Efficient Anonymous Group Communication

Total Page:16

File Type:pdf, Size:1020Kb

Efficient Anonymous Group Communication Efficient Anonymous Group Communication Vom Fachbereich Informatik der Technischen Universität Darmstadt genehmigte Dissertation zur Erlangung des akademischen Grades Doctor rerum naturalium (Dr. rer. nat.) Eingereicht von: Tim Grube geboren in Seeheim-Jugenheim Tag der Einreichung: 15. Mai 2018 Tag der Disputation: 10. Juli 2018 Erstreferent: Prof. Dr. Max Mühlhäuser Korreferent: Prof. Dr. Mathias Fischer Fachgebiet Telekooperation Fachbereich Informatik Technische Universität Darmstadt Hochschulkennziffer D 17 Darmstadt 2018 Tim Grube: Efficient Anonymous Group Communication, Darmstadt, Technische Universität Darmstadt Jahr der Veröffentlichung der Dissertation auf TUprints: 2018 Veröffentlicht unter CC BY-NC-ND 4.0 International https://creativecommons.org/licenses/ Things are only impossible until they’re not. — Captain Jean-Luc Picard, Star Trek: The Next Generation, “When The Bough Breaks” (1988) Dedicated to the loving memory of my father Volker Grube 1958 – 2007 ABSTRACT This dissertation addresses the important challenge of efficiency in anonymous communication. Solving this challenge is essen- tial to provide anonymity in group communication. Every exchanged message leaks metadata: this information de- scribes the communication itself with, among others, sender, re- cipients, frequency of the communication. While the law pro- tects this information, it is often published and misused with consequences for the participants of the communication—often consequences particular for the senders of information. Anonymous communication systems like Tor break the link be- tween senders and recipients of messages and diminish emerg- ing metadata. However, their design requires duplicating mes- sages for all recipients early, mostly at the sender itself. With that, the system has to handle an unnecessary burden of pro- cessing identical messages. This dissertation contributes a novel mechanism that establishes communication groups such that the message duplication is pushed as close to the recipients as pos- sible. This dissertation also shows that this efficiency improve- ment does not come at costs of anonymity. Moreover, the group establishment mechanism increases the robustness of the com- munication against users that leave and join the communication system. To encounter the additional information leakage, dif- ferent mechanisms to share routing information are introduced and discussed under the angle of efficiency and anonymity. To also protect senders of messages, this dissertation adapts Dining- Cryptographer networks to enable sender anonymity with an adjustable trade-off between efficiency and anonymity. contributions The scientific contributions of this disserta- tion fall into the following categories: 1. Efficient Communication Overlays: A novel overlay establish- ment mechanism is presented. This mechanism adapts Ant Colony Optimization (ACO) to connect senders and recip- ients with a reduced number of connections while the anonymity remains stable. 2. Reliable Communication under Churn: Churn often disrupts communication overlays, this thesis proposes a mechanism to counter this disruptions and increase the robustness of the communication. For that, the ACO-based mechanism utilizes residual pheromones to reconnect subjects to the communication overlay. 3. Routing Information Exchange considering Efficiency and Anonymity: Four methods to share routing information, namely successor lists, successor lists with multi-layer en- cryption, Bloom filters, and distributed lookup tables, are introduced into the anonymous communication setting, discussed and evaluated with respect to their properties concerning efficiency and anonymity. 