Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

Cebit 2015: Saarland computer scientists present guarantees for online anonymity

11.03.2015

When performing an online search for sensitive topics, one may wish to remain unobserved. Millions of people use the Tor network for that purpose, even though it does not provide perfect anonymity. Computer scientists from the Saarland University have now developed a program that can measure the anonymity of a user's connection within the Tor network. The scientists used real-time data from the Tor network, and examined a wide range of possible attackers (Hall 9, Booth E13).

Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain disease, for example.


Sebastian Meiser and Esfandiar Mohammadi provide guarantees of users’ anonymity within the Tor network.

Credit: Oliver Dietze

Seeing that this kind of private information can be linked to their identity, users will often resort to special online anonymization services. One of the most popular tools is Tor. Since the beginning of the year, alone more than two million users have used it to anonymize their Internet connection data.

These services will not only conceal browsing behavior, but also the identity of the user, and that of any other recipients. These will usually be other websites, but could also be another person. Tor works in a way that allows users to establish a connection that is then upheld through its own network.

The Tor network comprises up to 6,000 servers, mostly run by volunteers, which computer scientists refer to as “nodes”. And since every node only receives the minimal amount of data necessary to relay the information in question, it becomes far more difficult to de-anonymize both the transmitter and the recipient of the data.

“The Tor network isn’t perfect, however,” says Esfandiar Mohammadi, a researcher at the Research Center for IT Security, CISPA, and a doctoral candidate at the Graduate School for Computer Science in Saarbrücken. “For one, unanticipated attacks at a network level can endanger anonymity. Also, the degree of anonymity the network achieves is highly variable, since volunteers don’t necessarily operate their nodes continually or regularly,” says Mohammadi.

In collaboration with CISPA researcher Sebastian Meiser, who is also a postgraduate at the Saarbrücken Graduate School for Computer Science, Mohammadi developed a program that can provide an accurate assessment of the level of anonymity an individual user achieves, even while basing the estimate on the fluctuations of the Tor network. According to the researchers, this feature is a worldwide first.

“An attacker that compromises Tor servers can derive the identity of a user with a certain probability. This is exactly what our system calculates,” Sebastian Meiser explains. The two Saarbrücken researchers based their technique, which they named “MATor”, on a mathematical model that they extended to include different categories of possible attacks.

“In order to indicate the probability of de-anonymization, our program performs its calculations using data that is aggregated once an hour and published on the network immediately. MATor also takes the specifics of the respective Internet connection into account, as well as the individual configurations of the Tor software,” Meiser says. This feature is also intended as a basis for a so-called plugin, a small extension program for the software “Tor Browser” that the researchers now want to develop. Integrated into the Tor software, this could run in the background and simply notify users as soon as their connection became too unsafe.

Computer science and informatics at Saarland University
The Department of Computer Science forms the core of the informatics landscape at Saarland University. A further seven internationally renowned research institutes are located in the immediate vicinity on campus. As well as the two Max Planck Institutes for Informatics and for Software Systems, the Saarbrücken campus is also home to the German Research Center for Artificial Intelligence, the Intel Visual Computing Institute, the Center for IT Security, Privacy and Accountability (CISPA) and the Cluster of Excellence ‘Multimodal Computing and Interaction’.

Further Information:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Michael Backes, Aniket Kate, Sebastian Meiser, and Esfandiar Mohammadi
https://www.infsec.cs.uni-saarland.de/projects/anonymity-guarantees/mator.html

Media Inquiries:
Sebastian Meiser
Saarland University
Center for IT-Security, Privacy and Accountability (CISPA)
Tel.: +49-681-302-57370
Email: meiser(at)cs.uni-saarland.de

Esfandiar Mohammadi
Saarland University
Center for IT-Security, Privacy and Accountability (CISPA)
Tel.: +49-681-302-57372
Email: mohammadi(at)cs.uni-saarland.de

Editor:
Gordon Bolduan
Science Communication
Competence Center Computer Science Saarland
Phone: +49 681 302-70741
E-Mail: bolduan(at)mmci.uni-saarland.de

Note for radio journalists: Phone interviews with Saarland University scientists can be conducted in studio quality using the Radio Codec (via direct-dial IP connection, or the ARD Sternpunkt 106813020001). Interview requests can be made via our press department (+49 681 302-2601).

