Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods

We propose a dedicated DNS Anonymity Service which protects users' privacy. The design consists of two building blocks: a broadcast scheme for the distribution of a "top list" of DNS hostnames, and low-latency Mixes for requesting the remaining hostnames unobservably. We show that broadcasting the 10,000 most frequently queried hostnames allows zero-latency lookups for over 80% of DNS queries at reasonable cost. We demonstrate that the performance of the previously proposed Range Queries approach severely suffers from high lookup latencies in a real-world scenario.

[1]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[2]  Tharam S. Dillon,et al.  On the Move to Meaningful Internet Systems, OTM 2010 , 2010, Lecture Notes in Computer Science.

[3]  Scott Rose,et al.  DNS Security Introduction and Requirements , 2005, RFC.

[4]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[5]  Alan O. Freier,et al.  Multicast Transport Protocol , 1992, RFC.

[6]  Mark P. Andrews,et al.  Negative Caching of DNS Queries (DNS NCACHE) , 1998, RFC.

[7]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[8]  Chris Clifton,et al.  Privacy-Preserving Kth Element Score over Vertically Partitioned Data , 2009, IEEE Transactions on Knowledge and Data Engineering.

[9]  Stefan Köpsell,et al.  Low Latency Anonymous Communication - How Long Are Users Willing to Wait? , 2006, ETRICS.

[10]  Aiko Pras,et al.  DNS: A Statistical Analysis of Name Server Traffic at Local Network-to-Internet Connections , 2005, EUNICE.

[11]  Hannes Federrath,et al.  International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability , 2001 .

[12]  Roger Dingledine,et al.  Blending Different Latency Traffic with Alpha-mixing , 2006, Privacy Enhancing Technologies.

[13]  Vashek Matyas,et al.  User Profiling and Re-identification: Case of University-Wide Network Analysis , 2009, TrustBus.

[14]  Chris Clifton,et al.  Privacy - preserving top-k queries , 2005, 21st International Conference on Data Engineering (ICDE'05).

[15]  Joaquín García,et al.  Evaluation of Two Privacy-Preserving Protocols for the DNS , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[16]  Günter Müller Emerging Trends in Information and Communication Security , 2006, Lecture Notes in Computer Science.

[17]  Birgit Pfitzmann,et al.  ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.

[18]  Hannes Federrath,et al.  Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[19]  Vitaly Shmatikov,et al.  Synchronous Batching: From Cascades to Free Routes , 2004, Privacy Enhancing Technologies.

[20]  Hannes Federrath Designing Privacy Enhancing Technologies , 2001, Lecture Notes in Computer Science.

[21]  Mark Handley,et al.  The Case for Pushing DNS , 2005 .

[22]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[23]  Xenofontas A. Dimitropoulos,et al.  Fast Privacy-Preserving Top-k Queries Using Secret Sharing , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[24]  Robert Tappan Morris,et al.  DNS performance and the effectiveness of caching , 2001, IMW '01.

[25]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[26]  Joaquín García,et al.  Anonymous Resolution of DNS Queries , 2008, OTM Conferences.

[27]  Kouichi Sakurai,et al.  Analysis of Privacy Disclosure in DNS Query , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[28]  Vincenzo Conti,et al.  A Self-Contained Biometric Sensor for Ubiquitous Authentication , 2007 .

[29]  Yinghui Yang,et al.  Web user behavioral profiling for user identification , 2010, Decis. Support Syst..

[30]  Kouichi Sakurai,et al.  Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving , 2007 .

[31]  Scott Rose,et al.  DNS Security Introduction and Requirements , 2005, RFC.

[32]  Torsten Suel,et al.  Geographic web usage estimation by monitoring DNS caches , 2008, LocWeb.

[33]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[34]  George Danezis Mix-Networks with Restricted Routes , 2003, Privacy Enhancing Technologies.

[35]  Gene Tsudik,et al.  Towards Plugging Privacy Leaks in the Domain Name System , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).

[36]  Niels Provos,et al.  Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing , 2010, TOIT.