rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
نویسندگان
چکیده
Tor is one of the most popular censorship circumven-tion systems; it uses bridges run by volunteers as proxies toevade censorship. A key challenge to the Tor circumventionsystem is to distribute bridges to a large number of userswhile avoiding having the bridges fall into the hands ofcorrupt users. We propose rBridge—a user reputation sys-tem for bridge distribution; it assigns bridges according tothe past history of users to limit corrupt users from repeat-edly blocking bridges, and employs an introduction-basedmechanism to invite new users while resisting Sybil attacks.Our evaluation results show that rBridge provides muchstronger protection for bridges than any existing scheme.We also address another important challenge to the bridgedistribution—preserving the privacy of users’ bridge as-signment information, which can be exploited by maliciousparties to degrade users’ anonymity in anonymous commu-nication.
منابع مشابه
improvement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملTorBricks: Blocking-Resistant Tor Bridge Distribution
Tor is currently the most popular network for anonymous Internet access. It critically relies on volunteer nodes called bridges for relaying Internet traffic when a user’s ISP blocks connections to Tor. Unfortunately, current methods for distributing bridges are vulnerable to malicious users who obtain and block bridge addresses. In this paper, we propose TorBricks, a protocol for distributing ...
متن کاملKey Management for Onion Routing in a True Peer to Peer Setting
Onion routing is a technique for anonymous and privacy preserving communication at the base of popular Internet anonymity tools such as Tor. In onion routing, traffic is relayed by a number of intermediary nodes (called relays) before it reaches the intended destination. To guarantee privacy and prevent tampering, each packet is encrypted multiple times in a layered manner, using the public key...
متن کاملUser Profile Matching with Privacy Preservation in Mobile Social Networks
In this paper, we study profile matching [1] with privacy-preservation in mobile social networks (MSNs) and introduce a novel profile matching protocols. Inter-social networks[2][3] operations and functionalities are required in several scenarios (data integration, data enrichment, information retrieval, etc.). To achieve this, matching user profiles is required. Current methods are so restrict...
متن کاملPrediction of user's trustworthiness in web-based social networks via text mining
In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013