Download presentation
Presentation is loading. Please wait.
Published byGeorge O’Neal’ Modified over 6 years ago
1
Privacy Through Anonymous Connection and Browsing
By: Abdelhamid Elgzil Advisor: Dr. Chow 4:34 Put Oral Exam as title Remove Advisor: Dr. Chow and By:
2
Privacy Through Anonymous Connection and Browsing
Outline Introduction The Problem The Issue of Privacy and Anonymity TOR: The Onion Router Network VPN: Virtual Private Network Challenges and Controversy Conclusion Potential Research and Future Work 11/12/2018 Privacy Through Anonymous Connection and Browsing
3
Privacy Through Anonymous Connection and Browsing
Introduction Privacy and Anonymity are becoming a big concern for individuals and organizations Examine two technologies: The Onion Router (TOR) project for anonymous and security browsing by connecting through a series of virtual tunnels Virtual Private Network (VPN) to maintain privacy through the use of a tunneling protocol and security procedures 4:36 11/12/2018 Privacy Through Anonymous Connection and Browsing
4
Privacy Through Anonymous Connection and Browsing
The Problem Concern about improving privacy and security on the Internet Looking for new communication tools Built-in privacy features Help share information over public networks without compromising user’s privacy Protect user privacy while browsing the internet, to get connected to news sites, or avoid geo-blacking Help publish web sites and other services without exposing the location of the site Supporting socially sensitive communication Protecting against traffic analysis Source and destination information can lead to track the user behavior and interests, even connection is encrypted 4:37 List of the concrete concerns. Express political opions in oppressive government Geo-blacking? This is more a requirements not problem. 11/12/2018 Privacy Through Anonymous Connection and Browsing
5
Privacy Through Anonymous Connection and Browsing
The Problem TOR offers browsing anonymous TOR does not guarantee a complete anonymity Focus only on protecting the transfer of data User might need to use specific software to prevent the visited sites from revealing his identity information VPN is an Additional layer of protection Gain an tightened anonymity protection Hiding using of TOR as a communication tool Enable TOR use in geo-blocked regions Title -> TOR vs. VPN Need separate viewgraphs. Show a topology or components. Perhaps we should wait until TOR and VPN is introduced. Forward references. 11/12/2018 Privacy Through Anonymous Connection and Browsing
6
Privacy Through Anonymous Connection and Browsing
Privacy and anonymity Two different thoughts Both progressively essential as we get increasingly monitored and tracked Privacy Ability to keep some things to yourself Regardless of their impact to society Anonymity Desire to want people to see what you do, just not that it’s you doing it Anonymity extremely effective in promoting freedom of expression These needs should be discussed before the means for delivering them. TOR or VPN 11/12/2018 Privacy Through Anonymous Connection and Browsing
7
Privacy Through Anonymous Connection and Browsing
Privacy and anonymity The degree of privacy mostly linked to: Type of encryption utilized Computational capacity avail- able In some circumstances, threats against privacy and anonymity happen due to the absence of proper technology unintentionally Bugs, ISP Non-educated users More specific title. 11/12/2018 Privacy Through Anonymous Connection and Browsing
8
TOR: The Onion Router Network
Give history important facts 11/12/2018 Privacy Through Anonymous Connection and Browsing
9
Privacy Through Anonymous Connection and Browsing
TOR: Architecture 11/12/2018 Privacy Through Anonymous Connection and Browsing
10
Privacy Through Anonymous Connection and Browsing
How TOR Works Picture not sharp. 11/12/2018 Privacy Through Anonymous Connection and Browsing
11
Privacy Through Anonymous Connection and Browsing
How TOR Works 11/12/2018 Privacy Through Anonymous Connection and Browsing
12
Privacy Through Anonymous Connection and Browsing
How TOR Works 11/12/2018 Privacy Through Anonymous Connection and Browsing
13
Privacy Through Anonymous Connection and Browsing
VPN: AirVpn Servers 11/12/2018 Privacy Through Anonymous Connection and Browsing
14
VPN: AirVpn Server Locations
11/12/2018 Privacy Through Anonymous Connection and Browsing
15
Challenges and Controversy
Criminals could take advantage Anonymizers aren’t foolproof First and last routers are malicious or compromised OSP publish enough information about their workings, including node addresses Governments or other organizations block traffic Some single-proxy anonymizer services may log users’ IP addresses Be specific about specific papers. These 11/12/2018 Privacy Through Anonymous Connection and Browsing
16
Challenges and Controversy
Providing greater security VS. Performance Additional proxies and encryption increase overhead Performance overhead causes anonymization to slow users’ Internet access ISPs block nodes to control spam They block those used by anonymizers Browser complexity and the need to maintain browsing functionality could help proficient hackers sidestep anonymization Last bullet does not make sense. Cite where it is comes from. Sidestep anonymization mean defeat anonymizatoin. 11/12/2018 Privacy Through Anonymous Connection and Browsing
17
Challenges and Controversy
Cultural and legal challenges Legal challenge Some countries outlawing or could decide to prohibit the use of privacy tool They require all Internet providers to keep detailed access records The cultural issue The trend toward [openness on the Internet] The desire to privacy and Anonymous communication will drive the technology’s continued development and adoption Think Two or three things to help with legal/culture challenges. 11/12/2018 Privacy Through Anonymous Connection and Browsing
18
Privacy Through Anonymous Connection and Browsing
Conclusion Privacy and security are interconnected Almost impossible to achieve one without the other People and organizations need to have some level of anonymity Anonymity can be abused by some people, but should not be an excuse Privacy and anonymity are important in today’s information technology driven world Today, users aware of privacy and anonymity impacts This will have positive economic outcomes There is very little technical details (facts/solutions/techniques; both attacks and defense sides) in your presentation 11/12/2018 Privacy Through Anonymous Connection and Browsing
19
Potential Dissertation Research Tasks
Create TOR Emulator by leveraging Software-defined networking (SDN) Enhance packet marking techniques to efficiently trace the packet path within TOR network How to utilize SDN controller in cloud to detect the using of VM as a TOR relay, by analyzing the characteristics of TOR relay in virtualized environment Using TOR bridges or TOR proxy to hide the intention to connect to TOR (prevent others to detect your using of TOR) Add SDN slide before. For each task, ask why you need to carry out this tasks. What packet marking techniques you try to create? What aspect they are not good. Using SDN controller to detect or to avoid detection of using VM as TOR relay will be a task. Define TOR bridges/proxy in previous slides. What all these four tasks/ research contribution will bring. 11/12/2018 Privacy Through Anonymous Connection and Browsing
20
Privacy Through Anonymous Connection and Browsing
Questions? 11/12/2018 Privacy Through Anonymous Connection and Browsing
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.