Proportionally Fair approach for Tor’s Circuits Scheduling

The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients’ connections sharing the same relays is increasing to the extent that it is starting to affect the performance. Recently, Tor’s resource allocation among circuits has been studied as one cause of poor Tor network performance. In this paper, we propose two scheduling approaches that guarantee proportional fairness between circuits that are sharing the same connection. In our evaluation, we show that the average-rate-base scheduler allocates Tor’s resources in an optimal fair scheme, increasing the total throughput achieved by Tor’s relays. However, our second proposed approach, an optimization-based scheduler, maintains acceptable fairness while reducing the latency experienced by Tor’s clients.

[1]  Lei Yang,et al.  mTor: A multipath Tor routing beyond bandwidth throttling , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[2]  Kevin S. Bauer,et al.  The Path Less Travelled : Overcoming Tor ’ s Bottlenecks with Multipaths , 2012 .

[3]  Raj Jain,et al.  A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.

[4]  Dirk Grunwald,et al.  Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.

[5]  Aiman Erbad,et al.  Sender-side buffers and the case for multimedia adaptation , 2012, CACM.

[6]  Frank Kelly,et al.  Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..

[7]  Ian Goldberg,et al.  DefenestraTor: Throwing Out Windows in Tor , 2011, PETS.

[8]  Ian Goldberg,et al.  PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks , 2013, CCS.

[9]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[10]  Micah Sherr,et al.  KIST , 2018, ACM Trans. Priv. Secur..

[11]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router (2014 DRAFT v1) , 2012 .

[12]  Roger Dingledine,et al.  Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it , 2009 .

[13]  Frank Kelly,et al.  Rate control for communication networks: shadow prices, proportional fairness and stability , 1998, J. Oper. Res. Soc..

[14]  Micah Sherr,et al.  An Empirical Evaluation of Relay Selection in Tor , 2013, NDSS.

[15]  Sergio Lucia,et al.  PredicTor: Predictive Congestion Control for the Tor Network , 2020, 2020 IEEE Conference on Control Technology and Applications (CCTA).

[16]  Ian Goldberg,et al.  Performance and Security Improvements for Tor , 2016, IACR Cryptol. ePrint Arch..

[17]  Alexander Golitschek Edler von Elbwart,et al.  Fairness and throughput analysis for generalized proportional fair frequency scheduling in OFDMA , 2005, 2005 IEEE 61st Vehicular Technology Conference.

[18]  Ashish Goel,et al.  Bandwidth Allocation in Networks: A Single Dual Update Subroutine for Multiple Objectives , 2004, CAAN.

[19]  Stephen P. Boyd,et al.  CVXPY: A Python-Embedded Modeling Language for Convex Optimization , 2016, J. Mach. Learn. Res..

[20]  Dimitri P. Bertsekas,et al.  Data Networks , 1986 .

[21]  Mohsen Imani,et al.  Modified Relay Selection and Circuit Selection for Faster Tor , 2016, IET Commun..

[22]  Ian Goldberg,et al.  Enhancing Tor's performance using real-time traffic classification , 2012, CCS.

[23]  Ian Goldberg,et al.  An improved algorithm for tor circuit scheduling , 2010, CCS '10.

[24]  Nicholas Hopper,et al.  Shadow: Running Tor in a Box for Accurate and Efficient Experimentation , 2011, NDSS.

[25]  Björn Scheuermann,et al.  Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network , 2016, NSDI.

[26]  Aiman Erbad,et al.  Paceline: latency management through adaptive output , 2010, MMSys '10.

[27]  Rob Jansen,et al.  Safely Measuring Tor , 2016, CCS.

[28]  Mohamed Ali Kâafar,et al.  Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.

[29]  Nadia Heninger,et al.  Torchestra: reducing interactive traffic delays over tor , 2012, WPES '12.