TU Darmstadt / ULB / TUbiblio

On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks

Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max :
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[Conference or Workshop Item] , (2016)

Abstract

Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity.

Item Type: Conference or Workshop Item
Erschienen: 2016
Creators: Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max
Title: On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks
Language: English
Abstract:

Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity.

Title of Book: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC)
Publisher: IEEE
Uncontrolled Keywords: SSI - Area Secure Smart Infrastructures;S1;Solutions;Anonymity, Overlay, Attack, Optimization
Divisions: Department of Computer Science
Department of Computer Science > Telecooperation
DFG-Collaborative Research Centres (incl. Transregio)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres
DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Event Location: Las Vegas, USA
Date Deposited: 31 Dec 2016 12:59
DOI: 10.1109/CCNC.2016.7444871
Identification Number: TUD-CS-2015-1216
Export:

Optionen (nur für Redakteure)

View Item View Item