Weighted Factors for Measuring Anonymity Services: A Case Study on Tor, JonDonym, and I2P

ثبت نشده
چکیده

There are many systems that provide anonymity service for the users. Most of these systems work on the separation between the users’ identity and the final destination. The level of anonymity these services provide affected by several factors. Some of these factors are related to the design of the anonymity service itself. Others are related to how the system is used or what is the application/purpose the user wants to run over the anonymity service. In this paper we: (i) propose five factors that aim to measure the anonymity level from the user’s perspective; (ii) evaluate these factors on three anonymity services, namely Tor, JonDonym, and I2P as case studies; and (iii) present a mechanism to evaluate anonymity services based on our factors and measure the level of anonymity. Keywords— Anonymity Factors; Metrics; Tor; JonDonym;

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Weighted Factors for Evaluating Anonymity

Many systems provide anonymity for their users, and most of these systems work on the separation between the users’ identity and the final destination. The level of anonymity these services provide is affected by several factors, some of which are related to the design of the anonymity service itself. Others are related to how the system is used or the user’s application/purpose in using the an...

متن کامل

Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance

The most popular system for providing practical lowlatency anonymity on the Internet is Tor. However, many other tools besides Tor exist as both free and commercial solutions. In this paper, we consider ve most popular low-latency anonymisation services that represent the current state of the art: singlehop proxies (Perfect Privacy and free proxies) and Onion Routing based solutions (Tor, I2P, ...

متن کامل

An overview of anonymity technology usage

Anonymity technologies enable Internet users to maintain a level of privacy that prevents the collection of identifying information such as the IP address. Understanding the deployment of anonymity technologies on the Internet is important to analyze the current and future trends. In this paper, we provide a tutorial survey and a measurement study to understand the anonymity technology usage on...

متن کامل

Practical Attacks against the I2P Network

Anonymity networks, such as Tor or I2P, were built to allow users to access network resources without revealing their identity. Newer designs, like I2P, run in a completely decentralized fashion, while older systems, like Tor, are built around central authorities. The decentralized approach has advantages (no trusted central party, better scalability), but there are also security risks associat...

متن کامل

An analysis of tools for online anonymity

The ability to remain anonymous while engaging in different activities online is increasingly sought after by consumers with privacy concerns. Currently the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure onli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017