Anonymous Networking under Memory Constraints

被引:0
|
作者
Venkitasubramaniam, Parv [1 ]
机构
[1] Lehigh Univ, Bethlehem, PA 18015 USA
关键词
Anonymity; Traffic Analysis; Buffer; Equivocation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Chaum Mixes, a class of proxy servers or relays which use randomized reordering and batching of packets from multiple users to provide source anonymity, have been used extensively for anonymous remailing, browsing and peer-to-peer file sharing. In this work, an analytical framework is proposed to measure and optimize the anonymity provided by mixing strategies when the mixes have memory restrictions. Specifically, an information-theoretic metric of anonymity is proposed for buffer-constrained mixes, and using Poisson traffic models, fundamental trade-offs between achievable anonymity and the buffer size are studied analytically. In particular, a buffer-constrained mixing strategy is proposed that is asymptotically optimal and obtains the best convergence rate amongst known mixing strategies. The strategy is generalized to a network of mixes, where the achievable anonymity is expressed as a function of the topology and the buffer constraints of individual mixes.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Towards a Theory of Anonymous Networking
    Ghaderi, J.
    Srikant, R.
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [2] GAP - Practical anonymous networking
    Bennett, K
    Grothoff, C
    PRIVACY ENHANCING TECHNOLOGIES, 2003, 2760 : 141 - 160
  • [3] Anonymous networking amidst eavesdroppers
    Venkitasubramaniam, Parvathinathan
    He, Ting
    Tong, Lang
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2770 - 2784
  • [4] Anonymous Networking amidst Active Adversaries
    Venkitasubramaniam, Parv
    Tong, Lang
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2543 - +
  • [5] Multi-robot exploration under the constraints of wireless networking
    Rooker, Martijn N.
    Birk, Andreas
    CONTROL ENGINEERING PRACTICE, 2007, 15 (04) : 435 - 445
  • [6] Networking with secrecy constraints
    Venkitasubramaniam, Parvathinathan
    He, Ting
    Tong, Lang
    MILCOM 2006, VOLS 1-7, 2006, : 3439 - +
  • [7] Embedded system synthesis under memory constraints
    Madsen, J
    Bjorn-Jorgensen, P
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL WORKSHOP ON HARDWARE/SOFTWARE CODESIGN (CODES'99), 1999, : 188 - 192
  • [8] Collective input/output under memory constraints
    Lu, Yin
    Chen, Yong
    Zhuang, Yu
    Liu, Jialin
    Thakur, Rajeev
    INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS, 2015, 29 (01): : 21 - 36
  • [9] Task assignment and scheduling under memory constraints
    Szymanek, R
    Kuchcinski, K
    PROCEEDINGS OF THE 26TH EUROMICRO CONFERENCE, VOLS I AND II, 2000, : 84 - 90
  • [10] Searching game trees under memory constraints
    Bhattacharya, S
    Bagchi, A
    PROCEEDINGS OF THE THIRTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE, VOLS 1 AND 2, 1996, : 222 - 227