TU Darmstadt / ULB / TUbiblio

On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016)
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Las Vegas, USA
doi: 10.1109/CCNC.2016.7444871
Conference or Workshop Item, Bibliographie

Abstract

Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity.

Item Type: Conference or Workshop Item
Erschienen: 2016
Creators: Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max
Type of entry: Bibliographie
Title: On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks
Language: English
Date: January 2016
Publisher: IEEE
Book Title: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC)
Event Location: Las Vegas, USA
DOI: 10.1109/CCNC.2016.7444871
Abstract:

Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity.

Uncontrolled Keywords: SSI - Area Secure Smart Infrastructures;S1;Solutions;Anonymity, Overlay, Attack, Optimization
Identification Number: TUD-CS-2015-1216
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Telecooperation
DFG-Collaborative Research Centres (incl. Transregio)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres
DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Date Deposited: 31 Dec 2016 12:59
Last Modified: 14 Jun 2021 06:14
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details