Abstract
We propose and analyze in details the revised model of XPROB, an infinite family of pool-based anonymous communication systems that can be used in various applications including high performance computing environments. XPROB overcomes the limitations of APROB Channel that only resists a global delaying adversary (GDA). Each instance of XPROB uses a pool mix as its core component to provide resistance against a global active adversary (GAA), a stronger yet more practical opponent than a GDA. For XPROB, a GAA can drop messages from users but cannot break the anonymity of the senders of messages. Analysis and experimental evaluations show that each instance of XPROB provides greater anonymity than APROB Channel for the same traffic load and user behaviors (rate and number of messages sent). In XPROB, any message can be delivered with high probability within a few rounds after its arrival into the system; thus, an opponent cannot be certain when a message will be delivered. Furthermore, users can choose their own preference balance between anonymity and delay. Through the evaluation, we prove that XPROB can provide anonymity for users in high-performance computing environments.
Similar content being viewed by others
References
Kesdogan D, Egner J, Büschkes R (1998) Stop-and-go mixes: providing probabilistic anonymity in an open system. In: Information hiding (IH, 1998). LNCS, vol 1525. Springer, Berlin, pp 83–98
Jerichow A, Müuller J, Pfizmann A, Pfitzmann B, Waidner M (1998) Real-time mixes: a bandwidth-efficient anonymity protocol. IEEE J Sel Areas Commun 16(4):495–509
Danezis G (2002) Forward secure mixes. In: 7th Nordic workshop on secure IT systems, pp 195–207
Diaz C, Preneel B (2004) Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In: Information hiding (IH, 2004). LNCS, vol 3200. Springer, Berlin, pp 309–325
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, USENIX Association, pp 303–320
Syverson P, Tsudik G, Reed M, Landwehr C (2009) Towards an analysis of onion routing security. In: Designing privacy enhancing technologies. LNCS, vol 2009. Springer, Berlin, pp 96–114
Moeller U, Cottrell L, Palfrader P, Sassaman L (2002) Mixmaster protocol
Tóth G, Hornák Z (2006) The APROB channel: adaptive semi-real-time anonymous communication. In: Security and privacy in dynamic environments, IFIP. International federation for information processing, vol 201. Springer, Boston, pp 483–492
Tran MT, Nguyen TT, Echizen I (2008) Pool-based APROB channel to provide resistance against global active adversary under probabilistic real-time condition. In: 2008 IEEE/IFIP international symposium on trust, security and privacy for pervasive applications (TSP-08). IEEE Computer Society, Los Alamitos, pp 257–263
Tran MT, Duong AD, Echizen I (2009) XPROB—a generalized pool-based anonymous communication framework. In: The fifth international conference on intelligent information hiding and multimedia signal processing (IIHMSP2009). IEEE Computer Society, Los Alamitos, pp 52–55
Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 4(2):84–88
Gülcü C, Tsudik G (1996) Mixing e-mail with Babel. In: Proceedings of the network and distributed security symposium (NDSS ’96). IEEE Computer Society, New York, pp 2–16
Danezis G, Dingledine R, Mathewson N (2003) Mixminion: design of a type III anonymous remailer protocol. In: Proceedings of the 2003 IEEE symposium on security and privacy. IEEE Computer Society, Los Alamitos, pp 2–15
Diaz C, Serjantov A (2003) Generalising mixes. In: Privacy enhancing technologies (PET, 2003). LNCS, vol 2760. Springer, Berlin, pp 18–31
Tóth G, Hornák Z (2004) Measuring anonymity in a non-adaptive real-time system. In: Privacy enhancing technologies (PET, 2004). LNCS, vol 3424. Springer, Berlin, pp 226–241
Serjantov A (2007) A fresh look at the generalised mix framework. In: Privacy enhancing technologies (PET, 2007). LNCS, vol 4776. Springer, Berlin, pp 17–29
Serjantov A, Dingledine R, Syverson P (2002) From a trickle to a flood: active attacks on several mix types. In: Information hiding (IH, 2002). LNCS, vol 2578. Springer, Berlin, pp 36–52
Diaz C (2004) Anonymity and privacy in electronic services. PhD thesis, KU Leuven
Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: Privacy enhancing technologies (PET, 2002). LNCS, vol 2482. Springer, Berlin, pp 259–263
Diaz C, Seys S, Claessens J, Preneel B (2002) Towards measuring anonymity. In: Privacy enhancing technologies (PET, 2002). LNCS, vol 2482. Springer, Berlin, pp 184–188
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Serjantov A (2004) On the anonymity of anonymity systems. PhD thesis, University of Cambridge
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tran, MT., Nguyen, TT., Duong, AD. et al. Pool-based anonymous communication framework for high-performance computing. J Supercomput 55, 246–268 (2011). https://doi.org/10.1007/s11227-010-0445-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-010-0445-8