CONTROL THE TRADEOFF BETWEEN PERFORMANCE AND ANONYMITY THROUGH END-TO-END TUNABLE PATH SELECTION

Tor (originally short for The Onion Router) is a system intended to enable online anonymity. The modern day anonymity networks hide user identities with the help of relayed anonymity routers. However, the lack of effective trust model disables users to monitor malicious or vulnerable routers, thus making them susceptible to such router based attacks. The Tor network uses self-reported bandwidth values from all routers for building optimal tunnels “performance vs. anonymity”. Since tunnels are allocated in proportion to this bandwidth, this allows a malicious router operator to attract tunnels for compromise. This gauge being insensitive to load does not adequately respond to changing conditions and results in unreliable performance, eventually driving users away. Tor, a circuit-based low-latency anonymous communication service, is a protocol that is both ore secure and performs better, both in terms of observed performance and in terms of achievable anonymity and provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. This paper proposes improvements to the existing Tor router bandwidth evaluation and router selection algorithms. Additionally, by allowing the user to select their preferred balance of performance and anonymity, these improvements increases the usability, and therefore the potential user base and security of the Tor network. It is proposed to increase the fidelity of the packet-level simulation in the Tor network by including such effects as variable file sizes, variable intervals between requests, and TCP slow-start behavior. This paper also proposes to examine the other aspects (such as latency, apart from bandwidth) of the tradeoff between performance and anonymity in anonymous networks of varying types and an opportunistic bandwidth measurement, tunable performance extensions are examined in the Tor network.

[2]  Nikita Borisov,et al.  A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.

[3]  Micah Adler,et al.  An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.

[4]  Robert N. M. Watson,et al.  Metrics for Security and Performance in Low-Latency Anonymity Systems , 2008, Privacy Enhancing Technologies.

[5]  K. Ravikumar,et al.  A FRAMEWORK FOR PRACTICAL VULNERABILITIES OF THE TOR (THE ONION ROUTING) ANONYMITY NETWORK , 2012 .

[6]  Gene Tsudik,et al.  Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[7]  S. Bradner,et al.  Building a Coreless Internet without Ripping out the Core , 2005 .

[8]  Nikita Borisov,et al.  EigenSpeed: secure peer-to-peer bandwidth evaluation , 2009, IPTPS.

[9]  N. SrikanthT. EXPLICIT STUDY ON SECURITY ISSUES IN MULTIMEDIA STREAMING IN PEER TO PEER NETWORK , 2012 .

[10]  Dirk Grunwald,et al.  Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.

[11]  Dirk Grunwald,et al.  Low-resource routing attacks against tor , 2007, WPES '07.

[12]  Ian Goldberg,et al.  Improving Tor using a TCP-over-DTLS Tunnel , 2009, USENIX Security Symposium.

[13]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[14]  Kevin S. Bauer,et al.  Low-Resource Routing Attacks Against Anonymous Systems , 2007 .

[15]  Nick Mathewson,et al.  Anonymity Loves Company: Usability and the Network Effect , 2006, WEIS.