Skip to main content

Dummy Traffic against Long Term Intersection Attacks

  • Conference paper
  • First Online:
Privacy Enhancing Technologies (PET 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2482))

Included in the following conference series:

Abstract

In this paper we propose a method to prevent so called “intersection attacks” on anonymity services. Intersection attacks are possible if not all users of such a service are active all the time and part of the transfered messages are linkable. Especially in real systems, the group of users (anonymity set) will change over time due to online and off-line periods.

Our proposed solution is to send pregenerated dummy messages to the communication partner (e.g. the web server), during the user’s off-line periods.

For a detailed description of our method we assume a cascade of Chaumian MIXes as anonymity service and respect and fulfill the MIX attacker model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adam Back, Ulf Moller, and Anton Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Information Hiding, pages 245–257, 2001.

    Google Scholar 

  2. Oliver Berthold, Hannes Federrath, and Stefan Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies, volume 2009 of Lecture Notes in Computer Science, pages 115–129, Berkeley, CA, USA, July 2000. Springer-Verlag, Berlin Germany.

    Chapter  Google Scholar 

  3. O. Berthold, S. Clauβ, S. Köpsell, and A. Pfitzmann. Efficiency improvements of the private message service. In Information Hiding. 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25–27, 2001. Proceedings, ISBN: 3540427333, LNCS 2137, Springer, Berlin, 2001.

    Google Scholar 

  4. David L. Chaum. Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms. Communications of the ACM, 24(2), February 1981. Also availabel at http://world.std.com/~franl/crypto/chaum-acm-1981.html.

  5. David L. Chaum. Blind signature systems. Advances in Cryptology-CRYPTO’ 83, International Association for Cryptologic Research, North-Holland/Elsevier, 1983.

    Google Scholar 

  6. David A. Cooper and Kenneth Birman. Preserving privacy in a network of mobile computers. In IEEE Symposium on Security and Privacy, pages 26–38, May 1995. Also available at http://cs-tr.cs.cornell.edu/Dienst/UI/1.0/Display/ncstrl.cornell/TR95-1%490.

  7. D. Kesdogan, J. Egner, and R. Bueschkes. Stop-and-Go-MIXes providing probabilistic anonymity in an open system. Lecture Notes in Computer Science, 1525:83–98, 1998.

    Google Scholar 

  8. Jean-Francois Raymond. Traffic analysis: Protocols, attacks, design issues and open problems.

    Google Scholar 

  9. Michael K. Reiter and Aviel D. Rubin. Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1):66–92, 1998.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Berthold, O., Langos, H. (2003). Dummy Traffic against Long Term Intersection Attacks. In: Dingledine, R., Syverson, P. (eds) Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science, vol 2482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36467-6_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-36467-6_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00565-0

  • Online ISBN: 978-3-540-36467-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics