The Onion Router: Is the Onion Network Suitable for Cloud Technologies

  • Galia Novakova NedeltchevaEmail author
  • Elior Vila
  • Marina Marinova
Conference paper
Part of the Advances in Science, Technology & Innovation book series (ASTI)


The present paper introduces the Onion Router (TOR) also known as anonymity network. In the time of cloud technologies, when everything is stored partially or completely remote the question for our information safety is felicitous all the time. Usually the answer is no. Of course, there is an explanation for that, too. Companies think that their software is perfectly safe, because they previse every known threat and make it stable—no known viruses and bugs are provided with this implementation. The key word is known. Yes, expert programmers can write safe and reliable code, to resist on any familiar menace, but attackers are always a step forward—they find a new code vulnerability and prevail the software. Then developers provide a fix. Then everything starts all over—that is the vulnerability life cycle. For the first time developers take a step forward—so called TOR. It is an attempt for a safer network, a tentative to stop tracing packets, so our personal data could be safe even in the cloud. Main purpose of this paper is to provide discussion about cloud technologies, TOR network and how they can work together. As main subject is pointed a group parameter hold solution which purpose is to increase the security level of the TOR network itself.


Cloud Onion router (TOR) Security 


  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Willian, D., Nedeltcheva, G.N.: Security in the supply chain of ICT companies. In: 6th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE 2016). December 2–3rd 2016, University of National and World Economy (UNWE), Sofia, BulgariaGoogle Scholar
  5. 5.
  6. 6.
  7. 7.
    Galia Novakova Nedeltcheva, Willian Dimitrov. Security Dynamics—adaptation of ICT structure to Cloud Computing and IoT—opportunities and threats. 2nd Intern. Conference High Technologies, Business, Society (HTBS)—2017. Borovets, Bulgaria, 13–16 March 2017.
  8. 8.
  9. 9.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Galia Novakova Nedeltcheva
    • 1
    Email author
  • Elior Vila
    • 2
  • Marina Marinova
    • 1
  1. 1.Faculty of Mathematics and Informatics James Boutchier Str.Sofia University “St. Kliment Ohridski”SofiaBulgaria
  2. 2.Faculty of Natural SciencesUniversity of Elbasan “A. Xhuvani”ElbasanAlbania

Personalised recommendations