Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory.

Slides:



Advertisements
Similar presentations
Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University.
Advertisements

A Formal Analysis of Onion Routing 10/26/2007 Aaron Johnson (Yale) with Joan Feigenbaum (Yale) Paul Syverson (NRL)
Correctness of Gossip-Based Membership under Message Loss Maxim GurevichIdit Keidar Technion.
Power Laws By Cameron Megaw 3/11/2013. What is a Power Law?
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
RESILIENCE NOTIONS FOR SCALE-FREE NETWORKS GUNES ERCAL JOHN MATTA 1.
CWI PNA2, Reading Seminar, Presented by Yoni Nazarathy EURANDOM and the Dept. of Mechanical Engineering, TU/e Eindhoven September 17, 2009 An Assortment.
1 Connectivity Structure of Bipartite Graphs via the KNC-Plot Erik Vee joint work with Ravi Kumar, Andrew Tomkins.
Low Randomness Rumor Spreading via Hashing He Sun Max Planck Institute for Informatics Joint work with George Giakkoupis, Thomas Sauerwald and Philipp.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
Emergence of Scaling in Random Networks Barabasi & Albert Science, 1999 Routing map of the internet
Analysis of Network Diffusion and Distributed Network Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization.
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
The Barabási-Albert [BA] model (1999) ER Model Look at the distribution of degrees ER ModelWS Model actorspower grid www The probability of finding a highly.
Sampling from Large Graphs. Motivation Our purpose is to analyze and model social networks –An online social network graph is composed of millions of.
1 Analysis of Link Reversal Routing Algorithms Srikanta Tirthapura (Iowa State University) and Costas Busch (Renssaeler Polytechnic Institute)
Network analysis and applications Sushmita Roy BMI/CS 576 Dec 2 nd, 2014.
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA IDRWS 2004.
Peer-to-Peer and Social Networks Introduction. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network.
Modeling Data-Centric Routing in Wireless Sensor Networks Bhaskar Krishnamachari, Deborah Estrin, Stephan Wicker.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Information Networks Power Laws and Network Models Lecture 3.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Prentice Hall 5.4 Fundamental Theorem of Calculus.
University of California at Santa Barbara Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Zhao.
1 Enabling Large Scale Network Simulation with 100 Million Nodes using Grid Infrastructure Hiroyuki Ohsaki Graduate School of Information Sci. & Tech.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
1 Contact Prediction, Routing and Fast Information Spreading in Social Networks Kazem Jahanbakhsh Computer Science Department University of Victoria August.
1 Algorithmic Performance in Complex Networks Milena Mihail Georgia Tech.
Distributed Computing Rik Sarkar. Distributed Computing Old style: Use a computer for computation.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Network Characterization via Random Walks B. Ribeiro, D. Towsley UMass-Amherst.
Optimisation des DHT à partir des propriétés physiques, logiques et sociologiques des clients Pierre Fraigniaud CNRS LRI, Univ. Paris-Sud
Complex Networks First Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
6.896: Probability and Computation Spring 2011 Constantinos (Costis) Daskalakis lecture 3.
1 “Expansion” in Power Law and Scale Free Graphs Milena Mihail Georgia Tech with Christos Gkantsidis, Christos Papadimitriou and Amin Saberi.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks Presented by Neeraj Agrawal, Zifei Zhong.
L – Modelling and Simulating Social Systems with MATLAB Lesson 6 – Graphs (Networks) Anders Johansson and Wenjian Yu (with S. Lozano.
4 Introduction Semi-Structure Routing Framework System Model Performance Analytical Framework Simulation 6 Conclusion.
Class 9: Barabasi-Albert Model-Part I
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Introduction to compact routing Dmitri Krioukov UCSD/CAIDA 3 rd CAIDA-WIDE Workshop.
Measuring Behavioral Trust in Social Networks
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Social Networking: Large scale Networks
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Online Social Networks and Media Absorbing random walks Label Propagation Opinion Formation.
COMMUNICATING VIA FIREFLIES: GEOGRAPHIC ROUTING ON DUTY-CYCLED SENSORS S. NATH, P. B. GIBBONS IPSN 2007.
ICDCS 05Adaptive Counting Networks Srikanta Tirthapura Elec. And Computer Engg. Iowa State University.
1 Milena Mihail Georgia Tech. Algorithmic Performance in Complex Networks.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Data Center Network Architectures
Analysis of Link Reversal Routing Algorithms
Student: Fang Hui Supervisor: Teo Yong Meng
Department of Computer Science University of York
Jellyfish: Networking Data Centers Randomly
Lecture 2: Complex Networks
Properties and applications of spectra for networks
Modeling Entropy in Onion Routing Networks
Key amplification in unstructured networks
Presentation transcript:

Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory

Basic aim We present a mix network topology that is based on social networks We would like to analyze the anonymity such networks provide under a high- latency assumption.

A plausible setting – High latency mix network consider the live-journal network of friendship ties. assume that sometime in the future, users have a live-journal client that can run a mix. users publish their mix keys on their site. senders select routes from this topology.

theoretical anonymity bounds in this case? Path selection is abstracted as a random walk. Mixing rate on scale-free graphs – steps in which the random walk converges to the Markov chain stationary distribution.

Applying results from spectral graph theory of BA scale- free networks (Mihail et.al. 2005) we find that conductance is a constant for all scalefree graphs with d min >=2.

Example Consider an expander graph of size 1000 with 40links per node (gives you good expansion properties) The fundamental limit of how quickly a network can mix depends on 2 >= In a social network using a BA-scalefree model we have for 1000 nodes with 4 edges per node 2 >= steps for expander vs 8-10 for a scalefree graph.

Conclusions RW on social networks based on BA scalefree graphs will take longer to converge, but you’ll get there. We have applied results from graph theory of skewed degree topologies to throw light on how anonymity on these networks may be analyzed. Further evaluation of anonymous communication over social networks should be exciting!

Definitions