Introducing Accountability to Anonymity Networks

نویسندگان

  • Michael Backes
  • Jeremy Clark
  • Peter Druschel
  • Aniket Kate
  • Milivoj Simeonovski
چکیده

Many anonymous communication (AC) networks rely on routing traffic through proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes risk sanctions by law enforcement if users commit illegal actions through the AC network. We present BACKREF, a generic mechanism for AC networks that provides practical repudiation for the proxy nodes by tracing back the selected outbound traffic to the predecessor node (but not in the forward direction) through a cryptographically verifiable chain. It also provides an option for full (or partial) traceability back to the entry node or even to the corresponding user when all intermediate nodes are cooperating. Moreover, to maintain a good balance between anonymity and accountability, the protocol incorporates whitelist directories at exit proxy nodes. BACKREF offers improved deployability over the related work, and introduces a novel concept of pseudonymous signatures that may be of independent interest. We exemplify the utility of BACKREF by integrating it into the onion routing (OR) protocol, and examine its deployability by considering several system-level aspects. We also present the security definitions for the BACKREF system (namely, anonymity, backward traceability, no forward traceability, and no false accusation) and conduct a formal security analysis of the OR protocol with BACKREF using ProVerif, an automated cryptographic protocol verifier, establishing the aforementioned security properties against a strong adversarial model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Internet Banking Law: An Iranian Perspective Problems and Prospects of Introducing Islamic Microfinance in Azerbaijan Republic

Bank supervision and monetary policy are strategic concepts in the economy of countries. Development of electronic communications, especially in online and international spheres, has largely threatened financial services in view of security and illegal access to banking networks. Anonymity and identity theft has endangered electronic commerce by crimes like phishing, fraud and different types...

متن کامل

A scalable anonymous protocol for heterogeneous wireless ad hoc networks

Ensuring anonymity in wireless and hoc networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel Scalable Anonymous Protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping adversar...

متن کامل

Practical Anonymity for the Masses with Mix-Networks

Designing mix-networks for low-latency applications that offer acceptable performance and provide good resistance against attacks without introducing too much overhead is very difficult. Good performance and small overheads are vital to attract users and to be able to support many of them, because with only a few users, there is no anonymity at all. In this paper, we analyze how well different ...

متن کامل

A Novel ID Anonymity Preserving Scheme (ID-APS) for Hierarchical Wireless Sensor Networks

Node ID anonymity is a critical aspect of privacy in Wireless Sensor Networks (WSNs). Exposing node IDs can help adversaries to learn the underlying network infrastructure and to mount more serious attacks, such as attacks on important nodes (e.g., cluster heads). Therefore, providing ID anonymity should be an integral part of the solution to secure WSNs, and should not hinder other security pr...

متن کامل

A Hierarchical Anonymous Communication Protocol for Sensor Networks

Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel hierarchical anonymous communication protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1311.3151  شماره 

صفحات  -

تاریخ انتشار 2013