Fair anonymity for the Tor network. Diaz, J.; Arroyo, D.; and Rodriguez, F., B. 2014.
abstract   bibtex   
Current anonymizing networks have become an important tool for guaranteeing users' privacy. However, these plat-forms can be used to perform illegitimate actions, which sometimes makes service providers see traffic coming from these networks as a probable threat. In order to solve this problem, we propose to add support for fairness mechanisms to the Tor network. Specifically, by introducing a slight modification to the key negotiation process with the entry and exit nodes, in the shape of group signatures. By means of these signatures, we set up an access control method to prevent misbehaving users to make use of the Tor network. Additionally, we establish a predefined method for denounc-ing illegitimate actions, which impedes the application of the proposed fairness mechanisms as a threat eroding users' privacy. As a direct consequence, traffic coming from Tor would be considered less suspicious by service providers.
@article{
 title = {Fair anonymity for the Tor network},
 type = {article},
 year = {2014},
 identifiers = {[object Object]},
 keywords = {()},
 id = {1d243d61-14d4-3298-bd23-ba651c94f777},
 created = {2018-02-18T19:36:20.194Z},
 file_attached = {false},
 profile_id = {dfcec1e6-4219-36af-9839-f7560679a6b7},
 last_modified = {2018-02-18T19:45:43.701Z},
 read = {false},
 starred = {false},
 authored = {true},
 confirmed = {false},
 hidden = {false},
 citation_key = {Diaz2014d},
 private_publication = {false},
 abstract = {Current anonymizing networks have become an important tool for guaranteeing users' privacy. However, these plat-forms can be used to perform illegitimate actions, which sometimes makes service providers see traffic coming from these networks as a probable threat. In order to solve this problem, we propose to add support for fairness mechanisms to the Tor network. Specifically, by introducing a slight modification to the key negotiation process with the entry and exit nodes, in the shape of group signatures. By means of these signatures, we set up an access control method to prevent misbehaving users to make use of the Tor network. Additionally, we establish a predefined method for denounc-ing illegitimate actions, which impedes the application of the proposed fairness mechanisms as a threat eroding users' privacy. As a direct consequence, traffic coming from Tor would be considered less suspicious by service providers.},
 bibtype = {article},
 author = {Diaz, Jesus and Arroyo, David and Rodriguez, Francisco B}
}
Downloads: 0