Measuring Anonymity: The Disclosure Attack

ثبت نشده
چکیده

ing Mixes Because an adversary can easily determine anonymity sets at the network level, Mixes assume that all network links are observable. Thus, by observing messages to and from an anonymity service, an attacker can determine anonymity sets. Rather than discuss the technical details of any anonymity technique here, we abstract them using the following properties2: • In each anonymous communication, a subset A′ of all senders A sends a message to a subset B′ of all recipients B—that is, A′ ⊂ A and B′ ⊂ B, as Figure 1 illustrates. In a particular system, the set of all senders A can be the same as the set of all recipients B. • The size of the sender anonymity set is |A′| = b, where 1≤ b << |A|. • The size of the recipient anonymity set is |B′| = n, where 1 ≤ n << |B| and n ≤ b—that is, several senders can communicate with the same recipient. The typical values for |A|, |B|, |A′|, and |B′| vary from implementation to implementation and with the environment in which they operate. Stefan Köpsell, Hannes Federrath, and Marit Hansen present an implementation they call Web-Mixes, in which (|A|) is around 20,000.5 They don’t give typical values for |A′| for Web-Mixes, but we generally expect |A′| < 100. Attack model We model attacks by considering a bipartite graph G = (A ∪ B, E) with partite sets A and B. The set of edges E describes the hidden relationships between senders and recipients—that is, a sender a and a recipient b are connected by an edge if b is a recipient of the messages sent by a. An intruder or adversary must reconstruct the portion of the bipartite graph connected directly to a targeted sender by discovering its edges, as Figure 2 shows. We assume the attacker in our model notices each anonymous communication act. Each act gives the adversary a randomly selected A′ and B′ (that is, A′ ⊂ A and http://computer.org/security/ ■ IEEE SECURITY & PRIVACY 3 AMix is an intermediary relay station that hides a message’s appearance, including its bit pattern and length. It also hides the temporal relationships (or order) among incoming and outgoing messages. An ideal Mix implementation prevents even an omnipresent attacker (an attacker that observes all incoming and outgoing lines) from linking an incoming message to an outgoing one. For example, say Alice generates a message MessageBob to Bob with constant length (add padding bits or split). A sender protocol recursively encrypts the message with public keys cBob and cMix: [[Bob, MessageBob]] := cMix(RN, Bob, cBob(MessageBob)). This act is similar to enclosing a letter in successive envelopes starting with the recipient. Padding a one-time random number RN within the encryption will avoid replay attacks. A Mix hides the message’s appearance by decrypting it with a private key dMix and strips off the unique random numbers: cMix(RN, Bob, cBob(MessageBob)) → Bob, cBob(MessageBob). Using the letter analogy, Mix removes the outermost envelope and finds the inner envelope with the recipient’s address. Next, the Mix forwards the inner envelope to the intended recipient after reordering the incoming messages. To hide a message’s order, the Mix collects three messages from distinct users, [[Bob, MessageBob]], [[Dave, MessageDave]], [[Cleo, MessageCleo]], and forwards them (after decryption) randomly. An attacker observing all incoming and outgoing lines from the Mix can only deduce that Alice has communicated with one of the individuals {Bob, Dave, Cleo}. Mix in Action

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Probabilistic Treatment of MIXes to Hamper Traffic Analysis

The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated with whom, for how long, and from which location, by hiding traffic information. This is accomplished by organizing additional traffic to conceal particular communication relationships and by embedding the sender and receiver of a message in their respective anonymity sets. If the number of over...

متن کامل

STATISTICAL DISCLOSURE ATTACKS Traffic Confirmation in Open Environments

An improvement over the previously known disclosure attack is presented that allows, using statistical methods, to effectively deanonymize users of a mix system. Furthermore the statistical disclosure attack is computationally efficient, and the conditions for it to be possible and accurate are much better understood. The new attack can be generalized easily to a variety of anonymity systems be...

متن کامل

An Enhanced K-Anonymity Model against Homogeneity Attack

k-anonymity is an important model in the field of privacy protection and it is an effective method to prevent privacy disclosure in micro-data release. However, it is ineffective for the attribute disclosure by the homogeneity attack. The existing models based on k-anonymity have solved this problem to a certain extent, but they did not distinguish the different values of the sensitive attribut...

متن کامل

Statistical Disclosure: Improved, Extended, and Resisted

Traffic analysis is a type of attack on secure communications systems, in which the adversary extracts useful patterns and information from the observed traffic. This paper improves and extends an efficient traffic analysis attack, called “statistical disclosure attack.” Moreover, we propose a solution to defend against the improved (and, a fortiori, the original) statistical disclosure attack....

متن کامل

A Review of Privacy Preservation Technique

Privacy-preserving is one of the most important challenges in a computer world, because of the huge amount of sensitive information on the internet. The paper contains several privacy preservation techniques for data publishing in the real world. There are several privacy attacks are associate but among of them mainly two attacks are record linkage and attribute linkage. Many scientists have pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003