VAST: Versatile Anonymous System for Web Users
This paper presents an original method of providing versatile anonymity for Web users — VAST. It includes an introduction to the current techniques of providing anonymity in WWW system, both popular Third Party Proxy Servers and enhanced systems based on Chaining with Encryption. Limitations of these systems are discussed. In Third Party Proxy Servers — concentration of personal Web activity data; in Chaining with Encryption — low performance and high costs of network realization. Both classes of solutions do not eliminate all the risks of traffic analysis. The new method described — VAST — overcomes mentioned weaknesses and provides versatile anonymity for all parties involved in data exchange based on the WWW system. In this paper we also introduce a draft of the method implementation in Java language.
Key wordsanonymity privacy anonymous web browsing privacy-enhancing technology
Unable to display preview. Download preview PDF.
- Berners-Lee, T., Fielding, R., Frystyk, H. Hypertext Transfer Protocol — HTTP/1.0. RFC 1945, 1996.Google Scholar
- Dierks T., Allen C. The TLS-Protocol Version 1.0. RFC 2246, 1999.Google Scholar
- Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee T. HyperText Transfer Protocol — HTTP/1.1. RFC 2616, 1999.Google Scholar
- Goldberg, I., Shostack, A. Freedom Network 1.0 Architecture and Protocols. Zero-Knowledge Systems. White Paper, 1999.Google Scholar
- Krane, D., Light, L., Gravitch D. Privacy On and Off the Internet: What Consumers Want. Harris Interactive, 2002.Google Scholar
- Kristol, R., Montulli, L. HTTP State Management Mechanism. RFC 2965, 2000.Google Scholar
- Martin, D., Schulman, A. Deanonymizing Users of the SafeWeb Anonymizing Service. Privacy Foundation, Boston University, 2002.Google Scholar
- Reiter, M.K., Rubin, A.D. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security, 1998, pp. 66–92Google Scholar
- Syverson, P. F., Goldschlag, D. M., Reed, M. G. Anonymous Connections and Onion Routing. IEEE Symposium on Security and Privacy, 1997.Google Scholar