Performance analysis of a Tor-like onion routing implementation

نویسندگان

  • Quinten Stokkink
  • Harmjan Treep
  • Johan A. Pouwelse
چکیده

Any sense of privacy on The Internet is an illusion. Even Tor, which could be considered the most privacy preserving networking framework in existence, has its flaws [3]. Furthermore, privacy-enhancing technology is difficult to use for normal users and it slows down The Internet. For instance, should one first setup a VPN and then Tor or Tor and then VPN? Getting it wrong might actually negatively impact a user’s privacy1. With yearly sales of smartphones and smart watches approaching one billion, threats to user privacy are becoming a global phenomenon. People can be traced to a location within (in the worst case) 20 meters in realtime23 and recognized [1]. With these billions of people facing threats ranging from targeted advertisement to burglary or even harassment, the need for scalable and light-weight privacy-enhancing technology becomes apparent. However, no optimized implementation of a scalable architecture exists in this emerging research field. We provide a key step forward by identyfing bottlenecks in Tribler.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Onion Routing and Online Anonymity

In this paper we present a technical description of onion routing, an anonymizing protocol that protects users against traffic analysis. Onion routing combines the concepts of proxy redirection and layered mixed-key cryptography to hide the routing of requests from every participant in the network except the originator of the request. We also analyze the performance and potential legal threats ...

متن کامل

Using Sphinx to Improve Onion Routing Circuit Construction (short paper)⋆

This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed DiffieHellman values, pairing-based onion routing, and certificateless o...

متن کامل

Using Sphinx to Improve Onion Routing Circuit Construction

This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed Diffie-Hellman values, pairing-based onion routing, and certificateless ...

متن کامل

Onion routing circuit construction via latency graphs

The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for The onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through a series of anonymising proxy circuits. The construction of these circuits ...

متن کامل

Analysing Onion Routing Bachelor-Thesis

Although methods for reaching security goals such as secrecy, integrity and authentication are widely used in the Internet, there is no widely-used solution providing anonimity. Among all existing approaches to provide anonimity onion routing is a very promising one. In this paper the security goals concerning anonymity are given and it is shown that onion routing can in principle provide solut...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1507.00245  شماره 

صفحات  -

تاریخ انتشار 2015