rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation

نویسندگان

  • Qiyan Wang
  • Zi Lin
  • Nikita Borisov
  • Nicholas Hopper
چکیده

Tor is one of the most popular censorship circumven-tion systems; it uses bridges run by volunteers as proxies toevade censorship. A key challenge to the Tor circumventionsystem is to distribute bridges to a large number of userswhile avoiding having the bridges fall into the hands ofcorrupt users. We propose rBridge—a user reputation sys-tem for bridge distribution; it assigns bridges according tothe past history of users to limit corrupt users from repeat-edly blocking bridges, and employs an introduction-basedmechanism to invite new users while resisting Sybil attacks.Our evaluation results show that rBridge provides muchstronger protection for bridges than any existing scheme.We also address another important challenge to the bridgedistribution—preserving the privacy of users’ bridge as-signment information, which can be exploited by maliciousparties to degrade users’ anonymity in anonymous commu-nication.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

TorBricks: Blocking-Resistant Tor Bridge Distribution

Tor is currently the most popular network for anonymous Internet access. It critically relies on volunteer nodes called bridges for relaying Internet traffic when a user’s ISP blocks connections to Tor. Unfortunately, current methods for distributing bridges are vulnerable to malicious users who obtain and block bridge addresses. In this paper, we propose TorBricks, a protocol for distributing ...

متن کامل

Key Management for Onion Routing in a True Peer to Peer Setting

Onion routing is a technique for anonymous and privacy preserving communication at the base of popular Internet anonymity tools such as Tor. In onion routing, traffic is relayed by a number of intermediary nodes (called relays) before it reaches the intended destination. To guarantee privacy and prevent tampering, each packet is encrypted multiple times in a layered manner, using the public key...

متن کامل

User Profile Matching with Privacy Preservation in Mobile Social Networks

In this paper, we study profile matching [1] with privacy-preservation in mobile social networks (MSNs) and introduce a novel profile matching protocols. Inter-social networks[2][3] operations and functionalities are required in several scenarios (data integration, data enrichment, information retrieval, etc.). To achieve this, matching user profiles is required. Current methods are so restrict...

متن کامل

Prediction of user's trustworthiness in web-based social networks via text mining

In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013