Skip to main content

Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks

  • Chapter
  • First Online:
Book cover Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity

Abstract

The huge increase in data usage and the rapid development of new technologies such as cloud, IoT, and has also led to the exponential increase in cyber threats online. Anonymity and privacy services have equally seen an exceptional growth rate since the introduction of Blockchain and Tor network, as more individuals demand anonymous services away from the traditional centralised offerings, but also seek more security and privacy. This chapter will review quantitative analysis undertaken to critically evaluate Tor and Blockchain as emerging technologies, by an in-depth comparison of their security and privacy properties. Further analysis is undertaken by utilising network and data points that highlight the necessity of urgent deployment of innovative methods to protect users’ anonymity utilising Blockchain application over the Tor network. By undertaking experimental analysis, it is possible to determine Tor packets from common packets and raises the question on possibilities of cyberattacks leading to loss of personable identifiable information (PII) and de-anonymization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al Jawaheri H, Al Sabah M, Boshmaf Y, Erbad A (2019) Deanonymizing Tor hidden service users through Bitcoin transactions analysis. [online] Available at: https://arxiv.org/pdf/1801.07501.pdf. Accessed 2 Sept 2019

  2. AlSabah M, Goldberg I (2015) Performance and security improvements for Tor: a survey. [ebook] Available at: https://eprint.iacr.org/2015/235.pdf. Accessed 25 July 2019

  3. Anwar U (2017) Blockchain: anonymisation techniques within distributed ledgers

    Google Scholar 

  4. Anwar H (2018) Consensus algorithms: the root of the Blockchain Technology. [online] 101 Blockchains. Available at: https://101blockchains.com/consensus-algorithms-blockchain/#2. Accessed 18 Aug 2019

  5. Baker J, Steiner J (2015) Blockchain: the solution for transparency in product. [online] Provenance. Available at: https://www.provenance.org/whitepaper. Accessed 22 Aug 2019

  6. Bayer D, Haber S, Stornetta W (1992) Improving the efficiency and reliability of digital time-stamping. [ebook] Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.4891&rep=rep1&type=pdf. Accessed 1 Aug 2019

  7. Ben-Sasson E, Chiesa A, Genkin D, Tromer E, Virza M (2013) SNARKs for C: verifying program executions succinctly and in zero knowledge. [ebook] Available at: https://eprint.iacr.org/2013/507.pdf. Accessed 28 July 2019

  8. Biryukov A, Pustogarov I (2015) Bitcoin over Tor isn’t a good idea. IEEE Symp Secur Priv 2015:122–134

    Google Scholar 

  9. Biryukov A, Pustogarov I (2015) Proof-of-work as anonymous micropayment: rewarding a Tor relay? [ebook] Available at: https://eprint.iacr.org/2014/1011.pdf. Accessed 15 Aug 2019

  10. Biryukov A, Pustogarov I, Thill F, Weinmann R (2013) Trawling for Tor hidden services: detection, measurement, de-anonymisation. In: Symposium on security and privacy. IEEE, pp 80–94

    Google Scholar 

  11. Bissoli A, Farinacci F, Prosseda A, Veterini S (2017) Deanonymize Tor hidden services master. In: Engineering of Computer Science. Web Security and Privacy

    Google Scholar 

  12. Bitansky N, Canetti R, Chiesa A, Tromer E (2013) Recursive composition and bootstrapping for SNARKs and proof-carrying data. In: Proceedings of the 45th ACM symposium on the theory of computing, STOC’13, pp. 111–120

    Google Scholar 

  13. Bonneau J, Narayanan A, Miller A, Clark J, Kroll J, Felten E (2014) Mixcoin. Anonymity for Bitcoin with accountable mixes. [pdf] Available at: https://eprint.iacr.org/2014/077.pdf. Accessed 20 Jul 2019

  14. Brown D (2000) The exact security of ECDSA, Technical report CORR 2000-54. Department of C&O, University of Waterloo, Waterloo. Available at: https://www.cacr.math.uwaterloo.ca. Accessed 19 Aug 2019

    Google Scholar 

  15. Çalışkan E, Minárik T, Osula A (2015) Technical and legal overview of the Tor anonymity network

    Google Scholar 

  16. Cambiaso E, Vaccari I, Patti L, Aiello M (2017) Darknet security: a categorization of attacks to the Tor network. [ebook] IEEE. Available at: http://ceur-ws.org/Vol-2315/paper10.pdf. Accessed 2 Sept 2019

