Skip to main content

Anonymity in an Electronic Society: A Survey

  • Chapter
  • First Online:
Cyber Deception

Abstract

In the wake of surveillance scandals in recent years, as well of the continuous deployment of more sophisticated censorship mechanisms, concerns over anonymity and privacy on the Internet are ever growing. In the last decades, researchers have designed and proposed several algorithms and solutions that allow interested parties to maintain anonymity online, even against powerful opponents. In this chapter, we present a survey of the classical anonymity schemes that proved to be most successful, describing how they work and their main shortcomings. Finally, we discuss new directions in Anonymous Communication Networks (ACN) taking advantage of today’s services, like On-Line Social Networks (OSN). OSN offer a vast pool of participants, allowing to effectively disguise traffic in the high volume of daily communications, thus offering high levels of anonymity and good resistance to analysis techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 2010 free software awards. http://www.fsf.org/news/2010-free-software-awards-announced.

  2. Growing the network, spreading the word. https://download.i2p2.de/media/i2pcon/2015/slides/I2PCon-2015-zzz-GrowingTheNetwork.pdf.

  3. I2p documentation. https://geti2p.net/en/docs/how/tech-intro.

  4. I2p threat model. https://geti2p.net/en/docs/how/threat-model.

  5. The invisible internet project (i2p). https://geti2p.net/en/.

  6. Official Tor FAQ. http://www.torproject.org/docs/faq.html.en.

  7. Tor security advisory. https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack.

  8. Xmpp standard. https://xmpp.org/xmpp-software/servers/.

  9. C.A. Ardagna, M. Conti, M. Leone, and J. Stefa. An anonymous end-to-end communication protocol for mobile cloud environments. Services Computing, IEEE Transactions on, 7(3): 373–386, 2014.

    Article  Google Scholar 

  10. Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, and Angelos Stavrou. Providing users’ anonymity in mobile hybrid networks. ACM Trans. Internet Technol., 12(3):7:1–7:33, 2013.

    Google Scholar 

  11. Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, and Christopher Kruegel. Abusing social networks for automated user profiling. In Recent Advances in Intrusion Detection, volume 6307 of Lecture Notes in Computer Science, pages 422–441. 2010.

    Google Scholar 

  12. Ero Balsa, Carmela Troncoso, and Claudia Diaz. A metric to evaluate interaction obfuscation in online social networks. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 20(06):877–892, 2012.

    Article  MathSciNet  Google Scholar 

  13. F. Beato, M. Conti, and B. Preneel. Friend in the Middle (FiM): tackling de-anonymization in social networks. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 279–284, 2013.

    Google Scholar 

  14. F. Beato, M. Conti, B. Preneel, and D. Vettore. Virtualfriendship: Hiding interactions on online social networks. In Communications and Network Security (CNS), 2014 IEEE Conference on, pages 328–336, 2014.

    Google Scholar 

  15. Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW ’09, pages 551–560, 2009.

    Google Scholar 

  16. Joseph Bonneau, Jonathan Anderson, Ross Anderson, and Frank Stajano. Eight friends are enough: Social graph approximation via public listings. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS ’09, pages 13–18, New York, NY, USA, 2009. ACM.

    Google Scholar 

  17. Andrea Burattin, Giuseppe Cascavilla, and Mauro Conti. Socialspy: Browsing (supposedly) hidden information in online social networks. In Risks and Security of Internet and Systems, Lecture Notes in Computer Science, pages 83–99. 2015.

    Google Scholar 

  18. Jernigan. C. and B. F. T. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday Journal, 2009.

    Google Scholar 

  19. G. Cascavilla, M. Conti,, D. Schwartz, and I. Yahav. Revealing censored information through comments and commenters in online social networks. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, 2015.

    Google Scholar 

  20. David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84–90, 1981.

    Article  Google Scholar 

  21. Ian Clarke, Scott G. Miller, Theodore W. Hong, Oskar Sandberg, and Brandon Wiley. Protecting free expression online with Freenet. In IEEE Internet Computing, volume 6, pages 40–49, 2002.

    Google Scholar 

  22. Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pages 46–66, 2001.

    Google Scholar 

  23. Bernd Conrad and Fatemeh Shirazi. A survey on Tor and I2P. In Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP 2014), 2014.

    Google Scholar 

  24. M. Conti, R. Poovendran, and M. Secchiero. Fakebook: Detecting fake profiles in on-line social networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on, pages 1071–1078, 2012.

