do dummies pay off
play

Do dummies pay off? Limits of dummy traffic protection in anonymous - PowerPoint PPT Presentation

Do dummies pay off? Limits of dummy traffic protection in anonymous communication systems Simon Oya , Carmela Troncoso and Fernando Prez-Gonzlez Introduction Anonymous channels hide correspondences (input/output). Dummies are a common


  1. Do dummies pay off? Limits of dummy traffic protection in anonymous communication systems Simon Oya , Carmela Troncoso and Fernando Pérez-González

  2. Introduction • Anonymous channels hide correspondences (input/output). • Dummies are a common protection mechanism. 2

  3. Motivation 3

  4. System Model • Basic pool-mix scenario • Firing condition: triggers the flushing of messages. • Batching strategy: how messages are chosen from the pool. • Sender-based dummies: die at the mix. • Mix-based dummies: generated by the mix. • (This was one communication round ) 4

  5. System Model. Adversary. • Goal: infer • She cannot see the content of the messages… • … but she can see the number of messages sent/received. • She is aware of the system parameters: observes ρ • Mix behavior communication • Dummy policy rounds 5

  6. Least-Squares Estimator • Goal: infer all • Information: ρ rounds • Idea: minimize output error: ρ rounds Pool + Dummies :probabilities • Expanding • Rem. Constraints 6

  7. Performance Analysis. MSE. • Derive an expression for: • Assumptions: • MSE formula:  Receiver Observations Pool Sender 7

  8. Performance Analysis. Interpretation (I). 8

  9. Performance analysis. Interpretation (II). 9

  10. Performance analysis. Interpretation (II). 10

  11. Performance analysis. Interpretation (II). 11

  12. Designing dummy traffic strategies. • We understand the effect of the dummies in the MSE. Dummy Strategy! • Privacy objective PICK YOUR FAVOURITE PRIVACY OBJECTIVE!! • As an example: we pick two objectives. • Assumptions: • Return channel • Budget of dummies 12

  13. Dummy Strategy 1. • Objective : increase the protection of all the relations by a constant factor. 13

  14. Dummy Strategy 1. • Solution : assign dummies proportionally to message rates. • Experimental results: 14

  15. Design Strategy 2. • Objective : provide a minimum protection as large as possible. Receiver-based dummies Unaffected Sender-based dummies Both kinds of dummies 15

  16. Dummy Strategy 2. • Solution : waterfilling-like algorithm. • Experimental Results 16

  17. Conclusions. Methodology. 17

  18. Thanks! simonoya@gts.uvigo.es 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend