Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016)
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Las Vegas, USA
doi: 10.1109/CCNC.2016.7444871
Conference or Workshop Item, Bibliographie
Abstract
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity.
Item Type: | Conference or Workshop Item |
---|---|
Erschienen: | 2016 |
Creators: | Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max |
Type of entry: | Bibliographie |
Title: | On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks |
Language: | English |
Date: | January 2016 |
Publisher: | IEEE |
Book Title: | Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) |
Event Location: | Las Vegas, USA |
DOI: | 10.1109/CCNC.2016.7444871 |
Abstract: | Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from undesired profiling, e.g., by insurance companies, in todays’ Internet. P2P- based anonymous publish-subscribe (pub-sub) is a highly-scalable approach to protect anonymity while enabling efficient many- to-many communication between services and users. However, churn and overlay degradation in P2P-based pub-sub systems require periodic repair and optimization operations to maintain the anonymity protection and the efficiency of the content dissemination. This paper analyzes attacks on such repair and optimization functions to disclose publishers and subscribers. For that, we apply a strong attacker model that combines large- scale traffic monitoring with malicious insiders. Furthermore, we propose and evaluate heuristic countermeasures. Our findings indicate that some attacks can be mitigated at reasonable costs. However, churn seems to remain a major threat to anonymity. |
Uncontrolled Keywords: | SSI - Area Secure Smart Infrastructures;S1;Solutions;Anonymity, Overlay, Attack, Optimization |
Identification Number: | TUD-CS-2015-1216 |
Divisions: | 20 Department of Computer Science 20 Department of Computer Science > Telecooperation DFG-Collaborative Research Centres (incl. Transregio) DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres DFG-Graduiertenkollegs DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users Profile Areas Profile Areas > Cybersecurity (CYSEC) LOEWE LOEWE > LOEWE-Zentren LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments |
Date Deposited: | 31 Dec 2016 12:59 |
Last Modified: | 14 Jun 2021 06:14 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Send an inquiry |
Options (only for editors)
Show editorial Details |