An overview of anonymity technology usage
نویسندگان
چکیده
Anonymity technologies enable Internet users to maintain a level of privacy that prevents the collection of identifying information such as the IP address. Understanding the deployment of anonymity technologies on the Internet is important to analyze the current and future trends. In this paper, we provide a tutorial survey and a measurement study to understand the anonymity technology usage on the Internet from multiple perspectives and platforms. First, we review currently utilized anonymity technologies and assess their usage levels. For this, we cover deployed contemporary anonymity technologies including proxy servers, remailers, JAP, I2P, and Tor with the geo-location of deployed servers. Among these systems, proxy servers, Tor and I2P are actively used, while remailers and JAP have minimal usage. Then, we analyze application-level protocol usage and anonymity technology usage with different applications. For this, we preform a measurement study by collecting data from a Tor exit node, a P2P client, a large campus network, a departmental email server, and publicly available data on spam sources to assess the utilization of anonymizer technologies from various perspectives. Our results confirm previous findings regarding application usage and server geo-location distribution where certain countries utilize anonymity networks significantly more than others. Moreover, our application analysis reveals that Tor and proxy servers are used more than other anonymity techniques.
منابع مشابه
Supported Liquid Membrane in Metal Ion Separation: An Overview
Using liquid membrane and, in particular, supported liquid membrane (SLM) is a novel method of separation in comparison to other methods such as adsorption, extraction and ion exchange. SLM is a combination of simultaneous extraction and disposal whose high efciency and capability is proven by many studies. So far, many researchers have utilized SLM in various scientifc...
متن کاملAn Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملUsing Encryption and Trusted Third Parties to Enable Data Anonymity in the Flocks Architecture: a Privacy Enhancing Technology
In recent years, the right of the privacy of the employee and the right of a company to monitor Web traffic through its own network has been heatedly debated. Flocks is a Privacy Enhancing Technology (PET) used within an organization to balance both the need for Web usage anonymity by employees and the need for administrators to trace misusers of the World Wide Web. Flocks operate by establishi...
متن کاملEditorial : Sustainable Development of Cognitive Science and Technology Ecosystem an Overview to the “Human Brain Project” as a Functioning Sample
متن کامل
A PDA Implementation of an Off-line e-Cash Protocol
We present an efficient implementation of a fair e-cash protocol especially designed for mobile wireless environments. Our protocol attempts to offer a reasonable balance between the anonymity feature on one side, and the possibility of revoking that anonymity in case that there exist reasonable doubts about the behavior of a given user. Our system considers two protocols especially designed fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Communications
دوره 36 شماره
صفحات -
تاریخ انتشار 2013