Security and Privacy in Communication Networks. 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers

Research Article

More Anonymity through Trust Degree in Trust-Based Onion Routing

Download
430 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-36883-7_17,
        author={Peng Zhou and Xiapu Luo and Rocky Chang},
        title={More Anonymity through Trust Degree in Trust-Based Onion Routing},
        proceedings={Security and Privacy in Communication Networks. 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2013},
        month={2},
        keywords={trust degree anonymity trust-based onion routing},
        doi={10.1007/978-3-642-36883-7_17}
    }
    
  • Peng Zhou
    Xiapu Luo
    Rocky Chang
    Year: 2013
    More Anonymity through Trust Degree in Trust-Based Onion Routing
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-36883-7_17
Peng Zhou1,*, Xiapu Luo1,*, Rocky Chang1,*
  • 1: The Hong Kong Polytechnic University
*Contact email: cspzhouroc@comp.polyu.edu.hk, csxluo@comp.polyu.edu.hk, csrchang@comp.polyu.edu.hk

Abstract

Trust-based onion routing employs users’ own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attack based on a priori trust relationship. In this paper, we first observe that the onion routers with higher trust degree (e.g., those that are trusted by more users) are more effective in defending against the inference attack. We therefore incorporate trust degree into trust-based onion routing. With a rigorous theoretical analysis, we devise an optimal strategy for router selection and an optimal routing algorithm for path selection. Both minimize the risk of deanonymization by the inference attack without sacrificing the capability of evading compromised routers. Moreover, simulation-based experiments on top of real-world social networks confirm the effectiveness of the optimal router selection.