You are on page 1of 17

COLLEGE OF APPLIED SCIENCES & PROFESSIONAL STUDIES,

CHIKHLI
SEMINAR TOPIC
ON
Edge Computing
BACHELOR OF COMPUTER APPLICATION (B.C.A)
3RD YEAR

GUIDED BY:- 6TH SEM PRESENTED BY:-


MRS. KRUPALI
MR.SAHIL P. PATEL
PATEL
Edge Computing
Presented By – Sahil P. Patel
Content Organization

Introduction to Anonymous Communication


1. Introduction
2. Anonymity using a Mix and Mix Networks
3. Onion Routing
4. TOR
5. Applications of Anonymous System
6. Conclusion
Introduction
• Anonymous communication is a necessary measure to protect the privacy of users, and
protect computer systems against traffic analysis.
• Anonymity systems seeks to build an infrastructure running on top of the existing Internet
protocols that allows people to communicate with each other without necessarily
revealing their personal network identifiers.
• The
basic idea behind any anonymous system is to provide unlikability between
communicating parties by relaying traffic through a number of intermediate nodes.
• All the anonymous systems are used by diverse group of users to protect their identities on
the Internet.
• Different types of anonymity:
Source anonymity.
Destination anonymity.
Path anonymity.
Anonymity using a Mix

• "Mix” technique proposed by Chaum in 1981 [2].


• A single node called “Mix" re-orders and changes message appearances.
• Uses some cryptographic operations.
• Initially suggested as an anonymous remailer.
• Obvious drawbacks - single point of failure, bottleneck, centralized secrets.
CHAUM’S MIX
• It is a concept introduced by David Chaum which is based on public key
cryptography that allows an electronic mail system to hide whom a
participant communicates with as well as the content of the
communication .
• The basic building block of such a high latency anonymous communication
systems is a mix.
• The principal idea is that messages to be anonymized are relayed through a
mix.
• The mix has a well-known RSA(Rivest-Shamir-Adleman encryption) public
key, and messages are divided into blocks and encrypted using this key.
Mix Networks
•More level of anonymity can be achieved by using a series of mixes instead of a
single mix.
•In mix networks senders can choose an ordered sequence of mixes through which
to send their messages.
•In a mix cascade topology, there are one or more predefined routes through
which all client traffic is relayed.
•Applications that are based on this concept include anonymous remailers (such
as Mixmaster), onion routing, garlic routing, and key-based routing (including 
Tor, I2P, and Freenet).
•If Alice wants to anonymously send a message M to Bob via a path P = {x, y, z} ,
she would iteratively create a layer of encryption, in the same manner as above,
for each mix starting with the last mix in the path and working back toward the
first.
Onion Routing
• Onion routing is a technique for anonymous communication over a
computer network. In an onion network, messages are encapsulated
in layers of encryption, analogous to layers of an onion. 
• The objective of the onion routing is to protect the unlinkability
between the communicating parties for real time applications that
can tolerate only low latency.
• The system consist of a set of servers called onion routers that relay
traffic for clients.
• Hereanonymity is achieved by passing messages through a
sequence of randomly selected onion routers to destination.
Onion Routing
• Consider the sample network
and path shown in the figure.
• In this case, order of public
key encryption is R2, M5, M2
and M1.
• Before each encryption a
header is added.
• Each node prior to decryption
obtains.
TOR
• The Onion Router Tor is the most recent evolution of onion routing and
represents the current state-of-the-art in low-latency anonymity systems.
• The Tor design makes several modifications and improvements over the
original onion routing design in terms of security, efficiency, and
deployability.
• Tor works on the real-world Internet, requires no special privileges or kernel
modifications, requires little synchronization or coordination between
nodes, and provides a reasonable tradeoff between anonymity, usability,
and efficiency.
• The Tor network is currently the largest deployed anonymity network ever,
consisting of over 1000 servers and more than an estimated 250,000 users
as of December 2007.
Features of Tor
• Directory servers
• Circuit Establishment
• Congestion control
• Variable Exit policies
• End-to-end integrity checking
TOR: Limitations

• DNS Leakage
• End-to-end timing correlation
• Eavesdropping by exit nodes
• Tor is slow
Applications of Anonymous Systems

• Privacy and Security for Ordinary Internet Users


• Censorship Resistance
• Government / Law Enforcement
• Corporate /Business
Conclusion
• Researches in the last 30 years have made significant progress
towards enabling private and anonymous communication on the
Internet.
• With an increasing level of public awareness about threats to
personal privacy, such as identity theft or online advertisers
tracking user behavior, academic and public interest in
anonymous communication systems is likely to continue to
increase in the near future.
• As a result public and academic interest in improving existing
systems for anonymity is also increasing.
Thank You

You might also like