4. Efficient and Effective Sender Protection: A novel mechanism based on asymmetric dining-cryptographer networks (ADC- nets) is proposed to improve the efficiency of sender pro- tection without degrading anonymity over time. Moreover, the trade-off between efficiency and anonymity can be con- trolled. evaluation The developed mechanisms have been exten- sively evaluated using a combination of simulations and formal arguments. For this evaluation, a graph-based simulation model has been developed enabling to analyze the improvement of the ACO-based communication overlays over conventional overlays. An extensive simulation identified valuable parameter combina- tions for the ACO mechanism, leading to communication over- lays with an efficiency improvement of up to 40%. This efficiency improvement increases the communication delay only by up to 2 extra hops. The calculation of the achieved anonymity degree in- dicates no loss of anonymity in comparison to conventional over- lays; even more, the anonymity degree does even improve. Un- der churn, the robustness of the communication also increases by 30% in comparison to conventional overlays. The four approaches to routing information exchange are discussed and compared using formal arguments. The evalua- tion enables to select the appropriate mechanism based on the requirements for memory and communication efficiency and anonymity for the desired application scenario. The novel adapted ADCnets enable sender anonymity with configurable efficiency and anonymity. As such, they are supe- rior to current approaches implementing cover traffic. A simu- lation study shows that cover traffic randomization improves ef- ficiency at the cost of anonymity. The proposed ADCnets have been evaluated using formal arguments that demonstrate the efficiency improvement and the preservation of anonymity. As both efficiency and anonymity are conflicting, they cannot be achieved at the same time; however, the proposed ADCnets en- able to balance efficiency and anonymity to the requirements of the application scenario. ZUSAMMENFASSUNG Diese Dissertation adressiert die Steigerung der Effizienz anony- mer Kommunikation um diese massentauglich zu machen. Bei jeglicher Kommunikation entstehen Metadaten, welche den Prozess des Nachrichtenaustausches beschreiben, beispiels- weise mit Informationen zu Sender, Empfängern, sowie der In- tensität der Kommunikation. Metadaten sind durch Gesetze ge- schützt, trotzdem werden sie immer wieder veröffentlicht und unbefugt genutzt mit oft unerwünschten Konsequenzen – insbe- sondere für den Sender der Informationen. Anonyme Kommunikationssysteme wie zum Beispiel Tor re- duzieren Metadaten: durch die Weiter- und Umleitung der Nachrichten wird die „sichtbare“ Verbindung zwischen Sen- der und den Empfängern unterbrochen. Aufbau und Funktions- weise anonymer Kommunikationssysteme erfordert zumeist die frühzeitige Duplikation versendeter Nachrichten für jeden ein- zelnen Empfänger; in der Regel erfolgt die Duplikation durch den Sender selbst. Hierdurch entsteht eine unnötige Menge iden- tischer Nachrichten im Kommunikationssystem. Es wird ein neuer Mechanismus zur Erstellung effizienterer Kommunikati- onsstrukturen eingeführt; dieser verschiebt die Duplikation der Nachrichten so nah wie möglich an die Empfänger. Es wird gezeigt, dass die daraus resultierende Effizienzsteigerung nicht zu Lasten der Anonymität geht. Neben der Effizienzsteigerung wird auch die Robustheit gegenüber Nutzern gesteigert, die das System dynamisch verlassen und es wieder betreten. Hierdurch müssen Routing-Informationen häufiger ausgetauscht werden; um dem zu begegnen werden verschiedene Verfahren aus den Blickwinkeln Effizienz und Anonymität betrachtet. Zuletzt führt diese Dissertation ein neues Verfahren zum Schutz der Sendera- nonymität ein; hierfür werden Dining-Cryptographer Netzwer- ke (DC-Netze) angepasst und deren Effizienz gesteigert. Das Ver- fahren ermöglicht die dynamische Abwägung von Effizienz und Anonymität. beiträge Die wissenschaftlichen Beiträge dieser Dissertation sind in die folgenden Kategorien eingeordnet: 1. Effiziente Kommunikationsstrukturen: Basierend auf Ameisenkolonie-Optimierung (ant colony optimization, ACO) werden effizientere Kommunikationsstrukturen erstellt, welche die Anzahl involvierter Verbindungen minimieren; hierdurch wird die Anonymität nicht beein- trächtigt. 2. Robuste Kommunikation: Dynamische Teilnehmer (churn) unterbrechen Kommunikationsstrukturen regelmäßig. Um diesen Unterbrechungen entgegenzutreten wird das eta- blierte Wissen (d.h. die Pheromone der Ameisen) genutzt um Teilnehmer schneller wieder mit der Kommunikations- gruppe zu verbinden. 3. Austausch von Routing-Informationen: Es werden vier Me- thoden zum Austausch von Routing-Informationen vorge- stellt: Pfadlisten mit und ohne mehrschichtige Verschlüs- selung, Bloom-Filter und verteilte Suchtabellen. Diese wer- den diskutiert und bezüglich ihrer Effizienz- und Anony- mitätseigenschaften beurteilt. 