Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]
Abstract
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity.
Item Type: | Conference or Workshop Item |
---|---|
Erschienen: | 2016 |
Creators: | Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max |
Title: | On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks |
Language: | English |
Abstract: | Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity. |
Title of Book: | Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) |
Publisher: | IEEE |
ISBN: | 978-1-4673-9292-1 |
Uncontrolled Keywords: | SSI - Area Secure Smart Infrastructures;S1;Solutions;Anonymity, Overlay, Attack, Optimization |
Divisions: | 20 Department of Computer Science 20 Department of Computer Science > Telecooperation DFG-Collaborative Research Centres (incl. Transregio) DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres DFG-Graduiertenkollegs DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users Profile Areas Profile Areas > Cybersecurity (CYSEC) LOEWE LOEWE > LOEWE-Zentren LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments |
Event Location: | Las Vegas, USA |
Date Deposited: | 31 Dec 2016 12:59 |
DOI: | 10.1109/CCNC.2016.7444871 |
Identification Number: | TUD-CS-2015-1216 |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
![]() |
Send an inquiry |
Options (only for editors)
![]() |
Show editorial Details |