  17. Chaum D, Heist E (1991) Group signatures. In: Davies D (ed) Advances in cryptology – EUROCRYPT’91. Springer, Berlin/Heidelberg, pp 257–265

    Google Scholar 

  18. Cheng R, Zhang F, Kos J, He W, Hynes N, Johnson N, Juels A, Miller A, Song D (2018) Ekiden: a platform for confidentiality-preserving, trustworthy, and performant smart contract execution

    Google Scholar 

  19. Choudhary D (2018) The onion routing-the good and the bad. [pdf] Available at: https://www.researchgate.net/publication/327867486_The_Onion_Routing-The_Good_and_ The_Bad/citation/download. Accessed 12 Aug 2019

  20. Cuzzocrea A (2017) Multidimensional mining of big social data for supporting advanced big data analytics. In: 2017 40th international convention on information and communication technology, electronics and microelectronics (MIPRO). Springer, Opatija, pp 1337–1342

    Chapter  Google Scholar 

  21. Deloitte (2019) Deloitte’s 2019 global Blockchain survey. [online] Available at: https://www2.deloitte.com/content/dam/Deloitte/se/Documents/risk/DI_2019-global-blockchain-survey.pdf. Accessed 25 Aug 2019

  22. Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Naval Research Lab, Washington, DC

    Book  Google Scholar 

  23. Dingledine R, Mathewson N, Syverson P (2005) Challenges in deploying low-latency anonymity (DRAFT). [ebook] Available at: https://pdfs.semanticscholar.org/29d7/36eed9e71d4b1b0781ff30c7cecb1d6b7fa8.pdf?_ga=2.152482289.999236869.1568448972-1206205724.1551784981. Accessed 28 Aug 2019

  24. Döpmann C, Rust S, Tschorsch F (2018) Exploring deployment strategies for the Tor network

    Google Scholar 

  25. Dredge S (2013) What is Tor? A beginner’s guide to the privacy tool. [online] the Guardian. Available at: https://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser. Accessed 14 Jul 2019

  26. ENIGMA (2019) Enigma – securing the decentralized web. [online] Enigma. Available at: https://enigma.co. Accessed 11 Sept 2019

  27. Eyal I, Sirer EG (2013) Majority is not enough: Bitcoin mining is vulnerable. [online] Available at: https://arxiv.org/pdf/1311.0243.pdf. Accessed 5 Aug 2019

  28. Goldwasser S, Micali S, Rackoff C (1985) STOC’85 Proceedings of the seventeenth annual ACM symposium on theory of computing. In: STOC ‘85 proceedings of the seventeenth annual ACM symposium on theory of computing. [online] New York, pp 291–304. Available at: https://doi.org/10.1137/0218012. Accessed 1 Sept 2019

  29. Hanke T, Movahedi M, Williams D (2018) DFINITY technology overview series consensus system. In: 2018 proceedings of technology overview series. DFINITY, Stiftung

    Google Scholar 

  30. Ibarra J, Jahankhani H (2018) Cyber-physical attacks and the value of healthcare data: facing an era of cyber extortion and organised crime

    Google Scholar 

  31. Jesus E, Chicarino V, Albuquerque C, Rocha A (2018) A survey of how to use blockchain to secure internet of things and the stalker attack. In: Security and communication networks

    Google Scholar 

  32. Juzix (n.d.) [online] Available at: http://www.juzix.io/index_en.html. Accessed 12 Aug 2019

  33. Lovecruft I, Kadianakis G, Bini O, Mathewson N (n.d.) guard-spec.txt – torspec – Tor’s protocol specifications. [online] Gitweb.torproject.org. Available at: https://gitweb.torproject.org/torspec.git/tree/guard-spec.txt. Accessed 5 Aug 2019

  34. Marquez J (2018) Tor: hidden service intelligence extraction. [pdf] Available at: https://pdfs.semanticscholar.org/76cd/e9c9fc3bb18e0c2b4fdbe023df07db1de9a2.pdf. Accessed 31 Aug 2019

  35. Mathewson N, Wilson-Brown T, Johnson A (2017) Tor proposal 288: privacy-preserving statistics with Privcount in Tor (Shamir version). [online] gitweb.torproject.org. Available at: https://gitweb.torproject.org/torspec.git/tree/proposals/288-privcount-with-shamir.txt. Accessed 7 Aug 2019

  36. Maxwell G (2013) CoinJoin: Bitcoin privacy for the real world. [online] Available at: https://bitcointalk.org/index.php?topic=279249. Accessed 29 Aug 2019

  37. Monk B, Mitchell J, Frank R, Davies G (2018) Uncovering tor: an examination of the network structure. In: Security and communication networks.

