Skip to main content

Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs

  • Conference paper
Stabilization, Safety, and Security of Distributed Systems (SSS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6976))

Included in the following conference series:

Abstract

Anonymous communication, and in particular anonymous Peer-to-Peer (P2P) file sharing systems, have received considerable attention in recent years. In a P2P file sharing system, there are three types of participants: publishers that insert content into the system, servers that store content, and readers that retrieve content from the servers. Existing anonymous P2P file sharing systems confer partial anonymity. They provide anonymity to participant pairs, such as servers and readers or publishers and readers, but they do not consider the anonymity of all three types of participants.

In this work we propose two solutions for anonymous P2P file sharing systems. Both of our solutions provide anonymity to all three types of participants. The proposed solutions are based on indexing by global hash functions (rather than an index server), dispersal of information, and three anonymity tunnels. Each anonymity tunnel is designed to protect the anonymity of a different user (publisher, server, or reader). In both solutions the reader and publisher tunnels are sender anonymity tunnels. In the first solution the third tunnel is a rendezvous tunnel, constructed by means of a random walk and terminating at the server. In the second solution, which is based on Tor, the third tunnel is built using Tor’s hidden services.

The first solution preserves anonymity in the presence of a semi-honest adversary that controls a limited number of nodes in the system. The second solution is based on Tor primitives, coping with the same adversary as that assumed in Tor. The second solution enhances Tor, ensuring publisher, server, and reader anonymity.

This research has been supported by the Ministry of Science and Technology (MOST), the Israel Internet Association (ISOC-IL), the Lynne and William Frankel Center for Computer Science at Ben-Gurion University, Rita Altura Trust Chair in Computer Science, the ICT Programme of the European Union under contract number FP7-215270 (FRONTS), Microsoft, US Air-Force, Israel Science Foundation (grant number 428/11), Verisign 25th Anniversary of .COM grant and Deutsche Telekom Labs at BGU. A poster presenting preliminary results of this work was presented in CCS ’10 [13].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beimel, A., Dolev, S.: Buses for anonymous message delivery. Journal of Cryptology 16(1), 25–39 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  2. Berthold, O., Federrath, H., Köpsell, S.: Web-MIXes: A System for Anonymous and Unobservable Internet Access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 115–129. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Boneh, D.: The decision diffie-hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48–63. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (February 1981)

    Google Scholar 

  5. Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untranceability. Communication of the ACM 24(2) (1988)

    Google Scholar 

  6. Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Anonymity. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Dingledine, R., Freedman, M.J., Molnar, D.: The free haven project: Distributed anonymous storage service. In: Federrath, H. (ed.) Anonymity. LNCS, vol. 2009, pp. 67–95. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)

    Google Scholar 

  9. Dolev, S., Ostrovsky, R.: Xor-trees for efficient anonymous multicast and reception. ACM Transactions on Information and System Security 3(2), 63–84 (2000)

    Article  Google Scholar 

  10. Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, New York (2000)

    MATH  Google Scholar 

  11. Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York (2004) [9]; O. Goldreich

    Google Scholar 

  12. Hermoni, O., Gilboa, N., Felstaine, E., Elovici, Y., Dolev, S.: Rendezvous Tunnel for Anonymous Publishing: Clean Slate and TOR Based Designs. TR 11-09 Department of Computer Science, Ben Gurion University of the Negev, Israel (2011)

    Google Scholar 

  13. Hermoni, O., Gilboa, N., Felstaine, E., Elovici, Y., Dolev, S.: Rendezvous Tunnel for Anonymous Publishing. In: CCS 2010, pp. 690–692 (2010)

    Google Scholar 

  14. Hermoni, O., Gilboa, N., Felstaine, E., Shitrit, S.: Deniability - an alibi for users in p2p networks. In: COMSWARE, pp. 310–317 (2008)

    Google Scholar 

  15. Ling, Z., Luo, J., Yu, W., Fu, X., Xuan, D., Jia, W.: A new cell counter based attack against tor. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 578–589 (2009)

    Google Scholar 

  16. Marc Waldman, A.R., Cranor, L.: Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system. In: Proceedings of the 9th USENIX Security Symposium, pp. 59-72 (August 2000)

    Google Scholar 

  17. Mittal, P., Borisov, N.: ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM Conference on Computer and Communications Security, pp. 161–172. ACM, New York (2009)

    Google Scholar 

  18. Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 183–195. IEEE, Los Alamitos (2005)

    Chapter  Google Scholar 

  19. Overlier, L., Syverson, P.: Locating Hidden Servers. In: IEEE Symposium on Security and Privacy, pp. 100–114 (2006)

    Google Scholar 

  20. Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, v0.34 (August 2010)

    Google Scholar 

  21. Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36(2), 335–348 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  22. Reiter, M.K., Rubin, A.D.: Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  23. Serjantov, A.: Anonymizing censorship resistant systems. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 111. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  24. Shitrit, S., Felstaine, E., Gilboa, N., Hermoni, O.: Anonymity scheme for interactive p2p services. Journal of Internet Technology 10, 299–312 (2009)

    Google Scholar 

  25. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M., Dabek, F., Balakrishnan, H.: Chord: A Acalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking 11(1), 17–32 (2003)

    Article  Google Scholar 

  26. Syverson, P., Goldsclag, D., Reed, M.: Anonymous connections and onion routing. In: Proceedings of the IEEE 18th Annual Symposium on Security and Privacy, Oakland, California, pp. 44–54 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hermoni, O., Gilboa, N., Felstaine, E., Elovici, Y., Dolev, S. (2011). Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs. In: Défago, X., Petit, F., Villain, V. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2011. Lecture Notes in Computer Science, vol 6976. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24550-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24550-3_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24549-7

  • Online ISBN: 978-3-642-24550-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics