TU Darmstadt / ULB / TUbiblio

On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[ Konferenzveröffentlichung] , (2016)

Kurzbeschreibung (Abstract)

Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity.

Typ des Eintrags: Konferenzveröffentlichung ( nicht bekannt)
Erschienen: 2016
Autor(en): Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max
Titel: On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks
Sprache: Englisch
Kurzbeschreibung (Abstract):

Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity.

Buchtitel: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC)
Verlag: IEEE
Freie Schlagworte: SSI - Area Secure Smart Infrastructures;S1;Solutions;Anonymity, Overlay, Attack, Optimization
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Telekooperation
DFG-Sonderforschungsbereiche (inkl. Transregio)
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche
DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Graduiertenkolleg 2050 Privacy and Trust for Mobile Users
Profilbereiche
Profilbereiche > Cybersicherheit (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen
Veranstaltungsort: Las Vegas, USA
Hinterlegungsdatum: 31 Dez 2016 12:59
DOI: 10.1109/CCNC.2016.7444871
ID-Nummer: TUD-CS-2015-1216
Export:

Optionen (nur für Redakteure)

Eintrag anzeigen Eintrag anzeigen