    Google Scholar 

  38. Moore D, Rid T (2016) Cryptopolitik and the Darknet. Survival 58(1):7–38

    Article  Google Scholar 

  39. Moubarak J, Filiol E, Chamoun M (2017) Comparative analysis of blockchain technologies and TOR network: two faces of the same reality? In: 2017 1st cyber security in networking conference (CSNet). [online] Rio de Janeiro, pp 1–9. Available at: https://ieeexplore.ieee.org/document/8242004. Accessed 7 Aug 2019

  40. NIST (2018) Blockchain technology overview. Internal Report 8202. [online] NIST. Available at: https://doi.org/10.6028/NIST.IR.8202. Accessed 5 Sept 2019

  41. NSA (2012) Tor Stinks https://edwardsnowden.com/docs/doc/tor-stinks-presentation.pdf. Accessed 5 Sept 2019

  42. Nurmi J (2019) Understanding the usage of anonymous onion services. [pdf] Available at: https://tutcris.tut.fi/portal/files/18769092/TUNI_nurmi.pdf. Accessed 2 Sep 2019

  43. Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen A (2019) Exploring the attack surface of Blockchain: a systematic overview. [ebook] Available at: https://arxiv.org/pdf/1904.03487.pdf. Accessed 23 Jul 2019

  44. Saleh S, Qadir J, Ilyas M (2018) Shedding light on the dark corners of the internet: a survey of Tor research. J Netw Comput Appl 114:1–28

    Article  Google Scholar 

  45. Salo J (2012) Recent attacks on Tor. [ebook] Available at: http://www.cse.hut.fi/en/publications/B/11/papers/salo.pdf. Accessed 29 Aug 2019

  46. Sayadi S, Rejeb S, Choukair Z (2018) Blockchain challenges and security schemes: a survey

    Google Scholar 

  47. TorProject (2015) The Tor browser. [online] Cdn.ttgtmedia.com. Available at: https://cdn.ttgtmedia.com/rms/pdf/Hiding%20Behind%20the%20Keyboard_Ch%202.pdf. Accessed 7 Sept 2019

  48. TorProject (n.d.) The Tor project | privacy & freedom online. [online] Available at: https://www.torproject.org/. Accessed 22 June 2019

  49. TorProject (n.d.) Torproject’s git repository browser. [online] Gitweb.torproject.org. Available at: https://gitweb.torproject.org/. Accessed 18 July 2019

  50. TorProject (n.d.). Tor’s protocol specifications. [online] Available at: https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt. Accessed 15 July 2019

  51. TorProject (n.d.) Welcome to Tor metrics. [online] Metrics.torproject.org. Available at: https://metrics.torproject.org. Accessed 15 July 2019

  52. Vidrih M (2018) What Is a Block in the Blockchain? [online] Medium. Available at: https://medium.com/datadriveninvestor/what-is-a-block-in-the-blockchain-c7a420270373. Accessed 20 Aug 2019

  53. Walport M (2016) Government Office for science annual report 2016–2017. [online] Available at: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/642307/Government_Office_for_Science_Annual_Report_final_v2_16-17.pdf. Accessed 3 Sep 2019

  54. Wang H, Zheng Z, Xie S, Dai H, Chen X (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352

    Article  Google Scholar 

  55. Wang H, Wang Y, Cao Z, Li Z, Xiong G (2019) An overview of Blockchain security analysis. In: Yun X et al (eds) Cyber security. CNCERT 2018. Communications in computer and information science, vol 970. Springer, Singapore

    Google Scholar 

  56. Winter P, Edmundson A, Roberts L (2018) How do tor users interact with onion services? [ebook] Available at: https://arxiv.org/pdf/1806.11278.pdf. Accessed 8 July 2019

  57. Zhang R, Xue R, Liu L (2019) Security and privacy on Blockchain. [ebook] Available at: https://arxiv.org/pdf/1903.07602.pdf. Accessed 30 Aug 2019

  58. Zyskind G, Nathan O, Pentland A (2015) Enigma: decentralized computation platform with guaranteed

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Jahankhani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Petrov, S., Kendzierskyj, S., Jahankhani, H. (2020). Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks. In: Jahankhani, H., Kendzierskyj, S., Chelvachandran, N., Ibarra, J. (eds) Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35746-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-35746-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-35745-0

  • Online ISBN: 978-3-030-35746-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics