Grube, Tim (2018)
Efficient Anonymous Group Communication.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Kurzbeschreibung (Abstract)
This dissertation addresses the important challenge of efficiency in anonymous communication. Solving this challenge is essential to provide anonymity in group communication.
Every exchanged message leaks metadata: this information describes the communication itself with, among others, sender, recipients, frequency of the communication. While the law protects this information, it is often published and misused with consequences for the participants of the communication—often consequences particular for the senders of information.
Anonymous communication systems like Tor break the link between senders and recipients of messages and diminish emerging metadata. However, their design requires duplicating messages for all recipients early, mostly at the sender itself. With that, the system has to handle an unnecessary burden of processing identical messages. This dissertation contributes a novel mechanism that establishes communication groups such that the message duplication is pushed as close to the recipients as possible. This dissertation also shows that this efficiency improvement does not come at costs of anonymity. Moreover, the group establishment mechanism increases the robustness of the communication against users that leave and join the communication system. To encounter the additional information leakage, different mechanisms to share routing information are introduced and discussed under the angle of efficiency and anonymity. To also protect senders of messages, this dissertation adapts Dining-Cryptographer networks to enable sender anonymity with an adjustable trade-off between efficiency and anonymity.
The scientific contributions of this dissertation fall into the following categories: - Efficient Communication Overlays: A novel overlay establishment mechanism is presented. This mechanism adapts Ant Colony Optimization (ACO) to connect senders and recipients with a reduced number of connections while the anonymity remains stable. - Reliable Communication under Churn: Churn often disrupts communication overlays, this thesis proposes a mechanism to counter this disruptions and increase the robustness of the communication. For that, the ACO-based mechanism utilizes residual pheromones to reconnect subjects to the communication overlay. - Routing Information Exchange considering Efficiency and Anonymity: Four methods to share routing information, namely successor lists, successor lists with multi-layer encryption, Bloom filters, and distributed lookup tables, are introduced into the anonymous communication setting, discussed and evaluated with respect to their properties concerning efficiency and anonymity. - Efficient and Effective Sender Protection: A novel mechanism based on asymmetric dining-cryptographer networks (ADCnets) is proposed to improve the efficiency of sender protection without degrading anonymity over time. Moreover, the trade-off between efficiency and anonymity can be controlled.
Evaluation The developed mechanisms have been extensively evaluated using a combination of simulations and formal arguments. For this evaluation, a graph-based simulation model has been developed enabling to analyze the improvement of the ACO-based communication overlays over conventional overlays. An extensive simulation identified valuable parameter combinations for the ACO mechanism, leading to communication overlays with an efficiency improvement of up to 40%. This efficiency improvement increases the communication delay only by up to 2 extra hops. The calculation of the achieved anonymity degree indicates no loss of anonymity in comparison to conventional overlays; even more, the anonymity degree does even improve. Under churn, the robustness of the communication also increases by 30% in comparison to conventional overlays.
The four approaches to routing information exchange are discussed and compared using formal arguments. The evaluation enables to select the appropriate mechanism based on the requirements for memory and communication efficiency and anonymity for the desired application scenario.
The novel adapted ADCnets enable sender anonymity with configurable efficiency and anonymity. As such, they are superior to current approaches implementing cover traffic. A simulation study shows that cover traffic randomization improves efficiency at the cost of anonymity. The proposed ADCnets have been evaluated using formal arguments that demonstrate the efficiency improvement and the preservation of anonymity. As both efficiency and anonymity are conflicting, they cannot be achieved at the same time; however, the proposed ADCnets enable to balance efficiency and anonymity to the requirements of the application scenario.
Typ des Eintrags: | Dissertation | ||||
---|---|---|---|---|---|
Erschienen: | 2018 | ||||
Autor(en): | Grube, Tim | ||||
Art des Eintrags: | Erstveröffentlichung | ||||
Titel: | Efficient Anonymous Group Communication | ||||
Sprache: | Deutsch | ||||
Referenten: | Mühlhäuser, Prof. Dr. Max ; Fischer, Prof. Dr. Mathias | ||||
Publikationsjahr: | 2018 | ||||
Ort: | Darmstadt | ||||
Datum der mündlichen Prüfung: | 10 Juli 2018 | ||||
URL / URN: | https://tuprints.ulb.tu-darmstadt.de/7704 | ||||
Kurzbeschreibung (Abstract): | This dissertation addresses the important challenge of efficiency in anonymous communication. Solving this challenge is essential to provide anonymity in group communication. Every exchanged message leaks metadata: this information describes the communication itself with, among others, sender, recipients, frequency of the communication. While the law protects this information, it is often published and misused with consequences for the participants of the communication—often consequences particular for the senders of information. Anonymous communication systems like Tor break the link between senders and recipients of messages and diminish emerging metadata. However, their design requires duplicating messages for all recipients early, mostly at the sender itself. With that, the system has to handle an unnecessary burden of processing identical messages. This dissertation contributes a novel mechanism that establishes communication groups such that the message duplication is pushed as close to the recipients as possible. This dissertation also shows that this efficiency improvement does not come at costs of anonymity. Moreover, the group establishment mechanism increases the robustness of the communication against users that leave and join the communication system. To encounter the additional information leakage, different mechanisms to share routing information are introduced and discussed under the angle of efficiency and anonymity. To also protect senders of messages, this dissertation adapts Dining-Cryptographer networks to enable sender anonymity with an adjustable trade-off between efficiency and anonymity. The scientific contributions of this dissertation fall into the following categories: - Efficient Communication Overlays: A novel overlay establishment mechanism is presented. This mechanism adapts Ant Colony Optimization (ACO) to connect senders and recipients with a reduced number of connections while the anonymity remains stable. - Reliable Communication under Churn: Churn often disrupts communication overlays, this thesis proposes a mechanism to counter this disruptions and increase the robustness of the communication. For that, the ACO-based mechanism utilizes residual pheromones to reconnect subjects to the communication overlay. - Routing Information Exchange considering Efficiency and Anonymity: Four methods to share routing information, namely successor lists, successor lists with multi-layer encryption, Bloom filters, and distributed lookup tables, are introduced into the anonymous communication setting, discussed and evaluated with respect to their properties concerning efficiency and anonymity. - Efficient and Effective Sender Protection: A novel mechanism based on asymmetric dining-cryptographer networks (ADCnets) is proposed to improve the efficiency of sender protection without degrading anonymity over time. Moreover, the trade-off between efficiency and anonymity can be controlled. Evaluation The developed mechanisms have been extensively evaluated using a combination of simulations and formal arguments. For this evaluation, a graph-based simulation model has been developed enabling to analyze the improvement of the ACO-based communication overlays over conventional overlays. An extensive simulation identified valuable parameter combinations for the ACO mechanism, leading to communication overlays with an efficiency improvement of up to 40%. This efficiency improvement increases the communication delay only by up to 2 extra hops. The calculation of the achieved anonymity degree indicates no loss of anonymity in comparison to conventional overlays; even more, the anonymity degree does even improve. Under churn, the robustness of the communication also increases by 30% in comparison to conventional overlays. The four approaches to routing information exchange are discussed and compared using formal arguments. The evaluation enables to select the appropriate mechanism based on the requirements for memory and communication efficiency and anonymity for the desired application scenario. The novel adapted ADCnets enable sender anonymity with configurable efficiency and anonymity. As such, they are superior to current approaches implementing cover traffic. A simulation study shows that cover traffic randomization improves efficiency at the cost of anonymity. The proposed ADCnets have been evaluated using formal arguments that demonstrate the efficiency improvement and the preservation of anonymity. As both efficiency and anonymity are conflicting, they cannot be achieved at the same time; however, the proposed ADCnets enable to balance efficiency and anonymity to the requirements of the application scenario. |
||||
Alternatives oder übersetztes Abstract: |
|
||||
URN: | urn:nbn:de:tuda-tuprints-77049 | ||||
Sachgruppe der Dewey Dezimalklassifikatin (DDC): | 000 Allgemeines, Informatik, Informationswissenschaft > 004 Informatik | ||||
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Telekooperation DFG-Graduiertenkollegs DFG-Graduiertenkollegs > Graduiertenkolleg 2050 Privacy and Trust for Mobile Users |
||||
Hinterlegungsdatum: | 26 Aug 2018 19:55 | ||||
Letzte Änderung: | 26 Aug 2018 19:55 | ||||
PPN: | |||||
Referenten: | Mühlhäuser, Prof. Dr. Max ; Fischer, Prof. Dr. Mathias | ||||
Datum der mündlichen Prüfung / Verteidigung / mdl. Prüfung: | 10 Juli 2018 | ||||
Export: | |||||
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |