Abstract
The huge increase in data usage and the rapid development of new technologies such as cloud, IoT, and has also led to the exponential increase in cyber threats online. Anonymity and privacy services have equally seen an exceptional growth rate since the introduction of Blockchain and Tor network, as more individuals demand anonymous services away from the traditional centralised offerings, but also seek more security and privacy. This chapter will review quantitative analysis undertaken to critically evaluate Tor and Blockchain as emerging technologies, by an in-depth comparison of their security and privacy properties. Further analysis is undertaken by utilising network and data points that highlight the necessity of urgent deployment of innovative methods to protect users’ anonymity utilising Blockchain application over the Tor network. By undertaking experimental analysis, it is possible to determine Tor packets from common packets and raises the question on possibilities of cyberattacks leading to loss of personable identifiable information (PII) and de-anonymization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al Jawaheri H, Al Sabah M, Boshmaf Y, Erbad A (2019) Deanonymizing Tor hidden service users through Bitcoin transactions analysis. [online] Available at: https://arxiv.org/pdf/1801.07501.pdf. Accessed 2 Sept 2019
AlSabah M, Goldberg I (2015) Performance and security improvements for Tor: a survey. [ebook] Available at: https://eprint.iacr.org/2015/235.pdf. Accessed 25 July 2019
Anwar U (2017) Blockchain: anonymisation techniques within distributed ledgers
Anwar H (2018) Consensus algorithms: the root of the Blockchain Technology. [online] 101 Blockchains. Available at: https://101blockchains.com/consensus-algorithms-blockchain/#2. Accessed 18 Aug 2019
Baker J, Steiner J (2015) Blockchain: the solution for transparency in product. [online] Provenance. Available at: https://www.provenance.org/whitepaper. Accessed 22 Aug 2019
Bayer D, Haber S, Stornetta W (1992) Improving the efficiency and reliability of digital time-stamping. [ebook] Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.4891&rep=rep1&type=pdf. Accessed 1 Aug 2019
Ben-Sasson E, Chiesa A, Genkin D, Tromer E, Virza M (2013) SNARKs for C: verifying program executions succinctly and in zero knowledge. [ebook] Available at: https://eprint.iacr.org/2013/507.pdf. Accessed 28 July 2019
Biryukov A, Pustogarov I (2015) Bitcoin over Tor isn’t a good idea. IEEE Symp Secur Priv 2015:122–134
Biryukov A, Pustogarov I (2015) Proof-of-work as anonymous micropayment: rewarding a Tor relay? [ebook] Available at: https://eprint.iacr.org/2014/1011.pdf. Accessed 15 Aug 2019
Biryukov A, Pustogarov I, Thill F, Weinmann R (2013) Trawling for Tor hidden services: detection, measurement, de-anonymisation. In: Symposium on security and privacy. IEEE, pp 80–94
Bissoli A, Farinacci F, Prosseda A, Veterini S (2017) Deanonymize Tor hidden services master. In: Engineering of Computer Science. Web Security and Privacy
Bitansky N, Canetti R, Chiesa A, Tromer E (2013) Recursive composition and bootstrapping for SNARKs and proof-carrying data. In: Proceedings of the 45th ACM symposium on the theory of computing, STOC’13, pp. 111–120
Bonneau J, Narayanan A, Miller A, Clark J, Kroll J, Felten E (2014) Mixcoin. Anonymity for Bitcoin with accountable mixes. [pdf] Available at: https://eprint.iacr.org/2014/077.pdf. Accessed 20 Jul 2019
Brown D (2000) The exact security of ECDSA, Technical report CORR 2000-54. Department of C&O, University of Waterloo, Waterloo. Available at: https://www.cacr.math.uwaterloo.ca. Accessed 19 Aug 2019
Çalışkan E, Minárik T, Osula A (2015) Technical and legal overview of the Tor anonymity network
Cambiaso E, Vaccari I, Patti L, Aiello M (2017) Darknet security: a categorization of attacks to the Tor network. [ebook] IEEE. Available at: http://ceur-ws.org/Vol-2315/paper10.pdf. Accessed 2 Sept 2019
