AN EFFICIENT METHODOLOGY TO LIMIT PATH LENGTH GUARANTEEING ANONYMITY IN OVERLAY NETWORKS

Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Joan Garcia-Haro

2008

Abstract

An alternative to guarantee anonymity in overlay networks may be achieved by building a multi-hop path between the origin and the destination. However, one hop in the overlay network can consist of multiple Internet Protocol (IP) hops. Therefore, the length of the overlay multi-hop path must be reduced in order to maintain a good balance between the cost and the benefit provided by the anonymity facility. Unfortunately, the simple Time-To-Live (TTL) algorithm cannot be directly applied here since its use could reveal valuable information to break anonymity. In this paper, a new mechanism which reduces the length of the overlay multi-hop paths is presented. The anonymity level is evaluated by means of simulation and good results are reported.

References

  1. Borissov, N. (2005). Anonymous routing in structured peerto-peer overlays. PhD thesis, University of California at Berkeley, Berkeley, CA, USA. Chair-Eric A. Brewer.
  2. Chaum, D. L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90.
  3. Danezis, G., Dingledine, R., and Mathewson, N. (2003). Mixminion: Design of a type iii anonymous remailer protocol. In SP 7803: Proceedings of the 2003 IEEE Symposium on Security and Privacy, page 2, Washington, DC, USA. IEEE Computer Society.
  4. Díaz, C., Seys, S., Claessens, J., and Preneel, B. (2002). Towards measuring anonymity. In Dingledine, R. and Syverson, P., editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). SpringerVerlag, LNCS 2482.
  5. Goldberg, I., Wagner, D., and Brewer, E. (1997). Privacyenhancing technologies for the internet. In COMPCON 7897: Proceedings of the 42nd IEEE International Computer Conference, page 103, Washington, DC, USA. IEEE Computer Society.
  6. Möller, U., Cottrell, L., Palfrader, P., and Sassaman, L. (2003). Mixmaster protocol - version 2. draft, july 2003. http://www.abditum.com/mixmaster-spec.txt.
  7. Pfitzmann, A. and Hansen, M. (2007). Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology (version v0.30 nov. 26, 2007). http://dud.inf.tu-dresden.de/Anon Terminology.shtml.
  8. Postel, J. (1981). RFC 791: Internet Protocol.
  9. Reiter, M. K. and Rubin, A. D. (1998). Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur., 1(1):66-92.
  10. Tsang, D. H. K., Ross, K. W., Rodriguez, P., Li, J., and Karlsson, G. (2007). Advances in peer-to-peer streaming systems [guest editorial]. IEEE Journal on Selected Areas in Communications, 25(9):1609-1611.
  11. Zimmermann, P. R. (1995). The official PGP user's guide. MIT Press, Cambridge, MA, USA.
Download


Paper Citation


in Harvard Style

Pedro Muñoz-Gea J., Malgosa-Sanahuja J., Manzanares-Lopez P., Carlos Sanchez-Aarnoutse J. and Garcia-Haro J. (2008). AN EFFICIENT METHODOLOGY TO LIMIT PATH LENGTH GUARANTEEING ANONYMITY IN OVERLAY NETWORKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 205-208. DOI: 10.5220/0001916202050208


in Bibtex Style

@conference{secrypt08,
author={Juan Pedro Muñoz-Gea and Josemaria Malgosa-Sanahuja and Pilar Manzanares-Lopez and Juan Carlos Sanchez-Aarnoutse and Joan Garcia-Haro},
title={AN EFFICIENT METHODOLOGY TO LIMIT PATH LENGTH GUARANTEEING ANONYMITY IN OVERLAY NETWORKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={205-208},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001916202050208},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - AN EFFICIENT METHODOLOGY TO LIMIT PATH LENGTH GUARANTEEING ANONYMITY IN OVERLAY NETWORKS
SN - 978-989-8111-59-3
AU - Pedro Muñoz-Gea J.
AU - Malgosa-Sanahuja J.
AU - Manzanares-Lopez P.
AU - Carlos Sanchez-Aarnoutse J.
AU - Garcia-Haro J.
PY - 2008
SP - 205
EP - 208
DO - 10.5220/0001916202050208