Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR)
Title | Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR) |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Elgzil, A., Chow, C. E., Aljaedi, A., Alamri, N. |
Conference Name | 2017 IEEE Conference on Dependable and Secure Computing |
Keywords | anonymity, cloud computing, cloud networks, composability, computer network security, cyber anonymity service, cyber anonymity technique, e-cash, Government, Human Behavior, Internet, Metrics, multiple anonymity service providers, network traffic censorship, onion routing, OpenFlow, privacy, Protocols, pubcrawl, Relays, resilience, Resiliency, Routing, Servers, software defined networking, software-defined networking, software-defined networking and onion routing, SOR architecture, telecommunication network routing, telecommunication traffic, Token, Tor, traffic surveillance |
Abstract | Cyber anonymity tools have attracted wide attention in resisting network traffic censorship and surveillance, and have played a crucial role for open communications over the Internet. The Onion Routing (Tor) is considered the prevailing technique for circumventing the traffic surveillance and providing cyber anonymity. Tor operates by tunneling a traffic through a series of relays, making such traffic to appear as if it originated from the last relay in the traffic path, rather than from the original user. However, Tor faced some obstructions in carrying out its goal effectively, such as insufficient performance and limited capacity. This paper presents a cyber anonymity technique based on software-defined networking; named SOR, which builds onion-routed tunnels across multiple anonymity service providers. SOR architecture enables any cloud tenants to participate in the anonymity service via software-defined networking. Our proposed architecture leverages the large capacity and robust connectivity of the commercial cloud networks to elevate the performance of the cyber anonymity service. |
URL | http://ieeexplore.ieee.org/document/8073856/ |
DOI | 10.1109/DESEC.2017.8073856 |
Citation Key | elgzil_cyber_2017 |
- software-defined networking
- Protocols
- pubcrawl
- Relays
- resilience
- Resiliency
- Routing
- Servers
- software defined networking
- privacy
- software-defined networking and onion routing
- SOR architecture
- telecommunication network routing
- telecommunication traffic
- Token
- Tor
- traffic surveillance
- anonymity
- OpenFlow
- onion routing
- network traffic censorship
- multiple anonymity service providers
- Metrics
- internet
- Human behavior
- Government
- E-cash
- cyber anonymity technique
- cyber anonymity service
- computer network security
- composability
- cloud networks
- Cloud Computing