Local Anonymity: A Metric for Improving User Privacy in Tor

نویسندگان

  • Simina Brânzei
  • Tariq Elahi
  • Ian Goldberg
چکیده

In anonymous communication networking, entropy is a popular metric for measuring the average-case difficulty of linking two communicating parties. This paper proposes an alternate view of anonymity, rooted in the observation that global measures of anonymity do not necessarily provide accurate information about the anonymity of an individual user. Such differences can arise due to the characteristics of user needs and local network conditions. We introduce the notion of local anonymity to account for the anonymity of individual users and different sub-regions of the network. Based on this idea, we propose a relay selection algorithm in Tor, introduce a metric for computing the anonymity of individual relays, and discuss the choice of parameters, possible attacks, and defence strategies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

Measurement and management of the impact of mobility on low-latency anonymity networks

Privacy, including the right to privacy of correspondence, is a human right. Privacy-enhancing technologies, such as the Tor anonymity network, help maintain this right. The increasing use of Tor from mobile devices raises new challenges for the continued effectiveness of this low-latency anonymity network. Mobile Tor users may access the Internet from a range of wireless networks and service p...

متن کامل

Will this onion make you cry? A Usability Study of Tor-enabled Mobile Apps

In 2013, more than half a million users relied on Tor, the second generation Onion Routing system, daily to protect their privacy [1]. Users hide among other users in the Tor network to achieve anonymity, so the degree of anonymity grows as more users successfully participate in the network [3]. A user who makes mistakes while installing or using Tor software jeopardizes both her own privacy an...

متن کامل

An analysis of tools for online anonymity

The ability to remain anonymous while engaging in different activities online is increasingly sought after by consumers with privacy concerns. Currently the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure onli...

متن کامل

New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network

Proper use of an anonymity system requires adequate understanding of how it functions. Yet, there is surprisingly little research that looks into user understanding and usage of anonymity software. Improper use stemming from a lack of sufficient knowledge of the system has the potential to lead to deanonymization, which may hold severe personal consequences for the user. We report on the unders...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011