Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/644527.644537acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection

Published: 21 November 2002 Publication History

Abstract

Traditional mix-based systems are composed of a small set of static, well known, and highly reliable mixes. To resist traffic analysis attacks at a mix, cover traffic must be used, which results in significant bandwidth overhead. End-to-end traffic analysis attacks are even more difficult to counter because there are only a few entry-and exit-points in the system. Static mix networks also suffer from scalability problems and in several countries, institutions operating a mix could be targeted by legal attacks. In this paper, we introduce MorphMix, a system for peer-to-peer based anonymous Internet usage. Each MorphMix node is a mix and anyone can easily join the system. We believe that MorphMix overcomes or reduces several drawbacks of static mix networks. In particular, we argue that our approach offers good protection from traffic analysis attacks without employing cover traffic. But MorphMix also introduces new challenges. One is that an adversary can easily operate several malicious nodes in the system and try to break the anonymity of legitimate users by getting full control over their anonymous paths. To counter this attack, we have developed a collusion detection mechanism, which allows to identify compromised paths with high probability before they are being used.

References

[1]
Adam Back, Ian Goldberg, and Adam Shostack. Freedom 2.1 Security Issues and Analysis. White Paper, http://www.freedom.net/info/whitepapers/Freedom_Security2-1.pdf, May 3 2001.]]
[2]
Oliver Berthold, Hannes Federrath, and Marit Köhntopp. Project "Anonymity and Unobservability in the Internet". In Proceedings of the Workshop on Freedom and Privacy by Design / Conference on Freedom and Privacy 2000 CFP, pages 57--65, Toronto, Canada, April 4--7 2000.]]
[3]
Oliver Berthold, Hannes Federrath, and Stefan Köpsell. Web MIXes: A System for Anonymous and Unobservable Internet Access. In Designing Privacy Enhancing Technologies, volume 2009 of Lecture Notes in Computer Science, pages 115--129. Springer Verlag, 2000.]]
[4]
Philippe Boucher, Adam Shostack, and Ian Goldberg. Freedom Systems 2.0 Architecture. White Paper, http://www.freedom.net/info/whitepapers/Freedom_System_2_Architecture.pdf, December 18 2000.]]
[5]
David L. Chaum. Untraceable Electronic Mail, Return Adresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84--88, February 1981.]]
[6]
Lance Cottrell. Mixmaster Software. http://www.obscura.com/~loki/remailer/remailer-essay.html.]]
[7]
Wei Dai. PipeNet. http://www.eskimo.com/~weidai/pipenet.txt.]]
[8]
George Danezis, Roger Dingledine, David Hopwood, and Nick Mathewson. Mixminion: Design of a Type III Anonymous Remailer Protocol. Manuscript, http://mixminion.net, 2002.]]
[9]
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644--654, November 1976.]]
[10]
Roger Dingledine, Michael Freedman, David Hopwood, and David Molnar. A Reputation System to Increase MIX-net Reliability. In Proceedings of 4th International Information Hiding Workshop, pages 126--141, Pittsburg, PA, USA, April 2001.]]
[11]
Michael J. Freedman and Robert Morris. Tarzan: A Peer-to-Peer Anonymizing Network Layer. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, D.C., USA, November 2002.]]
[12]
R. Housely and W. Polk. Internet X.509 Public Key Infrastructure. RFC 2528, 1999.]]
[13]
Andreas Pfitzmann and Marit Köhntopp. Anonymity, Unobservability, and Pseudonymity---A Proposal for Terminology; Draft v0.12. http://www.koehntopp.de/marit/pub/anon/Anon_Terminology.pdf, June 17 2001.]]
[14]
Michael Reed, Paul Syverson, and David Goldschlag. Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications, 16(4):482--494, May 1998.]]
[15]
Michael K. Reiter and Aviel D. Rubin. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security, 1(1):66--92, November 1998.]]
[16]
Marc Rennhard. MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection (available at http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf). TIK Technical Report Nr. 147, TIK, ETH Zurich, Zurich, CH, August 2002.]]
[17]
Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bernhard Plattner, and David Hutchison. An Architecture for an Anonymity Network. In Proceedings of the IEEE 10th Intl. Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2001), pages 165--170, Boston, USA, June 20--22 2001.]]
[18]
Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bernhard Plattner, and David Hutchison. Analysis of an Anonymity Network for Web Browsing. In Proceedings of the IEEE 11th Intl. Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2002), pages 49--54, Pittsburgh, USA, June l0--12 2002.]]
[19]
Andrei Serjantov, Roger Dingledine, and Paul Syverson. From a Trickle to a Flood: Active Attacks on Several Mix Types. In Proceedings of 5th International Information Hiding Workshop, Noordwijkerhout, Netherlands, October 2002.]]
[20]
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of the ACM SIGCOMM '01 Conference, San Diego, CA, USA, August 2001.]]
[21]
Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr. Towards an Analysis of Onion Routing Security. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, pages 83--100, Berkeley, CA, USA, July 25--26 2000.]]
[22]
Marc Waldmann, Aviel D. Rubin, and Lorrie Faith Cranor. Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System. In Proceedings of the 9th USENIX Security Symposium, August 2000.]]
[23]
Matt Wright, Micah Adler, Brian Neil Levine, and Clay Shields. An Analysis of the Degradation of Anonymous Protocols. In Proceedings of ISOC Network and Distributed System Security Symposium (NDSS 2002), San Diego, USA, February 2002.]]

