Title :
An efficient anonymous scheme for computer and communication privacy
Author :
Chang, Ray-I ; Chu, Chih-Chun ; Chiu, Yu-Lin
Author_Institution :
Dept. of Eng. Sci., Nat. Taiwan Univ., Taipei, Taiwan
Abstract :
Due to the rising of on-line C&C (computer and communication) applications, users require an anonymous channel to transfer sensitive or confidential data on the networks. How to hide the sources and their locations during communications becomes an important problem. Although previous schemes such as IPSec can provide data protection for private communications, they require special devices (i.e. security gateways). Recently, researchers focus on applying the ALR (application-level routing) framework to perform private communications on top of IP networks. The Freenet system introduced by Clarke et al. is one of the most famous models. Freenet needs no special device. However, it stores and backwards response data over the entire routing path. Lots of time and resource are wasted. In this paper, we introduce the concept of anonymous-shortcut to improve Freenet\´s performance. The proposed mechanism permits users to choice different secure levels on their own demands. It provides a high flexibility in adjusting security and performance requirements to obtain the acceptable security and the controllable delay. Our mechanism is easy to implement, and can be combined with other protocols for applying in different problems, such as the "decapitation strike" in the combat zone. It provides anonymous delivery for application-independent and real-time connections.
Keywords :
IP networks; computer networks; data privacy; network routing; ALR framework; Freenet performance; Freenet system; IP networks; IPSec; anonymous channel; anonymous scheme; application-independent connections; application-level routing; combat zone; computer and communication privacy; confidential data; controllable delay; data protection; data transfer; decapitation strike; performance requirements; private communications; real-time connections; routing path; security gateways; security requirements; sensitive data; Application software; Communication system security; Computer applications; Computer networks; Data security; Delay; IP networks; Privacy; Protection; Routing;
Conference_Titel :
Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on
Print_ISBN :
0-7803-8506-3
DOI :
10.1109/CCST.2004.1405393