4.6 Article

QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol

期刊

IEEE ACCESS
卷 9, 期 -, 页码 28769-28784

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3059672

关键词

Protocols; Security; Privacy; Delays; Transport protocols; Virtual private networks; Multiplexing; Privacy; anonymity; tor; transport protocols; QUIC

资金

  1. NPRP grant from Qatar National Research Fund (Qatar Foundation) [7-1469-1-273]
  2. Qatar University grant IRCC [2020-003]

向作者/读者索取更多资源

The internet has become the fastest way to access information, but it also poses challenges to users' privacy. Anonymity networks like Tor have been developed to address this issue, with new designs like QuicTor showing significant performance improvements without compromising user anonymity.
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk with the advances in surveillance techniques. Users' online behavior, activities, and even personal information are being tracked by ISPs and major tech companies. In response to the increasing need for preserving and protecting the privacy of online users, anonymity networks were developed. Tor anonymity network is a low-latency anonymity network that has gained quite a good reputation over the past years and is being adopted by thousands of users. With the great attention Tor's network is getting, the original design of Tor was proven to have performance limiting issues. With the motivation for addressing the performance limitation in Tor, we present QuicTor, a datagram-based design to solve Tor's transport-layer limiting issue. We evaluated the performance of QuicTor in comparison to vanilla Tor as well as other performance-enhancing proposals. QuicTor achieved significant performance improvements for interactive applications as well as streaming applications. Running Tor over a datagram-based protocol entails a careful security analysis. In this article, we assess the behavior of QuicTor under side-channel attacks aiming to de-anonymize Tor's clients. We show that the performance improvements brought by QuicTor do not reduce the anonymity of clients under the investigated types of attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据