Authors:
Ramzi A. Haraty
1
;
Maram Assi
1
and
Imad Rahal
2
Affiliations:
1
Lebanese American University, Lebanon
;
2
College of Saint Benedict & Saint John’s University, United States
Keyword(s):
Anonymous Systems, Crowds, FreeNet, NetCamo, Mixmaster, Tarzan, TOR.
Related
Ontology
Subjects/Areas/Topics:
Computer-Supported Education
;
Enterprise Information Systems
;
Information Systems Analysis and Specification
;
Information Technologies Supporting Learning
;
Modeling of Distributed Systems
;
Security
;
Security and Privacy
Abstract:
Privacy and anonymity are important concepts in the field of communication. Internet users seek to adopt protective measures to ensure the privacy and security of the data transmitted over the network. Encryption is one technique to secure critical information and protect its confidentiality. Although there exist many encryption algorithms, hiding the identity of the sender can only be achieved through an anonymous network. Different classifications of anonymous networks exist. Latency level and system model architecture are two essential criteria. In this paper, we present a description of a set of anonymous systems including NetCamo, TOR, I2P and many others. We will show how these systems work and contrast the advantages and disadvantages of each one of them.