0

To solve this problem, we present a secure protocol based on trusted hardware that allows servers to block anonymous users without knowledge of their actual IP addresses. Although this work applies to anonymizing networks in general, we consider Tor for purposes of exhibition. Building and prototyping a system based on our proposed solution is ongoing work. 



In this paper we present our proposed solution and protocol. At a high level, our system provides users with an ordered collection of pseudonyms for each website. Each pseudonym is valid for a small time period, and a user’s anonymity is maintained between these time periods. Without a trapdoor, the pseudonyms look unrelated to the website, and users enjoy anonymity


Our solution makes use of trusted hardware as a Trusted Third Party (TTP). The TTP needs to be able to store its data and carry out computations without an external adversary—even the operator of the machine—being able to observe or manipulate it (except for destroying it altogether). To achieve this, we plan on using trusted hardware with the ability to provide a secure execution environment bound to private keys. In our prototype work, we are using an IBM 4758 [9] and plan to use an IBM 4764; however, we anticipate that similar environments will be enabled, perhaps with a lower degree of tamper protection, by architectures based on TPMs or newer CPU models such as XOM [6], AEGIS [10], or LT [4], or even a new type of TPM [1].






3 MB

Password = www.tricktechguru.com

 
Top