A Systematic Review of Anonymous Communication Systems

Ramzi A. Haraty, Maram Assi, Imad Rahal

2017

Abstract

Privacy and anonymity are important concepts in the field of communication. Internet users seek to adopt protective measures to ensure the privacy and security of the data transmitted over the network. Encryption is one technique to secure critical information and protect its confidentiality. Although there exist many encryption algorithms, hiding the identity of the sender can only be achieved through an anonymous network. Different classifications of anonymous networks exist. Latency level and system model architecture are two essential criteria. In this paper, we present a description of a set of anonymous systems including NetCamo, TOR, I2P and many others. We will show how these systems work and contrast the advantages and disadvantages of each one of them.

References

  1. A. A. M Direct. Retrieved on February 11, 2017 from http://aamdirect.sourceforge.net/.
  2. Atlassian Documentation. Retrieved on February 11, 2017 from https://confluence.atlassian.com/display/ CROWD/Crowd+2.2.2+Release+Notes.
  3. Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, pp. 84-90.
  4. Erdin, E., Zachor, C., and Gunes, M. 2015. How to find hidden users: A survey of attacks on anonymity networks. IEEE Communications Surveys & Tutorials pp. 2296-2316.
  5. Guan, Y., Fu, X., Xuan, D., Shenoy, P., Bettati, R., and Zhao, W. (n.d.). 2001. NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Transactions on Systems, Man, and Cybernetics - Part A, pp. 253-265.
  6. Guide (n.d). Retrieved on February 11, 2017 from https:// trac.i2p2.de/attachment/wiki/Content/i2prouting.png.
  7. Haraty, R. and Zantout, B. 2014. The TOR data communication system - a survey. In Proceedings of the Sixth IEEE International Workshop on Performance Evaluation of Communications in Distributed Systems and Web based Service Architectures (PEDISWESA'2014). Madeira, Portugal.
  8. Haraty, R. and Zantout, B. 2014. The TOR data communication system. Journal of Communications and Networks, 16 (4) (2014) ISSN 1229-2370.
  9. Haraty, R. and Zantout, B. 2015. A Collaborative-based Approach to Avoiding Traffic Analysis and Assuring Data Integrity in Anonymous Systems. Computers in Human Behavior Journal. Volume 51, Part B, pp. 780-791.
  10. Haraty, R. and Zantout, B. 2015. The NetCamo data communication system. Advanced Science Letters. Volume 21, Number 3, pp. 472-477.
  11. Mittal, P., and Borisov, N. 2012. Information leaks in structured peer-to-peer anonymous communication systems. ACM Transactions on Information and System Security, pp. 1-28.
  12. Skogh, H., Haeggstrom, J., Ghodsi, A., and Ayani, R. 2006. Fast Freenet: Improving Freenet performance by preferential partition routing and file mesh propagation. In Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid.
  13. Sui, H., Wang, J., Chen, J., and Chen, S. 2003. An analysis of forwarding mechanism in crowds. In Proceedings of the IEEE International Conference on Communications.
  14. Sysmagazine. Anonymous networks and timing attacks: Tarzan and MorphMix. Retrieved on February 11, 2017 from: http://sysmagazine.com/posts/117586/.
  15. Timpanaro, J., Chrisment, I., and Festor, O. 2014. Groupbased characterization for the I2P anonymous filesharing environment. In Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS).
  16. Tor - The Onion HTTP Router. Retrieved on February 11, 2017from http://tohr.sourceforge.net/.
  17. Wiangsripanawan, R., Susilo. W., Safavi-Naini, R. (2007) Design principles for low latency anonymous network systems secure against timing attacks. In Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, Balart, Australia.
  18. Zantout, B. and Haraty R. 2011. I2P Data Communication System. In Proceedings of the Tenth International Conference on Networks (ICN 2011), pp. 401-409, St. Maarten, The Netherlands Antilles.
  19. Zeinalipour-Yazti, D., Kalogeraki, V., and Gunopulos, D. 2003. Information Retrieval in Peer-to-Peer Systems. University of California at Riverside. Available: http:// www.cs.ucr.edu/csyiazti/papers/cise2003/cise2003.pdf.
  20. Zhang, J., Duan, H., Liu, W., and Wu, J. 2011. Anonymity analysis of P2P anonymous communication systems. Computer Communications, pp. 358-366.
Download


Paper Citation


in Harvard Style

Haraty R., Assi M. and Rahal I. (2017). A Systematic Review of Anonymous Communication Systems . In Proceedings of the 19th International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-248-6, pages 211-220. DOI: 10.5220/0006216802110220


in Bibtex Style

@conference{iceis17,
author={Ramzi A. Haraty and Maram Assi and Imad Rahal},
title={A Systematic Review of Anonymous Communication Systems},
booktitle={Proceedings of the 19th International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2017},
pages={211-220},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006216802110220},
isbn={978-989-758-248-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 19th International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - A Systematic Review of Anonymous Communication Systems
SN - 978-989-758-248-6
AU - Haraty R.
AU - Assi M.
AU - Rahal I.
PY - 2017
SP - 211
EP - 220
DO - 10.5220/0006216802110220