Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Stop Tracking Me: An Anti-detection Type Solution for Anonymous Data

Stop Tracking Me: An Anti-detection Type Solution for Anonymous Data

Encrypted data cannot ensure full immunity especially in anonymous applications, Even though it protect data by encryption methods. On the other side, we encounter with a set of huge processing units that can reveal data pattern through Internet frameworks. Although intruders are not able to break encrypted layers of data, still they can concentrate on the nature of the transmitted data. In the other hand, set of sent packages that have the same features, have been considered as a victim. As an example of this vulnerability, anonymous applications like Tor can be detected by their data pattern. In this paper an anti-detection mechanism has been proposed. This framework uses a crypto-type system for data pattern generation. Also a stochastic algorithm is responsible for timely propagation of the data. The entire system has been performed on an anonymous data pattern that is responsible for data exchange through the Internet. The results indicate that detection of the suggested pattern is very hard and with a high assurance, it can be applicable through Internet framework. The cryptographic type system has been formed under lattice-based quantum resistant techniques. It is highly recommended for anonymous applications and online private data exchange like e-banking.

Mehran Alidoost Nia

October 26, 2014
Tweet

More Decks by Mehran Alidoost Nia

Other Decks in Research

Transcript

  1. logo 公司名称 Mehran Alidoost Nia (Presenter), Amir Hassani Karbasi and

    Reza Ebrahimi Atani University of Guilan, Department of Computer Engineering 4th International Conference on Computer and Knowledge Engineering- Oct 2014 Stop Tracking Me: An Anti-detection Type Solution for Anonymous Data University of Guilan
  2. logo 公司名称 Introduction some of applications of anonymity anonymous data

    exchanges privacy enhancement online payments cloud services Tor was designed for these intentions 4th International Conference on Computer and Knowledge Engineering- University of Mashhad Oct 2014
  3. logo 公司名称 Problem? There is still some problems:  quantum

    computers are able to analyze Internet data pattern. (as Schneier report)  This ability is behind of their huge processing capacity.  Their ability to process of Internet data  can not reveal anonymous data alone  can detect anonymous data pattern  perform related attacks to the vital points.  recognition of data pattern can help to determine senders’source. 4th International Conference on Computer and Knowledge Engineering- University of Mashhad Oct 2014
  4. logo 公司名称 How to Hide Network Pattern? Splits in two

    different branches: 1. Stochastic dispersion algorithms  Its main responsibility: change sending flows  Semi-random data exchange  Problem: synchronization 2. Change encryption pattern  Change in data pattern exchange  Using crypto-types 4th International Conference on Computer and Knowledge Engineering- University of Mashhad Oct 2014
  5. logo 公司名称 Type Model 4th International Conference on Computer and

    Knowledge Engineering- University of Mashhad Oct 2014
  6. logo 公司名称 Crypto-Type System 1. Features:  Invader cannot distinguish

    type of mixed encryptions  Borderline of crypto types is undetectable  Reconstruction needs proof! 2. Crypto-types  Quantum resistance crypto systems  All are lattice based  Types are selected homogeneously  Size of ciphertext differs in two successive transmissions 4th International Conference on Computer and Knowledge Engineering- University of Mashhad Oct 2014
  7. logo 公司名称 Crypto-Type System (Cont)  Selected Types NTRU, NTRU-Like

    Z[i], NTRU-Like Z [√-2] and ETRU  Each type needs its own rules  Each type rule, need a proper judgment! (Type NT) (Type NTRU) ⊢ ∶ , ⊢ : ⊢ , (Val Array1) (Array for NT) ⊢ ∶ , ⊢ : ⊢ (,):() (Type Product1) (Product for NT) ⊢ ∶ , ⊢ : ⊢ × : 4th International Conference on Computer and Knowledge Engineering- University of Mashhad Oct 2014
  8. logo 公司名称 Anti-tracking and Subtyping  Subtyping is a representative

    for anti- tracking feature of the system.  If we can define subtyping rules, we have illustrated anti-tracking ability. (Sub product1) (Subtyping NT & NL1) ⊢ <: , ⊢ ′ <: ′ ⊢ × ′ <: × ′ 4th International Conference on Computer and Knowledge Engineering- University of Mashhad Oct 2014
  9. logo 公司名称 Timing and Crypto-Types  Performance is the key

    feature.  It depends on two parameters:  Number of crypto-types  Timing between type switches 4th International Conference on Computer and Knowledge Engineering- University of Mashhad Oct 2014
  10. logo 公司名称 Brief Comparison Techniques method overhead design privacy quantum

    resistance Anti-detection proof middle Type system high yes PCC [28] proof middle compiler level middle no TAL [14] policy high Strong type middle no iTALx [15] policy low Strong type middle no 4th International Conference on Computer and Knowledge Engineering- University of Mashhad Oct 2014
  11. logo 公司名称 10 Conclusion  Crypto-types can use to enhance

    anti-tracking features in anonymous systems.  Crypto-types need type system with appropriate rules and judgment.  Each type imposes an overhead to the system and efficiently selecting of types is important.  The result shows each timing between type switches increases the privacy level improves.  Types should be homogeneous and can enhance anti-detection rate over 80% in anonymous channels. 4th International Conference on Computer and Knowledge Engineering- University of Mashhad Oct 2014