4. Effizienter und effektiver Schutz von Sendern: Basierend auf dem Konzept asymmetrischer DC-Netze (ADC-Netze) wird ein Verfahren zum effizienteren Schutz der Anonymität der Sender eingeführt. Dieses Verfahren verhindert die Be- einträchtigung der Anonymität im Verlauf der Zeit. Zu- dem ermöglicht es eine dynamische Abwägung von Effi- zienz und Anonymität. auswertung Die entwickelten Mechanismen wurden mit Hilfe einer Kombination von Simulationen und formaler Dis- kussion ausgewertet. Für diese Evaluation wurde ein Graph- basiertes Simulationsmodell entwickelt und implementiert. Da- bei wurden die ACO-basierten Kommunikationsstrukturen mit konventionellen Kommunikationsstrukturen verglichen. Eine ausführliche Simulation bewertete relevante Konfigurationspa- rameter des ACO-Verfahrens; dies führte zu Kommunikationss- trukturen die bis zu 40% effizienter sind. Zudem konnte gezeigt werden, dass die Verzögerung,
Recommended publications
  • Low-Cost Traffic Analysis Of
    Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk Abstract Other systems, based on the idea of a mix, were de- veloped to carry low latency traffic. ISDN mixes [33] Tor is the second generation Onion Router, supporting propose a design that allows phone conversations to be the anonymous transport of TCP streams over the Inter- anonymised, and web-mixes [6] follow the same design pat- net. Its low latency makes it very suitable for common terns to anonymise web traffic. A service based on these tasks, such as web browsing, but insecure against traffic- ideas, the Java Anon Proxy (JAP)1 has been implemented analysis attacks by a global passive adversary. We present and is running at the University of Dresden. These ap- new traffic-analysis techniques that allow adversaries with proaches work in a synchronous fashion, which is not well only a partial view of the network to infer which nodes are adapted for the asynchronous nature of widely deployed being used to relay the anonymous streams and therefore TCP/IP networks [8]. greatly reduce the anonymity provided by Tor. Furthermore, The Onion Routing project has been working on stream- we show that otherwise unrelated streams can be linked level, low-latency, high-bandwidth anonymous communi- back to the same initiator. Our attack is feasible for the cations [35]. Their latest design and implementation, adversary anticipated by the Tor designers. Our theoreti- Tor [18], has many attractive features, including forward se- cal attacks are backed up by experiments performed on the curity and support for anonymous servers.
    [Show full text]
  • Privacy As Security
    Privacy as Security Dr George Danezis Microsoft Research, Cambridge, UK. [email protected] Dr George Danezis Privacy as Security Key Thesis and Outline What is this talk about? I Explore the relations between notions of `privacy' and `traditional security'. I Key thesis: Privacy is better understood as security! How do we proceed? I Introduction to Privacy. I Revisiting security/privacy properties. Dr George Danezis Privacy as Security Scope Ground rules of this talk: I High-level: keep out the very technical details. Implementation issues, system specific, cryptography, statistics, standards. I Focus on technology and technology policy. There is also law, sociology, political science, and politics. I Look at privacy in the context of computer security Security properties, adversary models, security policies, . I A clear focus on the real world and its constraints. Dr George Danezis Privacy as Security Caricature of the debate: Security or Privacy \Privacy" important but. I . what about abuse and accountability? I . difficulties for Law Enforcement? I . copyright or libel? I (. what does a good, honest person has to hide anyway?) Established wisdom: I Need for a balance... I Control/limit dangerous technology (or research). I Result: Surveillance by design ! no privacy (often). Caricature conclusion: Security is most important! Dr George Danezis Privacy as Security Security and Privacy in Context A brief history of security, and where does privacy fit? I Early days (Pre-1970s): Security for the Government and Military. Focus on confidentiality properties. Some work on Tamper resistance, signal intelligence, . Keep secrets using computer security. I 70s to 90s: Commercial security and security for enterprises.
