Advertisement

Improved Identity Anonymization Using Hashed-TOR Network

  • Gaurav OjhaEmail author
  • Rakesh Singh
  • Anupam Shukla
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 394)

Abstract

At present, the modern world has been computerized to a huge extent because of the increasing penetration of the Internet. There is a plethora of services available on the web platform these days. Services available may be either legitimate or illegitimate. International borders have been effectively eliminated with the help of the internet and so more and more companies are offering their services across the globe. The physical location of the service provider does not matter anymore. Since every request that is sent to the WWW, every message that is relayed and, in fact, every click is logged somewhere on the internet, it gives rise to a huge knowledge base of user data. This knowledge base can be manipulated and exploited in a number of ways. This poses a great threat to any individual user who wants to utilize the services available on the internet anonymously. A mechanism is required using which individuals can maintain their own privacy from global organizations such as the NSA, Google, etc., which are believed to collect huge amounts of personal user data. The TOR network goes a long way in doing that and abstracts the user from the conventional internet. But TOR itself is not free from vulnerabilities. In this paper, a vulnerability with the ONION routing protocol, which is the spine of the TOR network, has been presented. It has been analyzed and a technique to overcome it has also been discussed to make the TOR network safer for anonymous use on the World Wide Web.

Keywords

TOR ONION routing Internet 

References

  1. 1.
    Sarji I, Kayssi A, Chehab, A. Low overhead anonymous routing. In: The proceedings of the 3rd international conference on communications and information technology (ICCIT-2013): Networks and Internet Technologies, Beirut.Google Scholar
  2. 2.
  3. 3.
    Simon D. Anonymous communication and anonymous cash. In: Advances in cryptology, CRYPTO 2006, (LNCS vol. 1109), Koblitz N editor. New York: Springer; 2006, pp. 61–73, 2006.Google Scholar
  4. 4.
    Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE: Naval Research Laboratory; 1998.Google Scholar
  5. 5.
    Barker J, Hannay P, Szewczyk P. Using traffic analysis to identify the second generation onion router. Melbourne: VIC IEEE; 2011. p. 72–8.Google Scholar
  6. 6.
    Berners-Lee T, Fielding R, Frystyk H. Presented at the hypertext transfer protocol HTTP/1.0, Available FTP: ftp://ds.internic.net/rfc/rfc1945.txt (19xx).
  7. 7.
    The Tor Project, Inc., Tor metrics portal: users. https://metrics.torproject.org/users.html (2011). Accessed June 2011.
  8. 8.
    The Anonymizer. http://www.anonymizer.com.
  9. 9.
    The TOR Project and related documents. https://www.torproject.org/.
  10. 10.

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of ICTABV-IIITMGwaliorIndia

Personalised recommendations