HiddenTor: Toward a User-Centric and Private Query System for Tor BridgeDB

被引:0
|
作者
Zang, Yichen [1 ]
Cai, Chengjun [2 ]
Dong, Wentao [1 ]
Xu, Lei [1 ]
Wang, Cong [1 ]
机构
[1] City Univ Hong Kong, Hong Kong, Peoples R China
[2] City Univ Hong Kong Dongguan, Dongguan, Peoples R China
关键词
Tor; Private Query; Function Secret Sharing;
D O I
10.1109/ICDCS60910.2024.00119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tor bridges are crucial, unlisted relays designed to enhance system accessibility and circumvent censorship in the Tor network. Currently, Tor BridgeDB will randomly distribute 1-3 bridge relays to the user per request. Yet, those randomly selected bridges may not meet users' specific needs, e.g., adequate bandwidth for large-file sharing in a certain region. Also, a user's usage metadata (e.g., bridge choices) collected by Tor BridgeDB would inevitably reveal sensitive information about the user, discouraging the use of this censorship-circumvention service. In light of them, we introduce HiddenTor, a user-centric and privacy-focused bridge distribution system that allows Tor users to retrieve bridges privately and precisely (i.e., based on a range of specific criteria). At its core, HiddenTor designs a condition-based private information retrieval (PIR) protocol by building atop a suite of lightweight cryptographic primitives (i.e., function secret sharing). Besides, HiddenTor also crafts several optimization designs to balance the trade-offs between query efficiency and service reliability. The extensive experimental results have confirmed the feasibility and practicality of HiddenTor. For example, our prototype can efficiently handle private queries over 3000 bridges in approximately 2 seconds, which can further be reduced to 0.21 seconds using parallel computing techniques.
引用
收藏
页码:1260 / 1271
页数:12
相关论文
共 50 条
  • [1] Query Disambiguation: User-centric Approach
    Feki, Ghada
    Fakhfakh, Rim
    Ben Ammar, Anis
    Ben Amar, Chokri
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (03): : 144 - 156
  • [2] Toward a User-Centric Digital Ecosystem
    Corrigan, Mile
    Miller, H. Gilbert
    IT PROFESSIONAL, 2011, 13 (04) : 12 - 15
  • [3] Challenges toward user-centric multimedia
    Lachner, Janine
    Lorenz, Andreas
    Reiterer, Bernhard
    Zimmermann, Andreas
    Hellwagner, Hermann
    SECOND INTERNATIONAL WORKSHOP ON SEMANTIC MEDIA ADAPTATION AND PERSONALIZATION, PROCEEDINGS, 2007, : 159 - +
  • [4] Toward User-Centric Recommender Systems
    Boutilier, Craig
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS (AAMAS' 18), 2018, : 2 - 2
  • [5] PrudentExposure: A private and user-centric service discovery protocol
    Zhu, F
    Mutka, M
    Ni, L
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2004, : 329 - 338
  • [6] Benchmarking Private Cloud Performance with User-Centric Metrics
    Sun, Bin
    Hall, Brian
    Wang, Hu
    Zhang, Da Wei
    Ding, Kai
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 311 - 318
  • [7] SaveMe: User-centric Cloud System
    Song, Gyuwon
    Kim, Suhyun
    Seo, Dongmahn
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 158 - 159
  • [8] Toward User-Centric Management of Organizational Information Systems
    Geczy, Peter
    Izumi, Noriaki
    Akaho, Shotaro
    Hasida, Koiti
    KMICE 2008 - KNOWLEDGE MANAGEMENT INTERNATIONAL CONFERENCE, 2008 - TRANSFERRING, MANAGING AND MAINTAINING KNOWLEDGE FOR NATION CAPACITY DEVELOPMENT, 2008, : 282 - 286
  • [9] A Privacy-Aware and User-Centric Approach for Query Processing in Cloud
    Samanthula, Bharath K.
    Liporace, James
    Issiov, Martin
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2018, : 54 - 59
  • [10] User-Centric Private Matching for eHealth Networks - A Social Perspective
    Guo, Linke
    Liu, Xinxin
    Fang, Yuguang
    Li, Xiaolin
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 732 - 737