Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec. 2000.

Slides:



Advertisements
Similar presentations
Oct 15 th, 2009 OGF 27, Infrastructure Area: Status of FVGA-WG Status of Firewall Virtualization for Grid Applications - Working Group
Advertisements

Enabling Secure Internet Access with ISA Server
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
High Performance Computing Course Notes Grid Computing.
WEB SITE PROPOSAL Aziz Valliani San Antonio January 24-25, 1997 Aga Khan Education Board for the United States of America.
The Basic Authentication Scheme of HTTP. Access Restriction Sometimes, we want to restrict access to certain Web pages to certain users A user is identified.
Protect Yourself from Your Customer Kristin A. Stedman, AAP Senior Vice President Education Services 1 © 2014 TACHA. All Rights Reserved.
Module 5: Configuring Access for Remote Clients and Networks.
Network Layer and Transport Layer.
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
Slides for Grid Computing: Techniques and Applications by Barry Wilkinson, Chapman & Hall/CRC press, © Chapter 1, pp For educational use only.
Using Digital Credentials On The World-Wide Web M. Winslett.
1-2.1 Grid computing infrastructure software Brief introduction to Globus © 2010 B. Wilkinson/Clayton Ferner. Spring 2010 Grid computing course. Modification.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Application Layer. Applications A program or group of programs designed for end users. A program or group of programs designed for end users. Software.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
1 Enabling Secure Internet Access with ISA Server.
1 Outlook Live Live Messenger SkyDrive Office Live Live Spaces Live Groups.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Human-Computer Interface Course 5. ISPs and Internet connection.
Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
Staying Safe Online Keep your Information Secure.
CS 390- Unix Programming Environment CS 390 Unix Programming Environment Topics to be covered: Distributed Computing Fundamentals.
Protecting Students on the School Computer Network Enfield High School.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
© Chinese University, CSE Dept. Distributed Systems / Simple Example Open Microsoft Visual Studio 2005:
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Meng Yan. Introduction In fact, your online actions may be monitored by unauthorized parties logged and preserved for future access years later.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
1 Visalia Unified School District SRTS User Training November 21, 2005 By SRTS Support
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
CONTENTS  Definition And History  Basic services of INTERNET  The World Wide Web (W.W.W.)  WWW browsers  INTERNET search engines  Uses of INTERNET.
Web Server.
Detection and Mitigation of Spam in IP Telephony Networks using Signaling Protocol Analysis MacIntosh, R Vinokurov, D Advances in Wired and Wireless Communication,
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Distributed Computing & Embedded Systems Chapter 4: Remote Method Invocation Dr. Umair Ali Khan.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Internet Business Associate v2.0
WWW and HTTP King Fahd University of Petroleum & Minerals
Networking CS 3470, Section 1 Sarah Diesburg
Anonymous Communication
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
IS333D: MULTI-TIER APPLICATION DEVELOPMENT
Networking CS 3470, Section 1 Sarah Diesburg
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Anonymous Communication
Unit# 5: Internet and Worldwide Web
AbbottLink™ - IP Address Overview
Grid Computing Software Interface
Anonymous Communication
Presentation transcript:

Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec. 2000

Contents  Introduction  Problem Description  Research Objectives  Research Objectives  Literature Review  Research design  Research design  Data Analysis  Data Analysis  Schedule  Schedule  Facilities and Resources  Facilities and Resources  Deliverables  Deliverables  References  References

Introduction n My system consists of a dynamic collection of users, called a group, for users’ anonymity on the web transactions. n Group is a collection of large number of users from different geographical regions that collectively issues requests on behalf of its members.

Web transaction is a set of request, asking the web server for some service, and acknowledgment, which is the response to the request. With anonymity guaranteed, individuals would be able to participate in the Internet

contd…. revolution without being in fear that their every move was being recorded and information about them accumulated which might be used at a later date.

Problem Description In certain situation the need for anonymity in the Internet is considered to be entirely necessary, for example when a person who are trying to withdraw from social stigma like, victim of a sexual offense or alcoholic person or drug abuser wishing to share

contd… experiences with others, where an individual contemplating suicide wishing to consult specialist on-line help, or where person wishing to report a crime without any fear of being identified.

Research Objective: Users’ anonymity from the world-wide- web. Users’ anonymity from the world-wide- web. Freedom of speech and expression. Freedom of speech and expression.

Literature Review: The basic approach previously proposed for achieving anonymous web transactions was to interpose an additional party (a proxy) between the sender and the receiver to hide the sender’s identity from the receiver.

contd… Examples of such proxies include the Anonymizer ( and the Lucent Personalized Web Assistant

Research Design As mention above group is a collection of users. A user is represented in a group by a process in their own computer. When the process is started, it contacts the server to request admittance to the group. If admitted, the server

contd… reports to the process the current membership of the group and information that enables the process to participate in the group. The user selects this process as his/her web proxy by specifying its

contd… host name and port number in his/her web browser as the proxy for all services. Thus, any request coming from the browser is sent directly to the process on the user’s computer.

contd… contd…

contd… In the figure previous slide the possible paths are 1  5  server; 2  6  2  server; 3  1  6  server; 4  4  server; 5  4  6  server; and 6  3  server. Subsequent requests initiated at the same process follow the same path (except going to a different end server), and server replies traverse the same path as the requests, only in reverse.

contd… Group Membership: The membership maintenance procedures of a group are those procedures that determine who can join the group and when they can join, and that inform members of the group membership.

contd… Mechanism: To make use of the server and the group the user must establish an account with the server, i.e., an account name and password that the server stores.

contd… When the user starts a process, the process and the server use this shared password to authenticate each other’s communication. As a result of that communication (and if the server accepts the process into the group) the server adds the new process (i.e., its IP address, port number, and account name) to its list of members, and reports this list back to the process.

Data Analysis: Table next page shows the results of performance tests on implementation. It shows the mean latency in milliseconds of retrieving web pages of various sizes for various path lengths.

contd… contd… Path Length Page Size (Kbytes)

Schedule: Schedule: Literature review for group, network privacy - about three months Literature review for group, network privacy - about three months Design of code to Implementation users in the group - another two months Design of code to Implementation users in the group - another two months Testing the performance for different paths and for different browsers - another two months Testing the performance for different paths and for different browsers - another two months

Facilities and Special Resources: Web server that can maintain large number of members of the group. A good compiler language such as C to implement the code which is used to accept or reject the users into the group.

Deliverable: Deliverable: A novel approach to protecting users’ privacy while retrieving information on the world-wide-web is presented. Includes a project, which gives design of the group, collection of web users from diverse geographical region which retrieves information on its users’ behalf.

References: BRIER, S How to keep your privacy: Battle lines get clearer. New York Times (Jan. 13). CHAUM, D Untraceable electronic mail, return addresses, and digital pseudonyms. References: BRIER, S How to keep your privacy: Battle lines get clearer. New York Times (Jan. 13). CHAUM, D Untraceable electronic mail, return addresses, and digital pseudonyms.

contd… CRISTIAN, F Reaching agreement on processor group membership in synchronous distributed systems. GABBER, E GIBBONS, P., MAITIAS, Y., AND MAYER, A How to make personalized web browsing simple, secure, and anonymous.

Questions?