    [Show full text]
  • Walking Onions: Scaling Distribution of Information Safely in Anonymity Networks
    Walking Onions: Scaling Distribution of Information Safely in Anonymity Networks by Chelsea Holland Komlo A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Masters of Mathematics in Computer Science Waterloo, Ontario, Canada, 2020 c Chelsea Holland Komlo 2020 Author’s Declaration This thesis consists of material all of which I authored or co-authored: see Statement of Con- tributions included in the thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Statement of Contributions Walking Onions first originated as a Tor proposal authored by Nick Mathewson [Mat20c], who is a co-author of this work. In this original proposal, Nick proposed the concept of ENDIVEs and SNIPs, as well as the concept of one protocol variant presented in this work which we call Telescoping Walking Onions. Additionally this proposal introduced the concept of bootstrapping using a circuit through a directory cache. Our collaboration on the published version of Walking Onions has since been accepted to the USENIX Security Symposium [KMG20]. In his capacity as co-author of our joint work, Nick created the framework for our bandwidth and CPU performance analysis, and used this framework to assess the performance of Telescop- ing Walking Onions relative to Idealized Tor. Nick also wrote the python script for our real numbers analysis, which we use to compare the performance of Walking Onions in actualized estimates against a simplified Tor-like network.
    [Show full text]
  • Using Onion Routing to Secure Peer-To-Peer Supported Business
    Using Onion Routing to Secure Peer-to- Peer Supported Business Collaboration Fabian STÄBER, Udo BARTLANG, Jörg P. MÜLLER Siemens AG, Corporate Technology, Information and Communications Otto-Hahn-Ring 6, Munich, D-81739, Germany Tel: +49 (0)89 636-41619, Fax: +49 (0)89 636-41423 e-mail: {fabian.staeber, udo.bartlang, joerg.p.Mueller}[email protected] Abstract: Peer-to-Peer computing provides reliable self-organizing adaptable architectures, fitting perfectly as a foundation for enabling enterprises to seamlessly inter-operate with one another in a loosely coupled fashion. However, the absence of hierarchical structures in P2P architectures raises security challenges, especially in scenarios that are of “co-opetitive” nature, i.e., where the involved business partners may be cooperating and competing, at the same time, and where there is only limited trust between the partners. This paper addresses some of these security issues. We propose an approach using onion routing, which is a well known algorithm, originally used for anonymous email communication. We present a real-world use case regarding business integration in the automotive industry, and show how onion routing can be integrated into our peer-to-peer platform to meet the security requirements of business collaboration environments. 1. Introduction Over the past few years, the peer-to-peer paradigm received broad attention in academic research and industry. Offering easy to use plug-and-play networks in combination with resilience, reliability, and the capability of decentral management and loosely coupled control, peer-to-peer systems have become target platforms for a growing number of applications, ranging from Internet file sharing over IP telephony to distributed corporate information management.
    [Show full text]
  • Air Force Institute of Technology
    to A TAXONOMY FOR AND ANALYSIS OF ANONYMOUS COMMUNICATIONS NETWORKS DISSERTATION Douglas Kelly, GG-14 AFIT/DCS/ENG/09-08 AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED The views expressed in this dissertation are those of the author and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the U.S. Government. A TAXONOMY FOR AND ANALYSIS OF ANONYMOUS COMMUNICATIONS NETWORKS DISSERTATION Presented to the Faculty Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Douglas J. Kelly, BS, MS, MBA March 2009 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/DCS/ENG/09-08 A TAXONOMY FOR AND ANALYSIS OF ANONYMOUS COMMUNICATIONS NETWORKS DISSERTATION Douglas J. Kelly, BS, MS, MBA Approved: __________//SIGNED//________________ _16 Mar 09_ Dr. Richard A. Raines (Chairman) Date __________//SIGNED//________________ _16 Mar 09_ Dr. Barry E. Mullins (Member) Date __________//SIGNED//________________ _16 Mar 09_ Dr. Rusty O. Baldwin (Member) Date __________//SIGNED//________________ _16 Mar 09_ Dr. Michael R. Grimaila (Member) Date Accepted: __________//SIGNED//________________ _18 Mar 09_ Dr. M. U. Thomas Date Dean, Graduate School of Engineering and Management - iii - AFIT/DCS/ENG/09-08 Abstract Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand.
