Do dummies pay off? Limits of dummy traffic protection in anonymous - - PowerPoint PPT Presentation

do dummies pay off
SMART_READER_LITE
LIVE PREVIEW

Do dummies pay off? Limits of dummy traffic protection in anonymous - - PowerPoint PPT Presentation

Do dummies pay off? Limits of dummy traffic protection in anonymous communication systems Simon Oya , Carmela Troncoso and Fernando Prez-Gonzlez Introduction Anonymous channels hide correspondences (input/output). Dummies are a common


slide-1
SLIDE 1

Do dummies pay off?

Limits of dummy traffic protection in anonymous communication systems

Simon Oya, Carmela Troncoso and Fernando Pérez-González

slide-2
SLIDE 2

Introduction

  • Anonymous channels hide correspondences (input/output).
  • Dummies are a common protection mechanism.

2

slide-3
SLIDE 3

Motivation

3

slide-4
SLIDE 4

System Model

  • Basic pool-mix scenario
  • Firing condition: triggers the flushing of messages.
  • Batching strategy: how messages are chosen from the pool.
  • Sender-based dummies: die at the mix.
  • Mix-based dummies: generated by the mix.
  • (This was one communication round)

4

slide-5
SLIDE 5

System Model. Adversary.

  • Goal: infer
  • She cannot see the content of the messages…
  • … but she can see the number of

messages sent/received.

  • She is aware of the system parameters:
  • Mix behavior
  • Dummy policy
  • bserves ρ

communication rounds

5

slide-6
SLIDE 6

Least-Squares Estimator

  • Goal: infer all
  • Information:
  • Idea: minimize output error:
  • Expanding
  • Rem. Constraints

6

Pool + Dummies :probabilities ρ rounds ρ rounds

slide-7
SLIDE 7

Performance Analysis. MSE.

  • Derive an expression for:
  • Assumptions:
  • MSE formula:

Observations Pool Sender Receiver

7

slide-8
SLIDE 8

Performance Analysis. Interpretation (I).

8

slide-9
SLIDE 9

Performance analysis. Interpretation (II).

9

slide-10
SLIDE 10

Performance analysis. Interpretation (II).

10

slide-11
SLIDE 11

Performance analysis. Interpretation (II).

11

slide-12
SLIDE 12

Designing dummy traffic strategies.

  • We understand the effect of the dummies in the

MSE.

  • Privacy objective
  • As an example: we pick two objectives.
  • Assumptions:
  • Budget of dummies

Dummy Strategy!

12

PICK YOUR FAVOURITE PRIVACY OBJECTIVE!!

  • Return channel
slide-13
SLIDE 13

Dummy Strategy 1.

  • Objective: increase the protection of all the relations by a

constant factor.

13

slide-14
SLIDE 14

Dummy Strategy 1.

  • Solution: assign dummies proportionally to message rates.
  • Experimental results:

14

slide-15
SLIDE 15

Design Strategy 2.

  • Objective: provide a minimum protection as large as

possible.

Sender-based dummies Both kinds

  • f dummies

Receiver-based dummies Unaffected

15

slide-16
SLIDE 16

Dummy Strategy 2.

  • Solution: waterfilling-like algorithm.
  • Experimental Results

16

slide-17
SLIDE 17
  • Conclusions. Methodology.

17

slide-18
SLIDE 18

Thanks!

18

simonoya@gts.uvigo.es