• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tan Qingfeng, Shi Jinqiao, Fang Binxing, Guo Li, Zhang Wentao, Wang Xuebin, Wei Bingjie. Towards Measuring Unobservability in Anonymous Communication Systems[J]. Journal of Computer Research and Development, 2015, 52(10): 2373-2381. DOI: 10.7544/issn1000-1239.2015.20150562
Citation: Tan Qingfeng, Shi Jinqiao, Fang Binxing, Guo Li, Zhang Wentao, Wang Xuebin, Wei Bingjie. Towards Measuring Unobservability in Anonymous Communication Systems[J]. Journal of Computer Research and Development, 2015, 52(10): 2373-2381. DOI: 10.7544/issn1000-1239.2015.20150562

Towards Measuring Unobservability in Anonymous Communication Systems

More Information
  • Published Date: September 30, 2015
  • Anonymous communication technique is one of the main privacy-preserving techniques, which has been widely used to protect Internet users’ privacy. However, existing anonymous communication systems are particularly vulnerable to traffic analysis, and researchers have been improving unobservability of systems against Internet censorship and surveillance. However, how to quantify the degree of unobservability is a key challenge in anonymous communication systems. We model anonymous communication systems as an alternating turing machine, and analyze adversaries’ threat model. Based on this model, this paper proposes a relative entropy approach that allows to quantify the degree of unobservability for anonymous communication systems. The degree of unobservability is based on the probabilities of the observed flow patterns by attackers. We also apply this approach to measure the pluggable transports of TOR, and show how to calculate it for comparing the level of unobservability of these systems. The experimental results show that it is useful to evaluate the level of unobservability of anonymous communication systems. Finally, we present the conclusion and discuss future work on measuring unobservability in anonymous communication systems.
  • Related Articles

    [1]Hu Yunshu, Zhou Jun, Cao Zhenfu, Dong Xiaolei. Lightweight Multi-User Verifiable Privacy-Preserving Gene Sequence Analysis Scheme[J]. Journal of Computer Research and Development, 2024, 61(10): 2448-2466. DOI: 10.7544/issn1000-1239.202440453
    [2]Chen Yan, Gao Zhenguo, Wang Haijun, Ouyang Yun, Gou Jin. Node Localization Protocol with Adjustable Privacy Protection Capability[J]. Journal of Computer Research and Development, 2022, 59(9): 2075-2088. DOI: 10.7544/issn1000-1239.20210009
    [3]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [4]Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi. Webpage Fingerprinting Identification on Tor: A Survey[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498
    [5]Wang Bin, Zhang Lei, Zhang Guoyin. A Gradual Sensitive Indistinguishable Based Location Privacy Protection Scheme[J]. Journal of Computer Research and Development, 2020, 57(3): 616-630. DOI: 10.7544/issn1000-1239.2020.20190086
    [6]Huang Haiping, Zhang Dongjun, Wang Kai, Zhu Yikai, Wang Ruchuan. Weighted Large-Scale Social Network Data Privacy Protection Method[J]. Journal of Computer Research and Development, 2020, 57(2): 363-377. DOI: 10.7544/issn1000-1239.2020.20190018
    [7]Zhang Liancheng, Wang Yu, Kong Yazhou, Qiu Han. Survey on Security Threats and Countermeasures of Network Flow Watermarking[J]. Journal of Computer Research and Development, 2018, 55(8): 1785-1799. DOI: 10.7544/issn1000-1239.2018.20170448
    [8]Yan Xixi, Liu Yuan, Li Zichen, Tang Yongli. Multi-Authority Attribute-Based Encryption Scheme with Privacy Protection[J]. Journal of Computer Research and Development, 2018, 55(4): 846-853. DOI: 10.7544/issn1000-1239.2018.20161043
    [9]Zhang Honglei, Shi Yuliang, Zhang Shidong, Zhou Zhongmin, Cui Lizhen. A Privacy Protection Mechanism for Dynamic Data Based on Partition-Confusion[J]. Journal of Computer Research and Development, 2016, 53(11): 2454-2464. DOI: 10.7544/issn1000-1239.2016.20150553
    [10]Wu Zhenqiang, Ma Jianfeng. A Dynamic Mix Anonymity Algorithm for Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2007, 44(4): 560-566.

Catalog

    Article views (11518) PDF downloads (4608) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return