Improved Identity Anonymization Using Hashed-TOR Network
At present, the modern world has been computerized to a huge extent because of the increasing penetration of the Internet. There is a plethora of services available on the web platform these days. Services available may be either legitimate or illegitimate. International borders have been effectively eliminated with the help of the internet and so more and more companies are offering their services across the globe. The physical location of the service provider does not matter anymore. Since every request that is sent to the WWW, every message that is relayed and, in fact, every click is logged somewhere on the internet, it gives rise to a huge knowledge base of user data. This knowledge base can be manipulated and exploited in a number of ways. This poses a great threat to any individual user who wants to utilize the services available on the internet anonymously. A mechanism is required using which individuals can maintain their own privacy from global organizations such as the NSA, Google, etc., which are believed to collect huge amounts of personal user data. The TOR network goes a long way in doing that and abstracts the user from the conventional internet. But TOR itself is not free from vulnerabilities. In this paper, a vulnerability with the ONION routing protocol, which is the spine of the TOR network, has been presented. It has been analyzed and a technique to overcome it has also been discussed to make the TOR network safer for anonymous use on the World Wide Web.
KeywordsTOR ONION routing Internet
- 1.Sarji I, Kayssi A, Chehab, A. Low overhead anonymous routing. In: The proceedings of the 3rd international conference on communications and information technology (ICCIT-2013): Networks and Internet Technologies, Beirut.Google Scholar
- 3.Simon D. Anonymous communication and anonymous cash. In: Advances in cryptology, CRYPTO 2006, (LNCS vol. 1109), Koblitz N editor. New York: Springer; 2006, pp. 61–73, 2006.Google Scholar
- 4.Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE: Naval Research Laboratory; 1998.Google Scholar
- 5.Barker J, Hannay P, Szewczyk P. Using traffic analysis to identify the second generation onion router. Melbourne: VIC IEEE; 2011. p. 72–8.Google Scholar
- 6.Berners-Lee T, Fielding R, Frystyk H. Presented at the hypertext transfer protocol HTTP/1.0, Available FTP: ftp://ds.internic.net/rfc/rfc1945.txt (19xx).
- 7.The Tor Project, Inc., Tor metrics portal: users. https://metrics.torproject.org/users.html (2011). Accessed June 2011.
- 8.The Anonymizer. http://www.anonymizer.com.
- 9.The TOR Project and related documents. https://www.torproject.org/.
- 10.The TOR Source Code. https://github.com/grabhive/Tor.framework.