    [Show full text]
  • Covert Channel Vulnerabilities in Anonymity Systems
    UCAM-CL-TR-706 Technical Report ISSN 1476-2986 Number 706 Computer Laboratory Covert channel vulnerabilities in anonymity systems Steven J. Murdoch December 2007 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom phone +44 1223 763500 http://www.cl.cam.ac.uk/ c 2007 Steven J. Murdoch This technical report is based on a dissertation submitted August 2007 by the author for the degree of Doctor of Philosophy to the University of Cambridge, Girton College. Technical reports published by the University of Cambridge Computer Laboratory are freely available via the Internet: http://www.cl.cam.ac.uk/techreports/ ISSN 1476-2986 Covert channel vulnerabilities in anonymity systems Steven J. Murdoch Summary The spread of wide-scale Internet surveillance has spurred interest in ano- nymity systems that protect users’ privacy by restricting unauthorised access to their identity. This requirement can be considered as a flow control policy in the well established field of multilevel secure systems. I apply previous re- search on covert channels (unintended means to communicate in violation of a security policy) to analyse several anonymity systems in an innovative way. One application for anonymity systems is to prevent collusion in compe- titions. I show how covert channels may be exploited to violate these pro- tections and construct defences against such attacks, drawing from previous covert channel research and collusion-resistant voting systems. In the military context, for which multilevel secure systems were designed, covert channels are increasingly eliminated by physical separation of intercon- nected single-role computers. Prior work on the remaining network covert channels has been solely based on protocol specifications.
    [Show full text]
  • Security Threats and Attacks on Tor
    Security Threats and Attacks on Tor Maria Khan, Muhammad Saddique, Muhammad Zohaib Umar Pirzada, Afzaal Ali, Bilal Wadud Electrical and Electronics Engineering Department Cecos University of IT & Emerging Sciences Near East University, North Cyprus Peshawar, Pakistan [email protected] [email protected] Imran Ahmad Faculty of Computing, Riphah International University Lahore, Pakistan [email protected] Additional systems were also developed on the as- sumption that a mix will take low latency traffic. To Abstract anonymize the conversation of phone calls ISDN mixes [10], is designed, and for anonym zing web-mixes [12], The Internet is in use nowadays all over the it also follows the same pattern. At the University of world. While using the Internet, the identi- Dresden the Java Anon Proxy (JAP) is based on this ties of the sender and receiver are not hid- idea and it is fulfilled and running. den; to hide the sender and receiver iden- tities anonymous communication was intro- Tor is a connected network for anonymizing TCP duced. There are many anonymous commu- streams over the Internet [1]. It can report boundaries nication systems developed but, the Onion in design of previous Onion Routing [2-5], by build- Router (Tor) is the most deployed anonymous ing up unspoiled forward confidentiality, then bottle- communication system that provides online neck control, then data purity or integrity, then cus- anonymity and privacy. There are vast se- tomizable exit policies, then index servers, and then curity threats/attacks on Tor that are to be location-hidden services using meeting points. Tor considered.
    [Show full text]
  • Privacy Enhancing Technologies for the Internet III: Ten Years Later
    Privacy Enhancing Technologies for the Internet III: Ten Years Later Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo Waterloo, ON [email protected] 1 Introduction In 1997 with Wagner and Brewer, and again in 2002, we looked at the then-current state of privacy-enhancing technologies (PETs) for the Internet. [27, 26] Now, in 2007, we take a third look. Technologies to help users maintain their privacy online are as important today as ever before—if not more so. Identity theft is the fastest-growing crime in the US today [47] and it is all too easy for would-be identity thieves to harvest personal information from the online trails Internet users leave every day. Losses of large databases of personal information are an almost daily occurrence [2]; for example, retailers’ servers are penetrated [44], databases are traded between government and private companies [36] and laptops containing social security numbers are stolen [35]. In 1997, we discussed the dossier effect: all available information about a person gets cross-referenced, and the resulting dossier ends up being used for many purposes, lawful and not. This practice has expanded over the years; the companies that compile and sell these dossiers are known as data brokers. Choicepoint is a prime example—in 2005, this data broker sold dossiers on over 150,000 Americans to a group of criminals. [10] The PETs we discuss here give people a way to control how much of their personal information is revealed when they use the Internet. By controlling the spread of this information, they can limit the size of the data brokers’ dossiers about them.
