A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous system

The paper introduces a new collaborative technique for assuring data integrity while avoiding traffic analysis and other types of similar attacks (e.g., man-in-the-middle, data source fingerprinting, etc.). The new technique utilizes a quorum based approach to allow the client to validate the authen...

Full description

Saved in:
Bibliographic Details
Main Author: Haraty, Ramzi A. (author)
Other Authors: Zantout, Bassem (author)
Format: article
Published: 2015
Online Access:http://hdl.handle.net/10725/5132
http://dx.doi.org/10.1016/j.chb.2014.09.031
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://ac.els-cdn.com/S074756321400483X/1-s2.0-S074756321400483X-main.pdf?_tid=a1e09394-e852-11e6-b638-00000aab0f6c&acdnat=1485935408_366c8e33e206dcbb11a737916f518f37
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The paper introduces a new collaborative technique for assuring data integrity while avoiding traffic analysis and other types of similar attacks (e.g., man-in-the-middle, data source fingerprinting, etc.). The new technique utilizes a quorum based approach to allow the client to validate the authenticity of the received data at his/her end by comparing different copies of the data. Similar to a reputation system, the new approach relies on the feedback of end-user communication experiences as well as a centralized entity to determine the trustfulness of nodes in the system. The new approach also is a hybrid of centralized and decentralized system that will help in keeping the system ‘alive’ to prevent different types of attacks that are carried out on centralized and decentralized peer-to-peer systems. The technique also accomplishes data transfer from source to destination using a distributed system, encryption, and a relatively new way for communication amongst system components.