Cyber anonymity based on software-defined networking and Onion Routing (SOR)

Cyber anonymity tools have attracted wide attention in resisting network traffic censorship and surveillance, and have played a crucial role for open communications over the Internet. The Onion Routing (Tor) is considered the prevailing technique for circumventing the traffic surveillance and providing cyber anonymity. Tor operates by tunneling a traffic through a series of relays, making such traffic to appear as if it originated from the last relay in the traffic path, rather than from the original user. However, Tor faced some obstructions in carrying out its goal effectively, such as insufficient performance and limited capacity. This paper presents a cyber anonymity technique based on software-defined networking; named SOR, which builds onion-routed tunnels across multiple anonymity service providers. SOR architecture enables any cloud tenants to participate in the anonymity service via software-defined networking. Our proposed architecture leverages the large capacity and robust connectivity of the commercial cloud networks to elevate the performance of the cyber anonymity service.

[1]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[2]  Angelos Stavrou,et al.  PAR: Payment for Anonymous Routing , 2008, Privacy Enhancing Technologies.

[3]  Harsha V. Madhyastha,et al.  LASTor: A Low-Latency AS-Aware Tor Client , 2012, IEEE/ACM Transactions on Networking.

[4]  Radu Sion,et al.  XPay: practical anonymous payments for tor routing and other networked services , 2009, WPES '09.

[5]  Michael J. Freedman,et al.  Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing , 2011, FOCI.

[6]  Lorrie Faith Cranor,et al.  Internet privacy , 1999, CACM.

[7]  R Wacks Privacy and Anonymity , 2000 .

[8]  Björn Scheuermann,et al.  The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network , 2014, NDSS.

[9]  Dirk Grunwald,et al.  Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.

[10]  Ghassan O. Karame,et al.  Towards a Richer Set of Services in Software-Defined Networks , 2014 .

[11]  Kamelia Nikolova,et al.  SOFTWARE DEFINED NETWORKS AND OPENFLOW: A SURVEY , 2018, 18th International Multidisciplinary Scientific GeoConference SGEM2018, Nano, Bio and Green � Technologies for a Sustainable Future.

[12]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[13]  Roger Dingledine,et al.  Methodically Modeling the Tor Network , 2012, CSET.

[14]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[15]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[16]  Adrian Yanes,et al.  Privacy and Anonymity , 2014, ArXiv.

[17]  Min Zhu,et al.  B4: experience with a globally-deployed software defined wan , 2013, SIGCOMM.