There are other works that provide destination
protection. To our knowledge, SAGE (Lin et al.,
2009) is the one which has the most similar archi-
tecture to ours. However, we provide bidirectional
communication while SAGE only allows communica-
tion from user to service. In addition, we note that in
SAGE most of the security lies in a trusted authority
which may revoke user anonymity, while in our sce-
nario the trusted third party has a more limited role.
Technically speaking, both Tor and SAGE define
their own application protocols, while we make use
of standard protocols whenever possible. We believe
that this approach makes it easier to change the un-
derlying technology, thus increasing resiliency to spe-
cific attacks (e.g. eavesdropping by exit nodes in Tor).
Moreover, not being bound to a specific technology
leads to easier deployment, especially in corporate
scenarios. Finally, this choice supports heterogeneous
services which are based on different network tech-
nology.
In addition, anonymous network, another key
component of our solution is the anonymous creden-
tial system which is used to provide anonymous ac-
cess control. These (see, e.g. (Chaum, 1985; Ca-
menisch and Lysyanskaya, 2001)) are cryptographic
tools that allow users to obtain credentials from an
issuer and can use them to access services, but their
communication remains unlinkable even when the
services collude with the issuer. Building on such sys-
tems, it is possible to extend classical authentication
primitives to take into account the privacy aspects of
the users. A particular noteworthy anonymous cre-
dential system is the Direct Anonymous Attestation
(DAA) (Brickell et al., 2004): thanks to its flexibility
its usage has already been proposed in practical so-
lutions based on Transport Layer Security (TLS) and
IPsec (Balfe et al., 2005; Cesena et al., 2010).
Organisation. This work is organised as follows:
Sec. 2 describes our model and assumptions, while
Sec. 3 lists the requirements we want to fulfill. In
Sec. 4 we present our solution which implements
anonymous services. We conclude in Sec. 5.
A full version of this paper containing a more
elaborated discussion of the solution is available at
http://security.polito.it/tc/anon-services/.
2 MODEL AND ASSUMPTIONS
In this section we present the actors that play a role in
our solution, explaining their goals, and we describe
the underlying assumptions.
To describe our problem we introduce a model
which defines the following participants:
• Service (S
i
). This is an entity that offers a ser-
vice. Usually they are provided by companies or
organizations (e.g., banks, hospitals).
• User (U). This is any authorized entity that wants
to access the service S
i
.
• Router (R ). This is an entry point for U to the
Internet. It is controlled by the Internet Service
Provider chosen by U. It is capable of seeing all
the traffic generated and received by U.
• Introduction Points (IP). This is the set of entry
points for U to the service S
i
. Each of them allows
S
i
to be anonymously accessed, namely without
using a direct connection between U and S
i
.
• Gateway (G). This is a gateway which notifies
services that a user want to access a particular S
i
without disclosing any sensitive information.
The attacker is a third party that is able to read,
modify or drop messages between U and S
i
and col-
lect sensitive information. In addition, it can person-
ify one of the participants. It could be the Service
Provider that provides R or another entity which has
physical access to the network.
We base our solution on the following assump-
tions:
Anonymous Network (AN). A network capable of
providing anonymous connections to the services is
available. In particular this network allows a node
to connect to external entities so that no information
that may lead to its identification is revealed. Protec-
tion of privacy of data exchanged is easily provided
by a secure channel. On the other hand, preventing an
observer from gaining information by observing the
connection is much harder. Therefore, in this con-
text, we do not consider the data exchanged, but we
use the anonymous network to protect the information
that an external observer may extract by observing the
connection.
Hidden Services. The anonymous network allows
a node inside the network to offer services to external
entities anonymously. Using this feature, a service
inside AN, can be anonymously contacted by external
entities through some Introduction Points (IP).
Broadcasting. AN is capable of reliably delivering
broadcast messages to its nodes. This feature ensures
that any broadcast message sent by an external entity
is delivered to the nodes without specific delays that
may reveal which node has received the message.
SECRYPT 2010 - International Conference on Security and Cryptography
222