Chaum D, Heist E (1991) Group signatures. In: Davies D (ed) Advances in cryptology – EUROCRYPT’91. Springer, Berlin/Heidelberg, pp 257–265
Cheng R, Zhang F, Kos J, He W, Hynes N, Johnson N, Juels A, Miller A, Song D (2018) Ekiden: a platform for confidentiality-preserving, trustworthy, and performant smart contract execution
Choudhary D (2018) The onion routing-the good and the bad. [pdf] Available at: https://www.researchgate.net/publication/327867486_The_Onion_Routing-The_Good_and_ The_Bad/citation/download. Accessed 12 Aug 2019
Cuzzocrea A (2017) Multidimensional mining of big social data for supporting advanced big data analytics. In: 2017 40th international convention on information and communication technology, electronics and microelectronics (MIPRO). Springer, Opatija, pp 1337–1342
Deloitte (2019) Deloitte’s 2019 global Blockchain survey. [online] Available at: https://www2.deloitte.com/content/dam/Deloitte/se/Documents/risk/DI_2019-global-blockchain-survey.pdf. Accessed 25 Aug 2019
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Naval Research Lab, Washington, DC
Dingledine R, Mathewson N, Syverson P (2005) Challenges in deploying low-latency anonymity (DRAFT). [ebook] Available at: https://pdfs.semanticscholar.org/29d7/36eed9e71d4b1b0781ff30c7cecb1d6b7fa8.pdf?_ga=2.152482289.999236869.1568448972-1206205724.1551784981. Accessed 28 Aug 2019
Döpmann C, Rust S, Tschorsch F (2018) Exploring deployment strategies for the Tor network
Dredge S (2013) What is Tor? A beginner’s guide to the privacy tool. [online] the Guardian. Available at: https://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser. Accessed 14 Jul 2019
ENIGMA (2019) Enigma – securing the decentralized web. [online] Enigma. Available at: https://enigma.co. Accessed 11 Sept 2019
Eyal I, Sirer EG (2013) Majority is not enough: Bitcoin mining is vulnerable. [online] Available at: https://arxiv.org/pdf/1311.0243.pdf. Accessed 5 Aug 2019
Goldwasser S, Micali S, Rackoff C (1985) STOC’85 Proceedings of the seventeenth annual ACM symposium on theory of computing. In: STOC ‘85 proceedings of the seventeenth annual ACM symposium on theory of computing. [online] New York, pp 291–304. Available at: https://doi.org/10.1137/0218012. Accessed 1 Sept 2019
Hanke T, Movahedi M, Williams D (2018) DFINITY technology overview series consensus system. In: 2018 proceedings of technology overview series. DFINITY, Stiftung
Ibarra J, Jahankhani H (2018) Cyber-physical attacks and the value of healthcare data: facing an era of cyber extortion and organised crime
Jesus E, Chicarino V, Albuquerque C, Rocha A (2018) A survey of how to use blockchain to secure internet of things and the stalker attack. In: Security and communication networks
Juzix (n.d.) [online] Available at: http://www.juzix.io/index_en.html. Accessed 12 Aug 2019
Lovecruft I, Kadianakis G, Bini O, Mathewson N (n.d.) guard-spec.txt – torspec – Tor’s protocol specifications. [online] Gitweb.torproject.org. Available at: https://gitweb.torproject.org/torspec.git/tree/guard-spec.txt. Accessed 5 Aug 2019
Marquez J (2018) Tor: hidden service intelligence extraction. [pdf] Available at: https://pdfs.semanticscholar.org/76cd/e9c9fc3bb18e0c2b4fdbe023df07db1de9a2.pdf. Accessed 31 Aug 2019
Mathewson N, Wilson-Brown T, Johnson A (2017) Tor proposal 288: privacy-preserving statistics with Privcount in Tor (Shamir version). [online] gitweb.torproject.org. Available at: https://gitweb.torproject.org/torspec.git/tree/proposals/288-privcount-with-shamir.txt. Accessed 7 Aug 2019
Maxwell G (2013) CoinJoin: Bitcoin privacy for the real world. [online] Available at: https://bitcointalk.org/index.php?topic=279249. Accessed 29 Aug 2019
Monk B, Mitchell J, Frank R, Davies G (2018) Uncovering tor: an examination of the network structure. In: Security and communication networks.