    [Show full text]
  • Anonymity Network Tor and Performance Analysis of ‘ARANEA’ – an IOT Based Privacy-Preserving Router AKM Bahalul Haque, Sharaban Tahura Nisa, Md
    Anonymity Network Tor and Performance Analysis of ‘ARANEA’ – an IOT Based Privacy-Preserving Router AKM Bahalul Haque, Sharaban Tahura Nisa, Md. Amdadul Bari, Ayvee Nusreen Anika ​ [email protected], [email protected] , [email protected], [email protected] Abstract There was a time when the word “security” was only confined to the physical protection of things that were valuable which must be guarded against all the odds. Today, in a world where people can do things virtually have emerged the necessity to protect the virtual world. Every single facet of our life is being controlled by the internet one way or another. There is no privacy in the cyberspace as the data which we are browsing on the internet is being monitored on the other side by someone. Each work we are doing on the internet is getting tracked or the data are getting leaked without consent. To browse the internet securely we developed a router named Aranea which relates to the browser Tor. Tor gives traffic anonymity and security. The Tor browser can be used in both positive and negative purpose. Tor encrypts data, it hides the location and identity of the user, it hides the IP address of the device, it hides the network traffic and many more. By using Tor browser each user can browse the internet safely in the cyber world. Our goal is to create an additional security bridge through the router Aranea for every user so that each user can simply browse the internet anonymously. Introduction Privacy on the internet is a major concern nowadays.
    [Show full text]
  • Tor: the Second-Generation Onion Router
    Tor: The Second-Generation Onion Router Roger Dingledine Nick Mathewson Paul Syverson The Free Haven Project The Free Haven Project Naval Research Lab [email protected] [email protected] [email protected] Abstract vulnerable to a single hostile node recording traffic and later compromising successive nodes in the circuit and forcing We present Tor, a circuit-based low-latency anonymous them to decrypt it. Rather than using a single multiply en- communication service. This second-generation Onion crypted data structure (an onion) to lay each circuit, Tor Routing system addresses limitations in the original design. now uses an incremental or telescoping path-building de- Tor adds perfect forward secrecy, congestion control, direc- sign, where the initiator negotiates session keys with each tory servers, integrity checking, configurable exit policies, successive hop in the circuit. Once these keys are deleted, and a practical design for rendezvous points. Tor works subsequently compromised nodes cannot decrypt old traf- on the real-world Internet, requires no special privileges or fic. As a side benefit, onion replay detection is no longer kernel modifications, requires little synchronization or co- necessary, and the process of building circuits is more reli- ordination between nodes, and provides a reasonable trade- able, since the initiator knows when a hop fails and can then off between anonymity, usability, and efficiency. We briefly try extending to a new node. describe our experiences with an international network of Separation of “protocol cleaning” from anonymity: more than a dozen hosts. We close with a list of open prob- Onion Routing originally required a separate “applica- lems in anonymous communication.
    [Show full text]
  • Tehnologije Za Zagotavljanje Anonimnosti Na Internetu
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Digital library of University of Maribor UNIVERZA V MARIBORU FAKULTETA ZA ELEKTROTEHNIKO, RACUNALNIˇ STVOˇ IN INFORMATIKO Matic Koneˇcnik TEHNOLOGIJE ZA ZAGOTAVLJANJE ANONIMNOSTI NA INTERNETU Magistrsko delo Maribor, julij 2018 TEHNOLOGIJE ZA ZAGOTAVLJANJE ANONIMNOSTI NA INTERNETU Magistrsko delo Student:ˇ Matic Koneˇcnik Studijskiˇ program: Magistrski ˇstudijskiprogram Informatika in tehnologije komuniciranja Mentor: doc. dr. Marko H¨olbl Somentorica: asist. dr. Lili Nemec Zlatolas Lektor: Drago Megliˇc,prof. slovenˇsˇcine Tehnologije za zagotavljanje anonimnosti na internetu Kljuˇcnebesede: anonimnost, anonimizacijske tehnologije, Tor, vtiˇcnik,internet UDK: 004.62:004.77(043.2) Povzetek Internet je nepogreˇsljivin kljuˇcnidel sodobnega ˇzivljenja;posamezniki ga uporabljajo za iskanje informacij, branje novic, komuniciranje, nakupovanje in uporabo storitev e-uprave. V zadnjih letih pa se je poveˇcalatudi skrb glede anonimnosti uporabnikov na internetu, saj ˇzelijov veliki meri prepreˇcitizlorabe in razliˇcnanadlegovanja. Vse to kaˇzena poveˇcanopotrebo po anonimizacijskih orodjih in tehnikah. Eno takˇsnihje odprtokodno programsko orodje Tor, ki je trenutno najbolj priljubljeno med uporabniki in zagotavlja visoko stopnjo anonimnosti. V sklopu magistrske naloge smo izvedli anketni vpraˇsalnikin ugotovili, da je anonimnost na internetu za uporabnike zelo pomembna lastnost ter da uporabljajo tehnike anonimnosti predvsem zato, da bi zaˇsˇcitilisvoje osebne podatke in poveˇcalivarnost. Zato smo izdelali vtiˇcnikza Google Chrome, ki uporabnike med brskanjem opozarja o pomanjkljivih nastavitvah brskalnika, povezanih z njihovo zasebnostjo. I Internet anonymization technologies Key words: anonymity, anonymization technologies, Tor, plugin, internet UDK: 004.62:004.77(043.2) Abstract The internet is indispensable and a key part of modern life, which individuals use to find information, read news, communicate, shop and use e-government services.
    [Show full text]
  • How Alice and Bob Meet If They Don't Like Onions
    How Alice and Bob meet if they don’t like onions Survey of Network Anonymisation Techniques Erik Sy 34th Chaos Communication Congress, Leipzig Agenda 1. Introduction to Anonymity Networks Anonymity Strategies Towards Anonymity Adversaries 2. Anonymous Communication Networks I2P Freenet GNUnet JonDonym 3. Research Work 4. Conclusion 2 Anonymity Anonymity is the state of being not identifiable within a set of subjects, the an- onymity set. Andreas Pfitzmann 3 Sender Anonymity The sender may be anonymous only within a set of potential senders. 4 Recipient Anonymity The recipient may be anonymous only within a set of potential recipients. 5 Sender Recipient Anonymity 6 Unlinkability Unlinkability of two or more items of interest from an attacker’s perspective means that within the system, the attacker cannot sufficiently distinguish whe- ther these subjects are related or not. Pfitzmann, Hansen 7 Relationship Anonymity Alice can be linked to Bob. 8 Relationship Anonymity Traffic analysis • pattern in size of packets • pattern in timing of packets • content of messages • ... Alice cannot be linked to Bob. 9 Who do you trust? Strategies Towards Anonymity • Cover traffic • Broadcasting messages • Trusted third party (VPN, Proxy) • Shuffling and delaying of messages (mix, anonymous remailer) • Anonymity systems that distribute trust – Secure multi-party computation (DC-Nets) – Cascades of mixes – Onion routing – Garlic routing – ... 11 One-hop Mix 12 Onion Routing 13 Garlic Routing • Peer-to-peer • Uni-directional channels • Messages can be bundled • Uses layers of encryption 14 Adversaries External Adversary 16 Internal Adversary 17 Passive Adversary 18 Active Adversary 19 Local Adversary 20 Global Adversary 21 Anonymous Communication Networks Anonymous Communication Networks (ACNs) • Many defunct, unimplemented or unavailable networks exist – Conflux – MorphMix – Herbivore –..
    [Show full text]