Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Privacy Through Anonymous Connection and Browsing By: Abdelhamid Elgzil Advisor: Dr. Chow Outline • • • • • • • • Introduction The problem The issue of Privacy and anonymity TOR: The Onion Router Network AirVpn: Virtual Private Network CHALLENGES AND CONTROVERSY Conclusion Potential Research and Future Work Introduction • Privacy and Anonymity are becoming a big concern for individuals and organizations • Examine two technologies: – The Onion Router (TOR) project for anonymous and security browsing – Virtual Private Network (VPN) to maintain privacy The Problem • Concern about improving privacy and security on the Internet • Protecting against traffic analysis • source and destination information can lead to track the user behavior and interests, even connection is encrypted • Looking for new communication tools – Built-in privacy features – Help share information over public networks without compromising user’s privacy – Get connected to news sites, using instant messaging services, or avoid geo-blacking – Helps publish web sites and other services without exposing the location of the site – Supporting socially sensitive communication The problem • • • • Additional layer of protection VPN gain tightened anonymity protection Hiding using of TOR Enable TOR use in geo-blocked regions Privacy and anonymity • Two different thoughts • Both progressively essential as we get increasingly monitored and pursued • Privacy Ability to keep some things to yourself – Regardless of their impact to society • Anonymity Corner stone of the Internet culture • Anonymity extremely effective in promoting freedom of expression Privacy and anonymity • The degree of privacy mostly linked to: – Type of encryption utilized – Computational capacity avail- able • In some circumstances, threats against privacy and anonymity happen due to the absence of proper technology unintentionally – Bugs, ISP – Non-educated users TOR: THE ONION ROUTER NETWORK TOR: Architecture How TOR Works How TOR Works How TOR Works VPN: AirVpn Servers VPN: AirVpn Server Locations CHALLENGES AND CONTROVERSY • Criminals could take advantage • Anonymizers aren’t foolproof – First and last routers are malicious or compromised • OSP publish enough information about their workings, including node addresses – Governments or other organizations block traffic • Some single-proxy anonymizer services may log users’ IP addresses CHALLENGES AND CONTROVERSY • Providing greater security VS. Performance – Additional proxies and encryption increase overhead – Performance overhead causes anonymization to slow users’ Internet access • ISPs block nodes to control spam – They block those used by anonymizers • Browser complexity and the need to maintain browsing functionality could help proficient hackers sidestep anonymization CHALLENGES AND CONTROVERSY • Cultural and legal challenges – Legal challenge Some countries outlawing or could decide to prohibit the use of privacy tool – They require all Internet providers to keep detailed access records – The cultural issue The trend toward [openness on the Internet] • The desire to privacy and Anonymous communication will drive the technology’s continued development and adoption Conclusion • Privacy and security are interconnected • Almost impossible to achieve one without the other • People and organizations need to have some level of anonymity • Anonymity can be abused by some people, but should not be an excuse • Privacy and anonymity are important in today’s information technology driven world • Today, users aware of privacy and anonymity impacts – This will have positive economic outcomes Potential Research and Future Work • Create TOR Emulator by leveraging Softwaredefined networking (SDN) • Enhance packet marking techniques to efficiently trace the packet path within TOR network • How to utilize SDN controller in cloud to detect the using of VM as a TOR relay, by analyzing the characteristics of TOR relay in virtualized envirment • Using TOR bridges or TOR proxy to hide the intention to connect to TOR (prevent others to detect your using of TOR) Questions?