Abstract | ||
---|---|---|
Popular anonymous communication systems often require sending packets through a sequence of relays on dilated paths for strong anonymity protection. As a result, increased end-to-end latency renders such systems inadequate for the majority of Internet users who seek an intermediate level of anonymity protection while using latency-sensitive applications, such as Web applications. This paper serves to bridge the gap between communication systems that provide strong anonymity protection but with intolerable latency and non-anonymous communication systems by considering a new design space for the setting. More specifically, we explore how to achieve near-optimal latency while achieving an intermediate level of anonymity with a weaker yet practical adversary model (i.e., protecting an end-host's identity and location from servers) such that users can choose between the level of anonymity and usability. We propose Lightweight Anonymity and Privacy (LAP), an efficient network-based solution featuring lightweight path establishment and stateless communication, by concealing an end-host's topological location to enhance anonymity against remote tracking. To show practicality, we demonstrate that LAP can work on top of the current Internet and proposed future Internet architectures. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/SP.2012.37 | IEEE Symposium on Security and Privacy |
Keywords | Field | DocType |
location privacy,popular anonymous communication system,lightweight anonymity and privacy,low-latency anonymous routing,anonymous communication system,data privacy,lightweight anonymity,end-host topological location,strong anonymity protection,lightweight path establishment,anonymity protection,topological anonymity,latency-sensitive application,computer network security,current internet,end-to-end latency,stateless communication,telecommunication network topology,non-anonymous communication system,internet,increased end-to-end latency,remote tracking,near-optimal latency,web application,communication system,intermediate level,network-based solution,internet user,lap,cryptography,protocols,low latency,servers,privacy,routing | Internet privacy,Computer security,Computer science,Adversary model,Network security,Network packet,Server,Computer network,Anonymity,Information privacy,Stateless protocol,The Internet | Conference |
ISSN | ISBN | Citations |
1081-6011 E-ISBN : 978-0-7695-4681-0 | 978-0-7695-4681-0 | 29 |
PageRank | References | Authors |
0.90 | 28 | 7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hsu-Chun Hsiao | 1 | 194 | 17.17 |
Tiffany Hyun-Jin Kim | 2 | 439 | 24.64 |
Adrian Perrig | 3 | 15842 | 1035.20 |
Akira Yamada | 4 | 122 | 14.46 |
Samuel C. Nelson | 5 | 116 | 9.95 |
Marco Gruteser | 6 | 4631 | 309.81 |
Wei Meng | 7 | 294 | 30.14 |