200 likes | 221 Views
Privacy Through Anonymous Connection and Browsing. By: Abdelhamid Elgzil Advisor: Dr. Chow. Outline. Introduction The Problem The Issue of Privacy and A nonymity TOR: The Onion Router Network VPN: Virtual Private Network Challenges and Controversy Conclusion
E N D
Privacy Through Anonymous Connection and Browsing By: Abdelhamid Elgzil Advisor: Dr. Chow
Outline • Introduction • The Problem • The Issue of Privacy and Anonymity • TOR: The Onion Router Network • VPN: Virtual Private Network • Challenges and Controversy • Conclusion • Potential Research and Future Work Privacy Through Anonymous Connection and Browsing
Introduction • Privacy and Anonymity are becoming a big concern for individuals and organizations • Examine two technologies: • The Onion Router (TOR) project for anonymous and security browsing by connecting through a series of virtual tunnels • Virtual Private Network (VPN) to maintain privacy through the use of a tunneling protocol and security procedures Privacy Through Anonymous Connection and Browsing
The Problem • Concern about improving privacy and security on the Internet • Looking for new communication tools • Built-in privacy features • Help share information over public networks without compromising user’s privacy • Protect user privacy while browsing the internet, to get connected to news sites, or avoid geo-blacking • Help publish web sites and other services without exposing the location of the site • Supporting socially sensitive communication • Protecting against traffic analysis • Source and destination information can lead to track the user behavior and interests, even connection is encrypted Privacy Through Anonymous Connection and Browsing
The Problem • TOR offers browsing anonymous • TOR does not guarantee a complete anonymity • Focus only on protecting the transfer of data • User might need to use specific software to prevent the visited sites from revealing his identity information • VPN is an Additional layer of protection • Gain an tightened anonymity protection • Hiding using of TOR as a communication tool • Enable TOR use in geo-blocked regions Privacy Through Anonymous Connection and Browsing
Privacy and anonymity • Two different thoughts • Both progressively essential as we get increasingly monitored and tracked • Privacy Ability to keep some things to yourself • Regardless of their impact to society • Anonymity Desire to want people to see what you do, just not that it’s you doing it • Anonymity extremely effective in promoting freedom of expression Privacy Through Anonymous Connection and Browsing
Privacy and anonymity • The degree of privacy mostly linked to: • Type of encryption utilized • Computational capacity avail- able • In some circumstances, threats against privacy and anonymity happen due to the absence of proper technology unintentionally • Bugs, ISP • Non-educated users Privacy Through Anonymous Connection and Browsing
TOR: The Onion Router Network Privacy Through Anonymous Connection and Browsing
TOR: Architecture Privacy Through Anonymous Connection and Browsing
How TOR Works Privacy Through Anonymous Connection and Browsing
How TOR Works Privacy Through Anonymous Connection and Browsing
How TOR Works Privacy Through Anonymous Connection and Browsing
VPN: AirVpn Servers Privacy Through Anonymous Connection and Browsing
VPN: AirVpn Server Locations Privacy Through Anonymous Connection and Browsing
Challenges and Controversy • Criminals could take advantage • Anonymizersaren’t foolproof • First and last routers are malicious or compromised • OSP publish enough information about their workings, including node addresses • Governments or other organizations block traffic • Some single-proxy anonymizer services may log users’ IP addresses Privacy Through Anonymous Connection and Browsing
Challenges and Controversy • Providing greater security VS. Performance • Additional proxies and encryption increase overhead • Performance overhead causes anonymization to slow users’ Internet access • ISPs block nodes to control spam • They block those used by anonymizers • Browser complexity and the need to maintain browsing functionality could help proficient hackers sidestep anonymization Privacy Through Anonymous Connection and Browsing
Challenges and Controversy • Cultural and legal challenges • Legal challengeSome countries outlawing or could decide to prohibit the use of privacy tool • They require all Internet providers to keep detailed access records • The cultural issueThe trend toward [openness on the Internet] • The desire to privacy and Anonymous communication will drive the technology’s continued development and adoption Privacy Through Anonymous Connection and Browsing
Conclusion • Privacy and security are interconnected • Almost impossible to achieve one without the other • People and organizations need to have some level of anonymity • Anonymity can be abused by some people, but should not be an excuse • Privacy and anonymity are important in today’s information technology driven world • Today, users aware of privacy and anonymity impacts • This will have positive economic outcomes Privacy Through Anonymous Connection and Browsing
Potential Dissertation Research Tasks • Create TOR Emulator by leveraging Software-defined networking (SDN) • Enhance packet marking techniques to efficiently trace the packet path within TOR network • How to utilize SDN controller in cloud to detect the using of VM as a TOR relay, by analyzing the characteristics of TOR relay in virtualized environment • Using TOR bridges or TOR proxy to hide the intention to connect to TOR (prevent others to detect your using of TOR) Privacy Through Anonymous Connection and Browsing
Questions? Privacy Through Anonymous Connection and Browsing