    Google Scholar 

  25. Mauro Conti, Arbnor Hasani, and Bruno Crispo. Virtual private social networks. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY ’11, pages 39–50, 2011.

    Google Scholar 

  26. Mauro Conti, Arbnor Hasani, and Bruno Crispo. Virtual private social networks and a facebook implementation. ACM Trans. Web, 7(3):14:1–14:31, 2013.

    Google Scholar 

  27. George Danezis. The traffic analysis of continuous-time mixes. In Privacy Enhancing Technologies, Lecture Notes in Computer Science, pages 35–50. 2005.

    Google Scholar 

  28. George Danezis, Claudia Diaz, Carmela Troncoso, and Ben Laurie. Drac: An architecture for anonymous low-volume communications. In Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS’10, pages 202–219, 2010.

    Google Scholar 

  29. Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM’04, pages 21–21, 2004.

    Google Scholar 

  30. John R. Douceur. The sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS ’01, pages 251–260, 2002.

    Google Scholar 

  31. Christoph Egger, Johannes Schlumberger, Christopher Kruegel, and Giovanni Vigna. Practical attacks against the i2p network. In Research in Attacks, Intrusions, and Defenses, Lecture Notes in Computer Science, pages 432–451. 2013.

    Google Scholar 

  32. Nathan S. Evans, Roger Dingledine, and Christian Grothoff. A practical congestion attack on Tor using long paths. In Proceedings of the 18th Conference on USENIX Security Symposium, SSYM’09, pages 33–50, 2009.

    Google Scholar 

  33. Michael Herrmann and Christian Grothoff. Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using i2p. In Privacy Enhancing Technologies, pages 155–174. Springer Berlin Heidelberg, 2011.

    Google Scholar 

  34. Lei Jin, Hassan Takabi, and James B.D. Joshi. Towards active detection of identity clone attacks on online social networks. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY ’11, pages 27–38, 2011.

    Google Scholar 

  35. Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users get routed: traffic correlation on Tor by realistic adversaries. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS ’13, pages 337–348, 2013.

    Google Scholar 

  36. Dogan Kedogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity in open environments. In Revised Papers from the 5th International Workshop on Information Hiding, IH ’02, pages 53–69, 2003.

    Google Scholar 

  37. G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295–300, 2011.

    Google Scholar 

  38. BrianN. Levine, MichaelK. Reiter, Chenxi Wang, and Matthew Wright. Timing attacks in low-latency mix systems. In Financial Cryptography, Lecture Notes in Computer Science, pages 251–265. 2004.

    Google Scholar 

  39. P. Mittal, M. Wright, and N. Borisov. Pisces: Anonymous communication using social networks. NDSS, 2013.

    Google Scholar 

  40. A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Security and Privacy, 2009 30th IEEE Symposium on, pages 173–187, 2009.

    Google Scholar 

  41. Mike Perry. Securing the Tor network. http://www.blackhat.com/presentations/bh-usa-07/Perry/Presentation/bh-usa-07-perry.pdf.

  42. Christopher Riederer, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, and Pablo Rodriguez. For sale: Your data: By: You. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets-X, pages 13:1–13:6, 2011.

    Google Scholar 

  43. Stefanie Roos, Benjamin Schiller, Stefan Hacker, and Thorsten Strufe. Measuring freenet in the wild: Censorship-resilience under observation. In Privacy Enhancing Technologies, Lecture Notes in Computer Science, pages 263–282. 2014.

    Google Scholar 

  44. Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor. Monitoring the i2p network. http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf,2011.

  45. Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P.N. Puttaswamy, and Ben Y. Zhao. User interactions in social networks and their implications. In Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys ’09, pages 205–218, 2009.

    Google Scholar 

  46. Bassam Zantout and Ramzi Haraty. I2p data communication system. In Proceedings of The Tenth International Conference on Networks, ICN 2011.

    Google Scholar 

  47. Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of the 4th International Conference on Privacy Enhancing Technologies, PET’04, pages 207–225, 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mauro Conti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Conti, M., De Gaspari, F., Mancini, L.V. (2016). Anonymity in an Electronic Society: A Survey. In: Jajodia, S., Subrahmanian, V., Swarup, V., Wang, C. (eds) Cyber Deception. Springer, Cham. https://doi.org/10.1007/978-3-319-32699-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32699-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32697-9

  • Online ISBN: 978-3-319-32699-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics