An Introduction to Privacy and Anonymous Communication PV Rajkumar Research Scholar
Anonymous and privacy communication Outline Privacy and Traffic Analysis Anonymous Communication Onion Routing Attacks Over Anonymity Anonymous and privacy communication 11/19/2018
Privacy and Traffic Analysis - Ability to protect information about himself Traffic Analysis - Intercepting and Examining messages - Reveals identity of communicating systems - Information about size and frequency of data transfer are Identified Anonymous and privacy communication 11/19/2018
Anonymous and privacy communication Potential Threats IP Based Blocking - Hide some portion of information based on IP. It may marketing research. IP Based Cloaking - Showing different content based on IP Information Leakage - Corporate Information - Defense Information Anonymous and privacy communication 11/19/2018
Anonymous Communication Anonymity Keeping the Identity of Communicating Parties Secret Methods Broadcast Based Proxy or Series of Proxies Mix-net Anonymous and privacy communication 11/19/2018
Anonymous and privacy communication Onion Routing Basic Components - Application proxy - Onion proxy - Logically connected distributed Onion Routers (Onion Network) - Entry point - Exit point Anonymous and privacy communication 11/19/2018
Anonymous and privacy communication Onion Routing Onion Network Construction Onion Structure Anonymous and privacy communication 11/19/2018
Anonymous and privacy communication Onion Routing Anonymous Connection Establishment Generic Cell Format Anonymous and privacy communication 11/19/2018
Anonymous and privacy communication Onion Routing Commands -Padding -Create -Data -Destroy Configurations -Firewall Configuration -Remote Proxy Configuration Anonymous and privacy communication 11/19/2018
Attacks Over Anonymity Passive Attacks -Listing and Analyzing the on going traffic Active Attacks -Sending Special Cell - Marking Anonymous and privacy communication 11/19/2018
Anonymous and privacy communication References Michael, Paul and David “Anonymous Connections and Onion Routing”, IEEE Journal on Selected Areas in Communication Volume 14, No.4, May 1998 Michael K. Reiter and Aviel D. Rubin “Anonymity for Web Transactions”, ACM Transactions on Information and System Security, volume 1, pages 66–92, 1998. D Chaum. “The dining cryptographers problem: Unconditional sender and recipient untraceability.” Journal of Cryptology, Volume 1 :65–75, 1988. WWW.Anonymizer.com Anonymous and privacy communication 11/19/2018