STor: Social Network based Anonymous Communication in Tor
نویسندگان
چکیده
Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymitynetworks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus makingthem susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network basedtrust model to help anonymity networks circumvent malicious routers and obtain secure anonymity. In particular, we design an inputindependent fuzzy model to determine trust relationships between friends based on qualitative and quantitative social attributes, both ofwhich can be readily obtained from existing social networks. Moreover, we design an algorithm for propagating trust over an anonymitynetwork. We integrate these two elements in STor, a novel social network based Tor. We have implemented STor by modifying the Tor’ssource code and conducted experiments on PlanetLab to evaluate the effectiveness of STor. Both simulation and PlanetLab experimentresults have demonstrated that STor can achieve secure anonymity by establishing trust-based circuits in a distributed way. Althoughthe design of STor is based on Tor network, the social network based trust model can be adopted by other anonymity networks.
منابع مشابه
A STor: Social Network based Anonymous Communication in Tor
Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust ...
متن کاملNetwork and Security Analysis of Anonymous Communication Networks
Anonymous communication networks are popular for providing a means of covert communication and secure exchange of data. Analysis of such networks is challenging due to the high degree of anonymity and unconventional ways to access these networks. In this paper, we use network analysis as a tool to analyze the structure of these networks and assess the privacy and security provided by these netw...
متن کاملUsing Traffic Analysis to Identify Tor Usage - A Proposed Study
Traditional attacks against anonymous routing systems aim to uncover the identities of those involved, however, a more likely goal of attackers is to block or degrade the network itself, discouraging participation and forcing vulnerable users to communicate using less secure means. Since these anonymous networks operate on known protocols and employ strong encryption it is difficult to distingu...
متن کاملA Survey on Tor and I2P
This paper gives a short introduction and a comparison on two low-latency anonymous communication networks. The main part features a review of the low latency anonymous communication networks, namely, The Onion Routing (Tor) and the Invisible Internet Project (I2P). An introduction to their overall structure is given, followed by a detailed description of the core parts of both networks. Furthe...
متن کاملTor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design. Tor adds perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for rendezvous points. Tor works on the real-world Internet, requires no special privi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1110.5794 شماره
صفحات -
تاریخ انتشار 2011