Abstract
As the Internet is increasingly absorbing information from the real world it becomes more important to prevent unauthorized collection and abuse of personalized information. At the same time, democratic societies should establish an environment helping not only their own people but also people who face repressive censorship to access public information without being identified or traced. Internet anonymization tools such as Tor offer functionalities to meet this demand.
In practice, anonymization of Internet access can only be achieved by accepting higher latency, i.e., a longer waiting time before a Web site is displayed in the browser, and therefore reducing its usability significantly. Since many users may not be willing to accept this loss of usability, they may refrain from or stop using Tor – at the same time decreasing the anonymity of other users, which depends on shared resources in the Tor user community. In this paper, we quantify the loss of usability by measuring the additional latency of the Tor software and combine our measurements with metrics of the existing Web usability and performance literature. Our findings indicate that there is still a major usability gap induced by Tor, leading to its possible disuse accompanied by a higher risk exposure of Internet users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aas, G.: libwww-perl (2010), http://search.cpan.org/dist/libwww-perl/
AccountingWEB, Is Your Web Site Too Big? (2000), http://www.accountingweb.com/item/29331
Amnesty International, Undermining Freedom of Expression in China – The Role of Yahoo!, Microsoft and Google (2006), http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf
Bhatti, N., Bouch, A., Kuchinsky, A.: Integrating User-perceived Quality into Web Server Design. In: Computer Networks, Amsterdam, Netherlands, vol. 33, pp. 1–16 (1999)
Dinev, T., Hu, Q.: The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies. Journal of the Association for Information Systems 8(7), 386–408 (2007)
Dingledine, R., Murdoch, S.J.: Performance Improvements on Tor – or, why Tor is Slow and What we’re Going to do about it (2009), http://www.torproject.org/press/presskit/2009-03-11-performance.pdf
Fathi, H., Kobara, K., Chakraborty, S.S., Imai, H., Prasad, R.: On the Impact of Security on Latency in WLAN 802.11b. In: Proceedings of the IEEE Global Telecommunications Conference, vol. 3 (2005)
Galletta, D.F., Henry, R., McCoy, S., Polak, P.: Web Site Delays: How Tolerant are Users? Journal of the Association for Information Systems 5 (2004), http://aisel.aisnet.org/jais/vol5/iss1/1
Loesing, K., Murdoch, S.J., Dingledine, R.: A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In: Proceedings of the Workshop on Ethics in Computer Security Research, WECSR 2010 (2010), http://www.cl.cam.ac.uk/~sjm217/papers/wecsr10measuring.pdf
Loesing, K.: Measuring the Tor Network from Public Directory Information. In: 2nd Hot Topics in Privacy Enhancing Technologies, HotPETs (2009), http://www.freehaven.net/~karsten/metrics/measuring-tor-public-dir-info-final.pdf
Lyu, M.R., Lau, L.K.Y.: Firewall Security: Policies, Testing and Performance Evaluation. In: COMPSAC, pp. 116–121 (2000)
Mannan, M., van Oorschot, P.C.: Security and Usability: The Gap in Real-world Online Banking. In: Proceedings of the 2007 Workshop on New Security Paradigms, pp. 1–14 (2008)
Nah, F.F.: A study on Tolerable Waiting Time: How Long are Web Users Willing to Wait? Behaviour & Information Technology 23(3), 153–163 (2004)
Nielson, J.: Top Ten Mistakes. Revisited Three Years Later, Alertbox (May 1999), http://www.useit.com/alertbox/990502.html
Palme, J., Berglund, M.: Anonymity on the Internet (2002), http://people.dsv.su.se/~jpalme/society/anonymity.pdf
Privoxy, Privoxy Home Page (2010), http://www.privoxy.org/
Ramsay, J., Barbesi, A., Preece, J.: A Psychological Investigation of Long Retrieval Times on the World Wide Web. Interacting with Computers 10, 77–86 (1998)
Rose, G., Khoo, H., Straub, D.W.: Current Technological Impediments to Business-to-Consumer Electronic Commerce. Communications of the AIS 1(5), 1 (1999)
Ryan, G., Valverde, M.: Waiting Online: a Review and Research Agenda. Internet Research: Electronic Networking Applications and Policy 13, 195–205 (2003)
Selvidge, P.: How Long is Too Long to Wait for a Website to Load? Usability News 1, 2 (1999), http://www.surl.org/usabilitynews/12/time_delay.asp
Stockport, G.J., Kunnath, G., Sedick, R.: Boo.com – The Path to Failure. Journal of Interactive Marketing 15, 56–70 (2001)
Tor Project, Tor: Anonymity (2010a), http://www.torproject.org/
Tor Project, Tor Metrics Portal (2010b), http://metrics.torproject.org/
Vitone, D.: Anonymous Networks (2008), http://blag.cerebralmind.net/wp-content/uploads/2008/05/tor.pdf
Wright, T.: Security, Privacy, and Anonymity. Crossroads 11(2), 5 (2004)
Zia, T., Zomaya, A., Ababneh, N.: Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks. In: Proceedings of the 2007 International Conference on Sensor Technologies and Applications, pp. 181–185 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fabian, B., Goertz, F., Kunz, S., Müller, S., Nitzsche, M. (2010). Privately Waiting – A Usability Analysis of the Tor Anonymity Network. In: Nelson, M.L., Shaw, M.J., Strader, T.J. (eds) Sustainable e-Business Management. AMCIS 2010. Lecture Notes in Business Information Processing, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15141-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-15141-5_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15140-8
Online ISBN: 978-3-642-15141-5
eBook Packages: Computer ScienceComputer Science (R0)