QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol

<p>In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk with the advances in surveillance techniques. Users' online beha...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Lamiaa Basyoni (16896426) (author)
مؤلفون آخرون: Aiman Erbad (14150589) (author), Mashael Alsabah (16896429) (author), Noora Fetais (16084859) (author), Amr Mohamed (3508121) (author), Mohsen Guizani (12580291) (author)
منشور في: 2021
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513560431820800
author Lamiaa Basyoni (16896426)
author2 Aiman Erbad (14150589)
Mashael Alsabah (16896429)
Noora Fetais (16084859)
Amr Mohamed (3508121)
Mohsen Guizani (12580291)
author2_role author
author
author
author
author
author_facet Lamiaa Basyoni (16896426)
Aiman Erbad (14150589)
Mashael Alsabah (16896429)
Noora Fetais (16084859)
Amr Mohamed (3508121)
Mohsen Guizani (12580291)
author_role author
dc.creator.none.fl_str_mv Lamiaa Basyoni (16896426)
Aiman Erbad (14150589)
Mashael Alsabah (16896429)
Noora Fetais (16084859)
Amr Mohamed (3508121)
Mohsen Guizani (12580291)
dc.date.none.fl_str_mv 2021-02-16T00:00:00Z
dc.identifier.none.fl_str_mv 10.1109/access.2021.3059672
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/QuicTor_Enhancing_Tor_for_Real-Time_Communication_Using_QUIC_Transport_Protocol/24049308
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Data management and data science
Distributed computing and systems software
Protocols
Security
Privacy
Delays
Transport protocols
Virtual private networks
Multiplexing
Anonymity
Tor
QUIC
dc.title.none.fl_str_mv QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p>In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk with the advances in surveillance techniques. Users' online behavior, activities, and even personal information are being tracked by ISPs and major tech companies. In response to the increasing need for preserving and protecting the privacy of online users, anonymity networks were developed. Tor anonymity network is a low-latency anonymity network that has gained quite a good reputation over the past years and is being adopted by thousands of users. With the great attention Tor's network is getting, the original design of Tor was proven to have performance limiting issues. With the motivation for addressing the performance limitation in Tor, we present QuicTor, a datagram-based design to solve Tor's transport-layer limiting issue. We evaluated the performance of QuicTor in comparison to vanilla Tor as well as other performance-enhancing proposals. QuicTor achieved significant performance improvements for interactive applications as well as streaming applications. Running Tor over a datagram-based protocol entails a careful security analysis. In this article, we assess the behavior of QuicTor under side-channel attacks aiming to de-anonymize Tor's clients. We show that the performance improvements brought by QuicTor do not reduce the anonymity of clients under the investigated types of attacks.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2021.3059672" target="_blank">https://dx.doi.org/10.1109/access.2021.3059672</a></p>
eu_rights_str_mv openAccess
id Manara2_404d61e7a2669e8d50ff45b5462fc4db
identifier_str_mv 10.1109/access.2021.3059672
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/24049308
publishDate 2021
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport ProtocolLamiaa Basyoni (16896426)Aiman Erbad (14150589)Mashael Alsabah (16896429)Noora Fetais (16084859)Amr Mohamed (3508121)Mohsen Guizani (12580291)Information and computing sciencesCybersecurity and privacyData management and data scienceDistributed computing and systems softwareProtocolsSecurityPrivacyDelaysTransport protocolsVirtual private networksMultiplexingAnonymityTorQUIC<p>In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk with the advances in surveillance techniques. Users' online behavior, activities, and even personal information are being tracked by ISPs and major tech companies. In response to the increasing need for preserving and protecting the privacy of online users, anonymity networks were developed. Tor anonymity network is a low-latency anonymity network that has gained quite a good reputation over the past years and is being adopted by thousands of users. With the great attention Tor's network is getting, the original design of Tor was proven to have performance limiting issues. With the motivation for addressing the performance limitation in Tor, we present QuicTor, a datagram-based design to solve Tor's transport-layer limiting issue. We evaluated the performance of QuicTor in comparison to vanilla Tor as well as other performance-enhancing proposals. QuicTor achieved significant performance improvements for interactive applications as well as streaming applications. Running Tor over a datagram-based protocol entails a careful security analysis. In this article, we assess the behavior of QuicTor under side-channel attacks aiming to de-anonymize Tor's clients. We show that the performance improvements brought by QuicTor do not reduce the anonymity of clients under the investigated types of attacks.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2021.3059672" target="_blank">https://dx.doi.org/10.1109/access.2021.3059672</a></p>2021-02-16T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2021.3059672https://figshare.com/articles/journal_contribution/QuicTor_Enhancing_Tor_for_Real-Time_Communication_Using_QUIC_Transport_Protocol/24049308CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/240493082021-02-16T00:00:00Z
spellingShingle QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
Lamiaa Basyoni (16896426)
Information and computing sciences
Cybersecurity and privacy
Data management and data science
Distributed computing and systems software
Protocols
Security
Privacy
Delays
Transport protocols
Virtual private networks
Multiplexing
Anonymity
Tor
QUIC
status_str publishedVersion
title QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
title_full QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
title_fullStr QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
title_full_unstemmed QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
title_short QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
title_sort QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
topic Information and computing sciences
Cybersecurity and privacy
Data management and data science
Distributed computing and systems software
Protocols
Security
Privacy
Delays
Transport protocols
Virtual private networks
Multiplexing
Anonymity
Tor
QUIC