Melanie Löw | Universität des Saarlandes
Further information:
http://www.uni-saarland.de

More articles from Trade Fair News:

nachricht Medica 2017: New software enables early diagnosis of arteriosclerosis
06.11.2017 | Technische Universität Kaiserslautern

nachricht Support Free with “TwoCure” – Innovation in Resin-Based 3D Printing
02.11.2017 | Fraunhofer-Institut für Lasertechnik ILT

All articles from Trade Fair News >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: A “cosmic snake” reveals the structure of remote galaxies

The formation of stars in distant galaxies is still largely unexplored. For the first time, astron-omers at the University of Geneva have now been able to closely observe a star system six billion light-years away. In doing so, they are confirming earlier simulations made by the University of Zurich. One special effect is made possible by the multiple reflections of images that run through the cosmos like a snake.

Today, astronomers have a pretty accurate idea of how stars were formed in the recent cosmic past. But do these laws also apply to older galaxies? For around a...

Im Focus: Visual intelligence is not the same as IQ

Just because someone is smart and well-motivated doesn't mean he or she can learn the visual skills needed to excel at tasks like matching fingerprints, interpreting medical X-rays, keeping track of aircraft on radar displays or forensic face matching.

That is the implication of a new study which shows for the first time that there is a broad range of differences in people's visual ability and that these...

Im Focus: Novel Nano-CT device creates high-resolution 3D-X-rays of tiny velvet worm legs

Computer Tomography (CT) is a standard procedure in hospitals, but so far, the technology has not been suitable for imaging extremely small objects. In PNAS, a team from the Technical University of Munich (TUM) describes a Nano-CT device that creates three-dimensional x-ray images at resolutions up to 100 nanometers. The first test application: Together with colleagues from the University of Kassel and Helmholtz-Zentrum Geesthacht the researchers analyzed the locomotory system of a velvet worm.

During a CT analysis, the object under investigation is x-rayed and a detector measures the respective amount of radiation absorbed from various angles....

Im Focus: Researchers Develop Data Bus for Quantum Computer

The quantum world is fragile; error correction codes are needed to protect the information stored in a quantum object from the deteriorating effects of noise. Quantum physicists in Innsbruck have developed a protocol to pass quantum information between differently encoded building blocks of a future quantum computer, such as processors and memories. Scientists may use this protocol in the future to build a data bus for quantum computers. The researchers have published their work in the journal Nature Communications.

Future quantum computers will be able to solve problems where conventional computers fail today. We are still far away from any large-scale implementation,...

Im Focus: Wrinkles give heat a jolt in pillared graphene

Rice University researchers test 3-D carbon nanostructures' thermal transport abilities

Pillared graphene would transfer heat better if the theoretical material had a few asymmetric junctions that caused wrinkles, according to Rice University...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

Event News

Ecology Across Borders: International conference brings together 1,500 ecologists

15.11.2017 | Event News

Road into laboratory: Users discuss biaxial fatigue-testing for car and truck wheel

15.11.2017 | Event News

#Berlin5GWeek: The right network for Industry 4.0

30.10.2017 | Event News

 
Latest News

NASA detects solar flare pulses at Sun and Earth

17.11.2017 | Physics and Astronomy

NIST scientists discover how to switch liver cancer cell growth from 2-D to 3-D structures

17.11.2017 | Health and Medicine

The importance of biodiversity in forests could increase due to climate change

17.11.2017 | Studies and Analyses

VideoLinks
B2B-VideoLinks
More VideoLinks >>>