Title :
Tor Network Limits
Author :
Benmeziane, Souad ; Badache, Nadjib ; Bensimessaoud, Sihem
Author_Institution :
Center of Res. in Sci. & Tech. Inf. (CERIST), Algiers, Algeria
Abstract :
Tor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a user to reduce the degree of anonymity.
Keywords :
Internet; computer network security; data privacy; Internet; Tor network limits; censorship resistance; public anonymity communication service; volunteer run relay network; Computer architecture; Cryptography; Internet; Knowledge based systems; Microprocessors; Relays; Servers; Tor network; anonymity; passive adversary; private profile;
Conference_Titel :
Network Computing and Information Security (NCIS), 2011 International Conference on
Conference_Location :
Guilin
Print_ISBN :
978-1-61284-347-6
DOI :
10.1109/NCIS.2011.48