Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-Funnels

Author:

Nunes Vítor1ORCID,Brás José1ORCID,Carvalho Afonso1ORCID,Barradas Diogo2ORCID,Gallagher Kevin3ORCID,Santos Nuno1ORCID

Affiliation:

1. INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Lisbon, Portugal

2. University of Waterloo, Waterloo, ON, Canada

3. NOVA LINCS, NOVA School of Science and Technology, Lisbon, Portugal

Abstract

Anonymous communication systems are essential tools for preserving privacy and freedom of expression. However, traffic analysis attacks make it challenging to maintain unlinkability in circuit-based anonymity networks like Tor, enabling adversaries to deanonymize communications. To address this problem, we introduce k-funnel, a new security primitive that enhances the unlinkability of circuit-based anonymity networks, and we present BriK, a Tor pluggable transport that implements k-funnels. k-Funnels offer k-anonymity to a group of k clients by jointly tunneling their circuits' traffic through a bridge while ensuring that the client-generated flows are indistinguishable. BriK incorporates several defense mechanisms against traffic analysis attacks, including traffic shaping schemes, synchronization protocols, and approaches for monitoring exposure to statistical disclosure attacks. Our evaluation shows that BriK is able to support web browsing and video streaming while offering k-anonymity. We evaluate the security of BriK against traffic correlation attacks leveraging state-of-the-art deep learning classifiers without considering auxiliary information and find it highly resistant. Although k-funnels require the cooperation of mutually trusted clients, limiting their coordination, our work presents a new practical solution to strengthen unlinkability in circuit-based anonymity systems.

Funder

NOVA LINC

NSERC

FCT

IAPMEI

Publisher

Association for Computing Machinery (ACM)

Reference93 articles.

1. Blinder -- Scalable, Robust Anonymous Committed Broadcast

2. Masoud Akhoondi , Curtis Yu , and Harsha V. Madhyastha . 2012. LASTor: A low-latency AS-aware Tor client . In Proceedings of the IEEE Symposium on Security and Privacy. Masoud Akhoondi, Curtis Yu, and Harsha V. Madhyastha. 2012. LASTor: A low-latency AS-aware Tor client. In Proceedings of the IEEE Symposium on Security and Privacy.

3. Nikolaos Alexopoulos , Aggelos Kiayias , Riivo Talviste , and Thomas Zacharias . 2017 . MCMix: Anonymous Messaging via Secure Multiparty Computation . In Proceedings of the USENIX Security Symposium. 1217--1234 . Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, and Thomas Zacharias. 2017. MCMix: Anonymous Messaging via Secure Multiparty Computation. In Proceedings of the USENIX Security Symposium. 1217--1234.

4. Exploring Linkability of User Reviews

5. Sebastian Angel and Srinath Setty . 2016 . Unobservable Communication over Fully Untrusted Infrastructure . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. 551--569 . Sebastian Angel and Srinath Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. 551--569.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3