+ All Categories
Home > Documents > Shishir Nagaraja Computer Lab University of...

Shishir Nagaraja Computer Lab University of...

Date post: 08-Aug-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
24
Mixes on unstructured topologies Shishir Nagaraja Computer Lab University of Cambridge
Transcript
Page 1: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Mixes on unstructured topologies

Shishir NagarajaComputer Lab

University of Cambridge

Page 2: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

what does anonymity mean?

Unlinkability: Hide the connection between the senders and the recipients.Untraceability: Hide the connection between actions of the same sender.Unobservability: Hide the fact that the user is talking.

Page 3: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

User a

Attacker

Mix Network

User 1User 2User 3

User n

User b

User c

Mix-network

Page 4: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Mix-network topology and mix-route

User aUser 1

User 2

User 3

User n

User b

User c

Attacker

Page 5: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Desirable properties of the mix-network

‘High’ traffic analysis resistance.Size: The larger the network, greater the anonymity set or maximal anonymity.Traffic: More traffic means better anonymityRobustness:

Liability management in anonymous communicationClear incentives for carrying traffic under legal pressure

Page 6: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Evaluation frameworkIs the given topology any good?

Figure out the efficiency of the mixing process.Analyze the traffic-analysis resistance of the mix-network.

Modeling mix network operationMarkovian random walks

What we are not interested in:Side channel analysisVariation in protocol behaviour across topologies

Page 7: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Measuring anonymity

Number of bits the attacker is missing to uniquely link an actor to an action –(Serjantov and Danezis, PET 2002).

Page 8: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Evaluation recap

Under conditions of maximal anonymity:Minimum mix-route length required.Amount of traffic needed to prevent intersection attacks – traffic load patterns.Resistance to corrupt nodes.

Page 9: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

TheoryInfinite length

WalkWalk of length t

Second eigenvalue of the transition matrix Tij=(1/ki) Aij

A Adjacency matrixki Degree of node i

1.

Convergence

Page 10: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

See the paper for a proof of why the second eigenvalue is a constant for varying network size (n).

2. qt = qt-1T

Page 11: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Structured graph topologiesOptimal mixing properties are obtained in expander graphs such as Ramanujan graphs.For N=5000 nodes, we have, λ2≥0.5527Hence, we can calculate mix-route length as approximately 4 hops.

(source:www.ams.org)

Page 12: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Unstructured network topologiesErdős-Rényi random graph topology

We chose p such that the |biggest component| ~ |V|=5000 nodes

( )!

k

P k ek

λ λ−=

11(1 )k N k

ER ER

Np p

kλ − −−⎛ ⎞= −⎜ ⎟⎝ ⎠

Page 13: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Mixing efficiency of ER graph topology

Page 14: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Graph topologies continued…

Scale-free topologiesPower law

Heavy-tailed distributionP(X>x) ~ x-a, 0<a<2

Zipf distribution / Zeta distribution

P(k) = Ck-(a+1)

Pareto distributionf(x) = abax-(a+1)

Page 15: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Mixing efficiency of SFR graph topology

SFR models the massive AT&T call graph

Page 16: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Mixing efficiency of KWS topology(weak and strong ties)

q=1, r=2

Page 17: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Mixing efficiency of SF-BA graph topology

GrowthStart with m0 nodes, and then add a node with m edges at every time step.m=m0

Preferential attachment

It is a simple model but…

Fixed exponent = 3

( ) ii

jj

kkk

=∏ ∑

Page 18: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

LiveJournalSource: Trejkaz Xaoza, Touchgraph

Pavel Zakharov, Thermodynamic approach for community discovering within the complex networks: LiveJournal study. e-print on arxiv.org: physics/0602063.

Page 19: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Mixing efficiency of LiveJournal topology

Page 20: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Corrupt nodes

User a

Attacker

Anonymity Network

User 1

User 2

User 3

User n

User b

User c

Mix10

Mix2

Mix3

Mix13Mix9

Page 21: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Intersection attacksPr[any unused link] ~ 0Attacker: is the traffic from Alice proceeding along (i,j)?

Mean volume vs observed volume of trafficL (confidence parameter) – number of standard deviations from the mean.b – batch size, pi = 1/di , k = 2 mixing rounds.

Page 22: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

Page 23: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

structured vs unstructured…

Traffic analysis resistance – ComparableMaximal anonymity – ComparableTopological robustness in the face of litigation pressure – this depends on the social capital in the network.

Friends process each other’s traffic.Processing “3rd party” traffic - indirect reciprocity -encourages a diverse user base which brings its benefits (Anonymity loves company, Dingledineand Mathewson 2006).

Page 24: Shishir Nagaraja Computer Lab University of Cambridgepersonal.strath.ac.uk/shishir.nagaraja/papers/anon-pet2007.pdf · Shishir Nagaraja University of Cambridge 22 June 2007 PET 2007

Shishir Nagaraja University of Cambridge 22 June 2007

PET 2007

ConclusionsA successful mix-network design needs to consider the issues of liability management.Tapping social capital in a network to enhance topological robustness is an attractive proposal, And we have established the essential technical feasibility of this if this means using an unstructured mixnettopologySpecifically:

Mix-route length is not a problemCorrupt hubs are not a problem eitherBatch sizes are however a challenge. Where do we bring 8 times the amount of dummy traffic from when compared to expanders? – will social chatter suffice?


Recommended