We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of group members and the adversary is modeled as a discrete-time Markov chain, and security properties are expressed as PCTL formulas. To illustrate feasibility of the approach, we model the Crowds system for anony-mous Web browsing, and use a probabilistic model checker, PRISM, to perform automated analysis of the system and verify anonymity guarantees it provides. The main result of the Crowds analysis is a demonstration of how certain forms of anonymity degrade with the increase in group size and the number of random routing paths. 1
One of the dominant properties of a global computing network is the incomplete information available...
Currently known basic anonymity techniques depend on identity verification. If verification of user ...
International audienceWe consider a framework in which anonymity protocols are interpreted as noisy ...
We use the probabilistic model checker PRISM to analyze the Crowds system for anonymous Web browsing...
As we dive into the digital era, there is growing concern about the amount of personal digital infor...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potentia...
We propose a framework in which anonymity protocols are interpreted as particular kinds of channels,...
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either...
AbstractWe propose a probabilistic system model for anonymous ad hoc routing protocols that takes in...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
AbstractAnonymity means that the identity of the user performing a certain action is maintained secr...
Anonymous communication protocols are indispensable to protect users' privacy in open networks such ...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the inform...
One of the dominant properties of a global computing network is the incomplete information available...
Currently known basic anonymity techniques depend on identity verification. If verification of user ...
International audienceWe consider a framework in which anonymity protocols are interpreted as noisy ...
We use the probabilistic model checker PRISM to analyze the Crowds system for anonymous Web browsing...
As we dive into the digital era, there is growing concern about the amount of personal digital infor...
Click on the DOI link to access the article (may not be free).A major objective of any system-wide a...
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potentia...
We propose a framework in which anonymity protocols are interpreted as particular kinds of channels,...
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either...
AbstractWe propose a probabilistic system model for anonymous ad hoc routing protocols that takes in...
AbstractWe consider a framework in which anonymity protocols are interpreted as noisy channels in th...
AbstractAnonymity means that the identity of the user performing a certain action is maintained secr...
Anonymous communication protocols are indispensable to protect users' privacy in open networks such ...
We consider a framework in which anonymity protocols are interpreted as noisy channels in the inform...
One of the dominant properties of a global computing network is the incomplete information available...
Currently known basic anonymity techniques depend on identity verification. If verification of user ...
International audienceWe consider a framework in which anonymity protocols are interpreted as noisy ...