More Anonymity through Trust Degree in Trust-Based Onion Routing

نویسندگان

  • Peng Zhou
  • Xiapu Luo
  • Rocky K. C. Chang
چکیده

Trust-based onion routing employs users’ own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attacks based on a priori trust relationships. In this paper, we first observe that the onion routers with higher trust degrees (e.g., those that are trusted by more other users) are more effective in defending against the inference attacks. We therefore incorporate trust degree into trust-based onion routing. With a rigorous theoretical analysis, we devise an optimal strategy for router selection and an optimal routing algorithm for path selection. Both minimize the risk of deanonymization through inference without sacrificing the capability of evading compromised routers. Moreover, simulation-based experiments on top of realworld social networks confirm the effectiveness of the optimal router selection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Inference attacks against trust-based onion routing: Trust degree to the rescue

Trust-based onion routing enhances anonymity protection by means of constructing onion circuits using trust-based routers. However, attackers who have the knowledge of a priori trust distributions are still capable of largely reducing the anonymity protected by trustbased circuits. The root cause is that these attackers have a high probability to guess the users who initiate trust-based circuit...

متن کامل

Towards More Trustworthy Trust- Based Systems for Anonymity and Web Security

In today’s Internet, trust has been widely used to design anonymity and security enhanced systems. Some of these trust-based systems have been successfully deployed in the Internet for a long time and benefit a large population of Internet users. In particular, trust-based onion routing network is a representative example for the use of trust in protecting anonymity. As one of the most popular ...

متن کامل

Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing

Internet censorship and surveillance have made anonymity tools increasingly critical for free and open Internet access. Tor, and its associated ecosystem of volunteer traffic relays, provides one of the most secure and widely-available means for achieving Internet anonymity today. Unfortunately, Tor has limitations, including poor performance, inadequate capacity, and a susceptibility to wholes...

متن کامل

Trust Based Data Security and Secure Anonymous Routing For MANETs

For many applications of the mobile ad hoc networks (MANETs) deployed in adversary environments, anonymous communications with data confidentiality and integrity is important. A major requirement is to provide unidentifiability and unlinkability to the mobile nodes and their traffics.The existing protocols are vulnerable to security threats like global eavesdropper attacks, fake routing packets...

متن کامل

Dissent in Numbers: Making Strong Anonymity Scale

Current anonymous communication systems make a trade-off between weak anonymity among many nodes, via onion routing, and strong anonymity among few nodes, via DC-nets. We develop novel techniques in Dissent, a practical group anonymity system, to increase by over two orders of magnitude the scalability of strong, traffic analysis resistant approaches. Dissent derives its scalability from a clie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012