method can drop the WF attacker's accuracy from 98% to 60% with 47% bandwidth overhead.

Financial Cryptography and Data Security

Financial Cryptography and Data Security PDF Author: Ahmad-Reza Sadeghi
Publisher: Springer
ISBN: 3642398847
Category : Computers
Languages : en
Pages : 419

Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

Data and Applications Security and Privacy XXXIII

Data and Applications Security and Privacy XXXIII PDF Author: Simon N. Foley
Publisher: Springer
ISBN: 3030224791
Category : Computers
Languages : en
Pages : 420

Book Description
This book constitutes the refereed proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2019, held in Charleston, SC, USA, in July 2018. The 21 full papers presented were carefully reviewed and selected from 52 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on attacks, mobile and Web security, privacy, security protocol practices, distributed systems, source code security, and malware.

Privacy Enhancing Technologies

Privacy Enhancing Technologies PDF Author: Nikita Borisov
Publisher: Springer
ISBN: 3540755519
Category : Computers
Languages : en
Pages : 281

Book Description
This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The papers cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.