DocumentCode :
2902684
Title :
Anonymous Networking under Memory Constraints
Author :
Venkitasubramaniam, Parv
fYear :
2010
fDate :
23-27 May 2010
Firstpage :
1
Lastpage :
5
Abstract :
Chaum Mixes, a class of proxy servers or relays which use randomized reordering and batching of packets from multiple users to provide source anonymity, have been used extensively for anonymous remailing, browsing and peer-to-peer file sharing. In this work, an analytical framework is proposed to measure and optimize the anonymity provided by mixing strategies when the mixes have memory restrictions. Specifically, an information-theoretic metric of anonymity is proposed for buffer constrained mixes, and using Poisson traffic models, fundamental trade-offs between achievable anonymity and the buffer size are studied analytically. In particular, a buffer-constrained mixing strategy is proposed that is asymptotically optimal and obtains the best convergence rate amongst known mixing strategies. The strategy is generalized to a network of mixes, where the achievable anonymity is expressed as a function of the topology and the buffer constraints of individual mixes.
Keywords :
computer network security; data privacy; stochastic processes; telecommunication network topology; Chaum Mixes; Poisson traffic models; anonymous networking; anonymous remailing; browsing; buffer-constrained mixing strategy; convergence rate; information-theoretic anonymity metric; memory constraints; packet batching; peer-to-peer file sharing; proxy servers; randomized reordering; relays; topology; Convergence; File servers; Information analysis; Memory management; Network servers; Network topology; Peer to peer computing; Relays; Telecommunication traffic; Traffic control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (ICC), 2010 IEEE International Conference on
Conference_Location :
Cape Town
ISSN :
1550-3607
Print_ISBN :
978-1-4244-6402-9
Type :
conf
DOI :
10.1109/ICC.2010.5502083
Filename :
5502083
Link To Document :
بازگشت