Cited By

View all
  • (2024)Nebula: A Privacy-First Platform for Data Backhaul2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00092(3184-3202)Online publication date: 19-May-2024
  • (2023)Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication NetworkSensors10.3390/s2321881023:21(8810)Online publication date: 29-Oct-2023
  • (2022)Network Shuffling: Privacy Amplification via Random WalksProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3526162(773-787)Online publication date: 10-Jun-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
November 2002
115 pages
ISBN:1581136331
DOI:10.1145/644527
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 November 2002

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. collusion detection
  3. mix networks
  4. peer-to-peer systems

Qualifiers

  • Article

Conference

CCS02
Sponsor:

Acceptance Rates

Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 17 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Nebula: A Privacy-First Platform for Data Backhaul2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00092(3184-3202)Online publication date: 19-May-2024
  • (2023)Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication NetworkSensors10.3390/s2321881023:21(8810)Online publication date: 29-Oct-2023
  • (2022)Network Shuffling: Privacy Amplification via Random WalksProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3526162(773-787)Online publication date: 10-Jun-2022
  • (2022)Anonymity-Enabled Communication Channels: Attacks and Defense Methods2022 3rd International Conference for Emerging Technology (INCET)10.1109/INCET54531.2022.9824020(1-6)Online publication date: 27-May-2022
  • (2022)Anonymity-Enabled Mix Network: Owing to Techniques and Proof of correctness2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)10.1109/ICCCIS56430.2022.10037727(176-181)Online publication date: 4-Nov-2022
  • (2022)An Anonymous Communication System Based on Software Defined ArchitectureMobile Internet Security10.1007/978-981-16-9576-6_27(396-407)Online publication date: 22-Jan-2022
  • (2021)WhisperChord: Scalable and Secure Node Discovery for Overlay Networks2021 IEEE 46th Conference on Local Computer Networks (LCN)10.1109/LCN52139.2021.9525008(170-177)Online publication date: 4-Oct-2021
  • (2021)GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy NetworksSecurity and Privacy in Communication Networks10.1007/978-3-030-90019-9_7(123-143)Online publication date: 3-Nov-2021
  • (2020)T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit ConstructionProceedings on Privacy Enhancing Technologies10.2478/popets-2020-00302020:2(336-357)Online publication date: 8-May-2020
  • (2020)Foggy: A New Anonymous Communication Architecture Based on Microservices2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS)10.1109/ICECCS51672.2020.00023(135-144)Online publication date: Oct-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media