Advertisement

A Ring Based Onion Circuit for Hidden Services

  • Hakem Beitollahi
  • Geert Deconinck
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7161)

Abstract

The capability that a server can hide its location while offering various kinds of services to its clients is called hidden services or location-hiding. Almost previous low-latency anonymous communication systems such as Tor, MorphMix, etc. that can be used to implement hidden services are vulnerable against end-to-end traffic analysis attack. In this paper, we introduce a novel architecture for implementing hidden services which is robust against end-to-end traffic analysis attack. Moreover, our scheme is more robust against various traffic analysis attacks than previous low-latency anonymous communication architectures.

Keywords

Overlay Network Malicious Node Clockwise Direction Response Packet Rendezvous Point 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Back, A., Möller, U., Stiglic, A.: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245–257. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-Resource Routing Attacks against Tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007), Virginia, USA (2007)Google Scholar
  3. 3.
    Boucher, P., Shostack, A., Goldberg, I.: Freedom Systems 2.0 Architecture. White paper, Zero Knowledge Systems, Inc. (December 2000)Google Scholar
  4. 4.
    Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)CrossRefGoogle Scholar
  5. 5.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)Google Scholar
  6. 6.
    Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, USA (November 2002)Google Scholar
  7. 7.
    Keromytis, A., Misra, V., Rubenstein, D.: SOS: An Architecture for Mitigating DDoS Attacks. IEEE Journal on Selected Areas in Communications 22(1) (2004)Google Scholar
  8. 8.
    Murdoch, S., Danezis, G.: Low-Cost Traffic Analysis Of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 183–195 (May 2005)Google Scholar
  9. 9.
    Øverlier, L., Syverson, P.: Locating Hidden Servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, CA, USA, pp. 100–114 (May 2006)Google Scholar
  10. 10.
    Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection 16(4), 482–494 (1998)Google Scholar
  12. 12.
    Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA (2002)Google Scholar
  13. 13.
    Waldman, M., Mazieres, D.: Tangler: A Censorship-Resistant Publishing System Based on Document Entangnlements. In: Proceedings of the 8th ACM Conference on Computer and Communication Security, pp. 126–135 (November 2001)Google Scholar
  14. 14.
    Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending Anonymous Communication Against Passive Logging Attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, California, USA, pp. 28–43 (May 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Hakem Beitollahi
    • 1
  • Geert Deconinck
    • 1
  1. 1.Electrical Engineering DepartmentKatholieke Universiteit LeuvenLeuvenBelgium

Personalised recommendations