VAST: Versatile Anonymous System for Web Users

  • Igor Margasiński
  • Krzysztof Szczypiorski


This paper presents an original method of providing versatile anonymity for Web users — VAST. It includes an introduction to the current techniques of providing anonymity in WWW system, both popular Third Party Proxy Servers and enhanced systems based on Chaining with Encryption. Limitations of these systems are discussed. In Third Party Proxy Servers — concentration of personal Web activity data; in Chaining with Encryption — low performance and high costs of network realization. Both classes of solutions do not eliminate all the risks of traffic analysis. The new method described — VAST — overcomes mentioned weaknesses and provides versatile anonymity for all parties involved in data exchange based on the WWW system. In this paper we also introduce a draft of the method implementation in Java language.

Key words

anonymity privacy anonymous web browsing privacy-enhancing technology 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Berners-Lee, T., Fielding, R., Frystyk, H. Hypertext Transfer Protocol — HTTP/1.0. RFC 1945, 1996.Google Scholar
  2. [2]
    Chaum, D. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM Vol. 24 no 2, 1981, pp. 84–88.CrossRefGoogle Scholar
  3. [3]
    Dierks T., Allen C. The TLS-Protocol Version 1.0. RFC 2246, 1999.Google Scholar
  4. [4]
    Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee T. HyperText Transfer Protocol — HTTP/1.1. RFC 2616, 1999.Google Scholar
  5. [5]
    Goldberg, I., Shostack, A. Freedom Network 1.0 Architecture and Protocols. Zero-Knowledge Systems. White Paper, 1999.Google Scholar
  6. [6]
    Goldschlag, D. M., Reed, M. G., Syverson, P. F. Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM Vol. 42 no 2, 1999, 39–41.CrossRefGoogle Scholar
  7. [7]
    Krane, D., Light, L., Gravitch D. Privacy On and Off the Internet: What Consumers Want. Harris Interactive, 2002.Google Scholar
  8. [8]
    Kristol, R., Montulli, L. HTTP State Management Mechanism. RFC 2965, 2000.Google Scholar
  9. [9]
    Martin, D., Schulman, A. Deanonymizing Users of the SafeWeb Anonymizing Service. Privacy Foundation, Boston University, 2002.Google Scholar
  10. [10]
    Reiter, M.K., Rubin, A.D. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security, 1998, pp. 66–92Google Scholar
  11. [11]
    Syverson, P. F., Goldschlag, D. M., Reed, M. G. Anonymous Connections and Onion Routing. IEEE Symposium on Security and Privacy, 1997.Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  • Igor Margasiński
    • 1
  • Krzysztof Szczypiorski
    • 1
  1. 1.Institute of TelecommunicationsWarsaw University of TechnologyWarsawPoland

Personalised recommendations