Weighted Factors for Measuring Anonymity Services: A Case Study on Tor, JonDonym, and I2P
ثبت نشده
چکیده
There are many systems that provide anonymity service for the users. Most of these systems work on the separation between the users’ identity and the final destination. The level of anonymity these services provide affected by several factors. Some of these factors are related to the design of the anonymity service itself. Others are related to how the system is used or what is the application/purpose the user wants to run over the anonymity service. In this paper we: (i) propose five factors that aim to measure the anonymity level from the user’s perspective; (ii) evaluate these factors on three anonymity services, namely Tor, JonDonym, and I2P as case studies; and (iii) present a mechanism to evaluate anonymity services based on our factors and measure the level of anonymity. Keywords— Anonymity Factors; Metrics; Tor; JonDonym;
منابع مشابه
Weighted Factors for Evaluating Anonymity
Many systems provide anonymity for their users, and most of these systems work on the separation between the users’ identity and the final destination. The level of anonymity these services provide is affected by several factors, some of which are related to the design of the anonymity service itself. Others are related to how the system is used or the user’s application/purpose in using the an...
متن کاملComparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance
The most popular system for providing practical lowlatency anonymity on the Internet is Tor. However, many other tools besides Tor exist as both free and commercial solutions. In this paper, we consider ve most popular low-latency anonymisation services that represent the current state of the art: singlehop proxies (Perfect Privacy and free proxies) and Onion Routing based solutions (Tor, I2P, ...
متن کاملAn overview of anonymity technology usage
Anonymity technologies enable Internet users to maintain a level of privacy that prevents the collection of identifying information such as the IP address. Understanding the deployment of anonymity technologies on the Internet is important to analyze the current and future trends. In this paper, we provide a tutorial survey and a measurement study to understand the anonymity technology usage on...
متن کاملPractical Attacks against the I2P Network
Anonymity networks, such as Tor or I2P, were built to allow users to access network resources without revealing their identity. Newer designs, like I2P, run in a completely decentralized fashion, while older systems, like Tor, are built around central authorities. The decentralized approach has advantages (no trusted central party, better scalability), but there are also security risks associat...
متن کاملAn analysis of tools for online anonymity
The ability to remain anonymous while engaging in different activities online is increasingly sought after by consumers with privacy concerns. Currently the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure onli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017