1 / 20

Privacy Through Anonymous Connection and Browsing

Privacy Through Anonymous Connection and Browsing. By: Abdelhamid Elgzil Advisor: Dr. Chow. Outline. Introduction The Problem The Issue of Privacy and A nonymity TOR: The Onion Router Network VPN: Virtual Private Network Challenges and Controversy Conclusion

handley
Télécharger la présentation

Privacy Through Anonymous Connection and Browsing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy Through Anonymous Connection and Browsing By: Abdelhamid Elgzil Advisor: Dr. Chow

  2. Outline • Introduction • The Problem • The Issue of Privacy and Anonymity • TOR: The Onion Router Network • VPN: Virtual Private Network • Challenges and Controversy • Conclusion • Potential Research and Future Work Privacy Through Anonymous Connection and Browsing

  3. Introduction • Privacy and Anonymity are becoming a big concern for individuals and organizations • Examine two technologies: • The Onion Router (TOR) project for anonymous and security browsing by connecting through a series of virtual tunnels • Virtual Private Network (VPN) to maintain privacy through the use of a tunneling protocol and security procedures Privacy Through Anonymous Connection and Browsing

  4. The Problem • Concern about improving privacy and security on the Internet • Looking for new communication tools • Built-in privacy features • Help share information over public networks without compromising user’s privacy • Protect user privacy while browsing the internet, to get connected to news sites, or avoid geo-blacking • Help publish web sites and other services without exposing the location of the site • Supporting socially sensitive communication • Protecting against traffic analysis • Source and destination information can lead to track the user behavior and interests, even connection is encrypted Privacy Through Anonymous Connection and Browsing

  5. The Problem • TOR offers browsing anonymous • TOR does not guarantee a complete anonymity • Focus only on protecting the transfer of data • User might need to use specific software to prevent the visited sites from revealing his identity information • VPN is an Additional layer of protection • Gain an tightened anonymity protection • Hiding using of TOR as a communication tool • Enable TOR use in geo-blocked regions Privacy Through Anonymous Connection and Browsing

  6. Privacy and anonymity • Two different thoughts • Both progressively essential as we get increasingly monitored and tracked • Privacy  Ability to keep some things to yourself • Regardless of their impact to society • Anonymity  Desire to want people to see what you do, just not that it’s you doing it • Anonymity extremely effective in promoting freedom of expression Privacy Through Anonymous Connection and Browsing

  7. Privacy and anonymity • The degree of privacy mostly linked to: • Type of encryption utilized • Computational capacity avail- able • In some circumstances, threats against privacy and anonymity happen due to the absence of proper technology  unintentionally • Bugs, ISP • Non-educated users Privacy Through Anonymous Connection and Browsing

  8. TOR: The Onion Router Network Privacy Through Anonymous Connection and Browsing

  9. TOR: Architecture  Privacy Through Anonymous Connection and Browsing

  10. How TOR Works Privacy Through Anonymous Connection and Browsing

  11. How TOR Works Privacy Through Anonymous Connection and Browsing

  12. How TOR Works Privacy Through Anonymous Connection and Browsing

  13. VPN: AirVpn Servers Privacy Through Anonymous Connection and Browsing

  14. VPN: AirVpn Server Locations Privacy Through Anonymous Connection and Browsing

  15. Challenges and Controversy • Criminals could take advantage • Anonymizersaren’t foolproof • First and last routers are malicious or compromised • OSP publish enough information about their workings, including node addresses • Governments or other organizations block traffic • Some single-proxy anonymizer services may log users’ IP addresses Privacy Through Anonymous Connection and Browsing

  16. Challenges and Controversy • Providing greater security VS. Performance • Additional proxies and encryption increase overhead • Performance overhead causes anonymization to slow users’ Internet access • ISPs block nodes to control spam • They block those used by anonymizers • Browser complexity and the need to maintain browsing functionality could help proficient hackers sidestep anonymization Privacy Through Anonymous Connection and Browsing

  17. Challenges and Controversy • Cultural and legal challenges • Legal challengeSome countries outlawing or could decide to prohibit the use of privacy tool • They require all Internet providers to keep detailed access records • The cultural issueThe trend toward [openness on the Internet] • The desire to privacy and Anonymous communication will drive the technology’s continued development and adoption Privacy Through Anonymous Connection and Browsing

  18. Conclusion • Privacy and security are interconnected • Almost impossible to achieve one without the other • People and organizations need to have some level of anonymity • Anonymity can be abused by some people, but should not be an excuse • Privacy and anonymity are important in today’s information technology driven world • Today, users aware of privacy and anonymity impacts • This will have positive economic outcomes Privacy Through Anonymous Connection and Browsing

  19. Potential Dissertation Research Tasks • Create TOR Emulator by leveraging Software-defined networking (SDN) • Enhance packet marking techniques to efficiently trace the packet path within TOR network • How to utilize SDN controller in cloud to detect the using of VM as a TOR relay, by analyzing the characteristics of TOR relay in virtualized environment • Using TOR bridges or TOR proxy to hide the intention to connect to TOR (prevent others to detect your using of TOR) Privacy Through Anonymous Connection and Browsing

  20. Questions? Privacy Through Anonymous Connection and Browsing

More Related