Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques

被引:1
作者
Gaballah, Sarah Abdelwahab [1 ]
Abdullah, Lamya [2 ]
Muehlhaeuser, Max [2 ]
Marky, Karola [1 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] Tech Univ Darmstadt, Darmstadt, Germany
来源
19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024 | 2024年
关键词
Mix networks; mixing techniques; anonymity; latency; ATTACKS;
D O I
10.1145/3664476.3664516
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current anonymous communication systems either provide strong anonymity with significant delay or low latency with unreliable anonymity. This division leads to smaller user bases and reduced anonymity as users choose systems based on their specific requirements. To address this issue, we propose an approach based on mix networks that employs two mixing techniques on mix nodes. Each technique offers distinct anonymity and latency guarantees-one for users valuing strong anonymity and another for those with specific latency constraints. We conducted an in-depth empirical study to evaluate the effectiveness of our proposal. The evaluation results demonstrate that our approach provides much more protection than the traditional method of using just one mixing technique on mix nodes. It offers enhanced anonymity for all users without impacting any user's latency requirements. Furthermore, our findings indicate that our proposal eliminates the need for generating cover traffic to improve anonymity, achieving this improvement without introducing the bandwidth overhead associated with cover traffic.
引用
收藏
页数:11
相关论文
共 34 条
[21]  
Guirat Iness Ben, 2024, P PRIV ENH TECHN POP, V15
[22]  
Madani Shaahin, 2015, Ph. D. Dissertation
[23]   Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks [J].
Nie, Laisen ;
Jiang, Dingde ;
Lv, Zhihan .
ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) :297-305
[24]  
Pfitzmann Andreas, 2010, A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
[25]   Studying the Anonymity Trilemma with a Discrete-event Mix Network Simulator [J].
Piotrowska, Ania M. .
PROCEEDINGS OF THE 20TH WORKSHOP ON WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2021, 2021, :39-44
[26]  
Serjantov A, 2003, INT FED INFO PROC, V122, P427
[27]  
Serjantov A, 2003, LECT NOTES COMPUT SC, V2578, P36
[28]  
Serjantov A, 2003, LECT NOTES COMPUT SC, V2482, P41
[29]  
Serjantov A, 2007, LECT NOTES COMPUT SC, V4776, P17
[30]  
Sherr Micah., 2007, HotSec