An Efficient Overlay Infrastructure for Privacy-preserving Communication on the Internet
نویسنده
چکیده
This paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-preserving communication. Nodes are arranged in concentric rings, which reduce average overlay hop latencies. Mist2 builds on the strengths of previous work on Mist, and significantly improves on the communication overhead, resilience to router failures, and the distributed nature of the algorithm. Mist2 provides sender, receiver, and sender-receiver anonymity for communicating end users. Compared to previous approaches, Mist2 significantly improves the communication efficiency in latency without sacrificing the level of anonymity. This paper proposes an enhancement to the original Mist, and improves this solution using rings resulting in Mist2. The simulation results clearly demonstrate the improved performance of anonymous communication in Mist2 compared to relevant systems, while maintaining anonymity. Since the proposed ring-based approach optimizes path latencies, it performs better than the other proposed solutions where the overlay hops can potentially traverse large distances.
منابع مشابه
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملSTONe: Secure Trusted Overlay Networks for Robust Privacy-Protecting Communication
This paper presents STONe, Secure Trusted Overlay Network, a novel robust network infrastructure that provides privacypreserving communication. STONe is the first network architecture based on attestation and strong process isolation in Trusted Computing. Using these features to protect the network stack against Byzantine failures, STONe is able to establish different protection techniques agai...
متن کاملMobile Social Services via Virtual Individual Servers
Mobile social services enable increasingly popular forms of social interaction among mobile-device users, such as finding out when people of interest are nearby. However, today’s services raise important privacy concerns because they concentrate location information for many users under a single administrative domain. We present a privacy-preserving framework for these services in which each pe...
متن کاملA secure and resilient communication infrastructure for decentralized networking applications
The contribution of this thesis is the study, design and implementation of a resilient and secure communication infrastructure for decentralized peer-to-peer networks. On today’s Internet, free and unrestricted communication between users is often restricted due to limited connectivity between participants, attempts to degrade service for certain traffic classes and other filtering and manipula...
متن کاملIntegrating Privacy-Enhancing Technologies into the Internet Infrastructure
The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet’s infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an improved overlay network-based protection and a concept for privacy protection in the emerging 5G mobile network. A crucial success factor will be the...
متن کامل