Reference : Lightweight Hidden Services
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/10404
Lightweight Hidden Services
English
Panchenko, Andriy mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Spaniol, Otto [RWTH Aachen University, Germany]
Egners, Andre [RWTH Aachen University, Germany]
Engel, Thomas mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
2011
10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2011)
IEEE Computer Society
Yes
International
978-0-7695-4600-1
10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2011)
November 2011
Changsha
China
[en] Hidden services (HS) are mechanisms designed to provide network services while preserving anonymity for the identity of the server. Besides protecting the identity of the server, hidden services help to resist censorship, are resistant against distributed DoS attacks, and allow server functionality even if the service provider does not own a public IP address. Currently, only the Tor network offers this feature in full functionality. However, the HS concept in Tor is complex and provides poor performance. According to recent studies, average contact time for a hidden service is 24s which is far beyond what an average user is willing to wait. In this paper we introduce a novel approach for hidden services that achieves similar functionality as HS in Tor but does so in a simple and lightweight way with the goal to improve performance and usability. Additionally, contrary to Tor, in our approach clients are not required to install any specific software for accessing hidden services. This increases usability of our approach. Simplicity makes our approach easier to understand for normal users, eases protocol reviews, and increases chances of having several implementations of the protocol available. Moreover, simpler solutions are easier to analyze and they are naturally less prone to implementation failures rather than complex protocols. In this paper, we describe our approach and provide performance as well as anonymity analysis of resulting properties of the protocol.
http://hdl.handle.net/10993/10404
Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2011), Changsha, China, November 2011

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
lightweight-hidden-services-ieee-trustcom11.pdfAuthor postprint304.8 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.