Moore D, Rid T (2016) Cryptopolitik and the Darknet. Survival 58(1):7–38
Moubarak J, Filiol E, Chamoun M (2017) Comparative analysis of blockchain technologies and TOR network: two faces of the same reality? In: 2017 1st cyber security in networking conference (CSNet). [online] Rio de Janeiro, pp 1–9. Available at: https://ieeexplore.ieee.org/document/8242004. Accessed 7 Aug 2019
NIST (2018) Blockchain technology overview. Internal Report 8202. [online] NIST. Available at: https://doi.org/10.6028/NIST.IR.8202. Accessed 5 Sept 2019
NSA (2012) Tor Stinks https://edwardsnowden.com/docs/doc/tor-stinks-presentation.pdf. Accessed 5 Sept 2019
Nurmi J (2019) Understanding the usage of anonymous onion services. [pdf] Available at: https://tutcris.tut.fi/portal/files/18769092/TUNI_nurmi.pdf. Accessed 2 Sep 2019
Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen A (2019) Exploring the attack surface of Blockchain: a systematic overview. [ebook] Available at: https://arxiv.org/pdf/1904.03487.pdf. Accessed 23 Jul 2019
Saleh S, Qadir J, Ilyas M (2018) Shedding light on the dark corners of the internet: a survey of Tor research. J Netw Comput Appl 114:1–28
Salo J (2012) Recent attacks on Tor. [ebook] Available at: http://www.cse.hut.fi/en/publications/B/11/papers/salo.pdf. Accessed 29 Aug 2019
Sayadi S, Rejeb S, Choukair Z (2018) Blockchain challenges and security schemes: a survey
TorProject (2015) The Tor browser. [online] Cdn.ttgtmedia.com. Available at: https://cdn.ttgtmedia.com/rms/pdf/Hiding%20Behind%20the%20Keyboard_Ch%202.pdf. Accessed 7 Sept 2019
TorProject (n.d.) The Tor project | privacy & freedom online. [online] Available at: https://www.torproject.org/. Accessed 22 June 2019
TorProject (n.d.) Torproject’s git repository browser. [online] Gitweb.torproject.org. Available at: https://gitweb.torproject.org/. Accessed 18 July 2019
TorProject (n.d.). Tor’s protocol specifications. [online] Available at: https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt. Accessed 15 July 2019
TorProject (n.d.) Welcome to Tor metrics. [online] Metrics.torproject.org. Available at: https://metrics.torproject.org. Accessed 15 July 2019
Vidrih M (2018) What Is a Block in the Blockchain? [online] Medium. Available at: https://medium.com/datadriveninvestor/what-is-a-block-in-the-blockchain-c7a420270373. Accessed 20 Aug 2019
Walport M (2016) Government Office for science annual report 2016–2017. [online] Available at: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/642307/Government_Office_for_Science_Annual_Report_final_v2_16-17.pdf. Accessed 3 Sep 2019
Wang H, Zheng Z, Xie S, Dai H, Chen X (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352
Wang H, Wang Y, Cao Z, Li Z, Xiong G (2019) An overview of Blockchain security analysis. In: Yun X et al (eds) Cyber security. CNCERT 2018. Communications in computer and information science, vol 970. Springer, Singapore
Winter P, Edmundson A, Roberts L (2018) How do tor users interact with onion services? [ebook] Available at: https://arxiv.org/pdf/1806.11278.pdf. Accessed 8 July 2019
Zhang R, Xue R, Liu L (2019) Security and privacy on Blockchain. [ebook] Available at: https://arxiv.org/pdf/1903.07602.pdf. Accessed 30 Aug 2019
Zyskind G, Nathan O, Pentland A (2015) Enigma: decentralized computation platform with guaranteed
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Petrov, S., Kendzierskyj, S., Jahankhani, H. (2020). Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks. In: Jahankhani, H., Kendzierskyj, S., Chelvachandran, N., Ibarra, J. (eds) Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35746-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-35746-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-35745-0
Online ISBN: 978-3-030-35746-7
eBook Packages: Computer ScienceComputer Science (R0)