Local anonymity in the internet

Packet-switched computer networks of all sizes are widely used for personal, professional, and governmental communication. However, the speed, versatility, and largely unregulated nature of computer networks coupled with the availability of affordable high-capacity storage makes it possible and even practical to routinely maintain detailed logs of communication without indication to the communication partners. Although the contents of messages can be protected by cryptography, the simple fact that the network carries an encrypted message from one party to another is a piece of intelligence not as easily protected. For example, the message's destination must be revealed at some level so the network can deliver it. In this two-part dissertation we investigate techniques for protecting the identities of communication partners from worst-case adversaries such as the network infrastructure itself, including routers, switches, and hubs. In the first part, we survey and compare the nature of the untraceability offered by anonymity protocols described in the literature. We then introduce local anonymity as a new model of network anonymity that complements the protection afforded by existing network privacy schemes. In the second part, we describe the experimental implementation of two protocols using local anonymity techniques and compare their performance We find that while both protocols achieve satisfactory performance, superposed sending (also known as a DC network) offers better performance and security tradeoffs in most applications than the simpler and more obvious alternative.

[1]  Jon Postel,et al.  User Datagram Protocol , 1980, RFC.

[2]  Andreas Pfitzmann,et al.  Networks Without User Observability: Design Options , 1985, EUROCRYPT.

[3]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[4]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[5]  Azer Bestavros,et al.  Distributed packet rewriting and its application to scalable server architectures , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[6]  Xuejia Lai,et al.  On the design and security of block ciphers , 1992 .

[7]  Suresh C. Kothari,et al.  Generalized Linear Threshold Scheme , 1985, CRYPTO.

[8]  Todd A. Proebsting,et al.  USC: A Universal Stub Compiler , 1994, SIGCOMM.

[9]  Perry Metzger,et al.  The ESP DES-CBC Transform , 1995, RFC.

[10]  David C. Plummer,et al.  Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware , 1982, RFC.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[13]  David A. Wagner,et al.  Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.

[14]  Dogan Kesdogan,et al.  Variable and scalable security: protection of location information in mobile IP , 1996, Proceedings of Vehicular Technology Conference - VTC.

[15]  Larry L. Peterson,et al.  The x-Kernel: An Architecture for Implementing Network Protocols , 1991, IEEE Trans. Software Eng..

[16]  조국현,et al.  [서평]Internetworking with TCP/IP , 1996 .

[17]  Dogan Kesdogan,et al.  Analysis of Security and Privacy in Mobile-IP , 1996 .

[18]  Bert den Boer,et al.  Detection of Disrupters in the DC Protocol , 1990, EUROCRYPT.

[19]  David R. Butenhof Programming with POSIX threads , 1993 .

[20]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[21]  T. J. Shepard,et al.  TCP PACKET TRACE ANALYSIS , 1991 .

[22]  Rafail Ostrovsky,et al.  Efficient anonymous multicast and reception , 1997 .

[23]  Ian Goldberg,et al.  TAZ servers and the rewebber network , 1998 .

[24]  Gia B. Lee Addressing Anonymous Messages in Cyberspace , 1996, J. Comput. Mediat. Commun..

[25]  Yossi Matias,et al.  On secure and pseudonymous client-relationships with multiple servers , 1998, TSEC.

[26]  Yossi Matias,et al.  How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.

[27]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[28]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[29]  Jon Postel,et al.  Internet Control Message Protocol , 1981, RFC.

[30]  Perry Metzger,et al.  IP Authentication using Keyed MD5 , 1995, RFC.

[31]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[32]  Jon Postel,et al.  Assigned Numbers , 1979, RFC.

[33]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[34]  Bil Lewis,et al.  Multithreaded Programming With PThreads , 1997 .

[35]  Jeffrey D. Case,et al.  Simple Network Management Protocol (SNMP) , 1989, RFC.

[36]  Michael Waidner,et al.  Unconditional Sender and Recipient Untraceability in Spite of Active Attacks , 1990, EUROCRYPT.

[37]  Paul Barford,et al.  Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.

[38]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[39]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[40]  W. Richard Stevens,et al.  Unix network programming , 1990, CCRV.

[41]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[42]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[43]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[44]  Ieee Standards Board Fiber optic active and passive star-based segments, type 10BASE-F (section 15-18) : IEEE standards for local and metropolitan area networks : supplement to carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications , 1993 .