Title :
Evaluation of anonymity providing techniques using queuing theory
Author_Institution :
IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA
Abstract :
In our work we use queuing theory both for security (ie, anonymity) and performance analysis. A well-known anonymity technique, the MIX method, which is the basis of most of today´s deployments, is the object of our investigation. We show shortcomings and problems in the MIX method and suggest possible workarounds. Our investigation reveals the level of security of MIX based systems and their performance characteristics on the Internet
Keywords :
Internet; data privacy; queueing theory; security of data; telecommunication security; Internet; MIX method; anonymity providing techniques; performance analysis; queuing theory; security; Books; Communication networks; Cryptography; Delay effects; Internet; Performance analysis; Queueing analysis; Security; Telecommunication traffic; Traffic control;
Conference_Titel :
Local Computer Networks, 2001. Proceedings. LCN 2001. 26th Annual IEEE Conference on
Conference_Location :
Tampa, FL
Print_ISBN :
0-7695-1321-2
DOI :
10.1109/LCN.2001.990801