Skip to main content

Privately Waiting – A Usability Analysis of the Tor Anonymity Network

  • Conference paper
Sustainable e-Business Management (AMCIS 2010)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 58))

Included in the following conference series:

Abstract

As the Internet is increasingly absorbing information from the real world it becomes more important to prevent unauthorized collection and abuse of personalized information. At the same time, democratic societies should establish an environment helping not only their own people but also people who face repressive censorship to access public information without being identified or traced. Internet anonymization tools such as Tor offer functionalities to meet this demand.

In practice, anonymization of Internet access can only be achieved by accepting higher latency, i.e., a longer waiting time before a Web site is displayed in the browser, and therefore reducing its usability significantly. Since many users may not be willing to accept this loss of usability, they may refrain from or stop using Tor – at the same time decreasing the anonymity of other users, which depends on shared resources in the Tor user community. In this paper, we quantify the loss of usability by measuring the additional latency of the Tor software and combine our measurements with metrics of the existing Web usability and performance literature. Our findings indicate that there is still a major usability gap induced by Tor, leading to its possible disuse accompanied by a higher risk exposure of Internet users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aas, G.: libwww-perl (2010), http://search.cpan.org/dist/libwww-perl/

  2. AccountingWEB, Is Your Web Site Too Big? (2000), http://www.accountingweb.com/item/29331

  3. Amnesty International, Undermining Freedom of Expression in China – The Role of Yahoo!, Microsoft and Google (2006), http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf

  4. Bhatti, N., Bouch, A., Kuchinsky, A.: Integrating User-perceived Quality into Web Server Design. In: Computer Networks, Amsterdam, Netherlands, vol. 33, pp. 1–16 (1999)

    Google Scholar 

  5. Dinev, T., Hu, Q.: The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies. Journal of the Association for Information Systems 8(7), 386–408 (2007)

    Google Scholar 

  6. Dingledine, R., Murdoch, S.J.: Performance Improvements on Tor – or, why Tor is Slow and What we’re Going to do about it (2009), http://www.torproject.org/press/presskit/2009-03-11-performance.pdf

  7. Fathi, H., Kobara, K., Chakraborty, S.S., Imai, H., Prasad, R.: On the Impact of Security on Latency in WLAN 802.11b. In: Proceedings of the IEEE Global Telecommunications Conference, vol. 3 (2005)

    Google Scholar 

  8. Galletta, D.F., Henry, R., McCoy, S., Polak, P.: Web Site Delays: How Tolerant are Users? Journal of the Association for Information Systems 5 (2004), http://aisel.aisnet.org/jais/vol5/iss1/1

  9. Loesing, K., Murdoch, S.J., Dingledine, R.: A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In: Proceedings of the Workshop on Ethics in Computer Security Research, WECSR 2010 (2010), http://www.cl.cam.ac.uk/~sjm217/papers/wecsr10measuring.pdf

  10. Loesing, K.: Measuring the Tor Network from Public Directory Information. In: 2nd Hot Topics in Privacy Enhancing Technologies, HotPETs (2009), http://www.freehaven.net/~karsten/metrics/measuring-tor-public-dir-info-final.pdf

  11. Lyu, M.R., Lau, L.K.Y.: Firewall Security: Policies, Testing and Performance Evaluation. In: COMPSAC, pp. 116–121 (2000)

    Google Scholar 

  12. Mannan, M., van Oorschot, P.C.: Security and Usability: The Gap in Real-world Online Banking. In: Proceedings of the 2007 Workshop on New Security Paradigms, pp. 1–14 (2008)

    Google Scholar 

  13. Nah, F.F.: A study on Tolerable Waiting Time: How Long are Web Users Willing to Wait? Behaviour & Information Technology 23(3), 153–163 (2004)

    Article  Google Scholar 

  14. Nielson, J.: Top Ten Mistakes. Revisited Three Years Later, Alertbox (May 1999), http://www.useit.com/alertbox/990502.html

  15. Palme, J., Berglund, M.: Anonymity on the Internet (2002), http://people.dsv.su.se/~jpalme/society/anonymity.pdf

  16. Privoxy, Privoxy Home Page (2010), http://www.privoxy.org/

  17. Ramsay, J., Barbesi, A., Preece, J.: A Psychological Investigation of Long Retrieval Times on the World Wide Web. Interacting with Computers 10, 77–86 (1998)

    Article  Google Scholar 

  18. Rose, G., Khoo, H., Straub, D.W.: Current Technological Impediments to Business-to-Consumer Electronic Commerce. Communications of the AIS 1(5), 1 (1999)

    Google Scholar 

  19. Ryan, G., Valverde, M.: Waiting Online: a Review and Research Agenda. Internet Research: Electronic Networking Applications and Policy 13, 195–205 (2003)

    Article  Google Scholar 

  20. Selvidge, P.: How Long is Too Long to Wait for a Website to Load? Usability News 1, 2 (1999), http://www.surl.org/usabilitynews/12/time_delay.asp

    Google Scholar 

  21. Stockport, G.J., Kunnath, G., Sedick, R.: Boo.com – The Path to Failure. Journal of Interactive Marketing 15, 56–70 (2001)

    Article  Google Scholar 

  22. Tor Project, Tor: Anonymity (2010a), http://www.torproject.org/

  23. Tor Project, Tor Metrics Portal (2010b), http://metrics.torproject.org/

  24. Vitone, D.: Anonymous Networks (2008), http://blag.cerebralmind.net/wp-content/uploads/2008/05/tor.pdf

  25. Wright, T.: Security, Privacy, and Anonymity. Crossroads 11(2), 5 (2004)

    Article  Google Scholar 

  26. Zia, T., Zomaya, A., Ababneh, N.: Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks. In: Proceedings of the 2007 International Conference on Sensor Technologies and Applications, pp. 181–185 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fabian, B., Goertz, F., Kunz, S., Müller, S., Nitzsche, M. (2010). Privately Waiting – A Usability Analysis of the Tor Anonymity Network. In: Nelson, M.L., Shaw, M.J., Strader, T.J. (eds) Sustainable e-Business Management. AMCIS 2010. Lecture Notes in Business Information Processing, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15141-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15141-5_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15140-8

  • Online ISBN: 978-3-642-15141-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics