Visible to the public Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR)

TitleCyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR)
Publication TypeConference Paper
Year of Publication2017
AuthorsElgzil, A., Chow, C. E., Aljaedi, A., Alamri, N.
Conference Name2017 IEEE Conference on Dependable and Secure Computing
Keywordsanonymity, cloud computing, cloud networks, composability, computer network security, cyber anonymity service, cyber anonymity technique, e-cash, Government, Human Behavior, Internet, Metrics, multiple anonymity service providers, network traffic censorship, onion routing, OpenFlow, privacy, Protocols, pubcrawl, Relays, resilience, Resiliency, Routing, Servers, software defined networking, software-defined networking, software-defined networking and onion routing, SOR architecture, telecommunication network routing, telecommunication traffic, Token, Tor, traffic surveillance
Abstract

Cyber anonymity tools have attracted wide attention in resisting network traffic censorship and surveillance, and have played a crucial role for open communications over the Internet. The Onion Routing (Tor) is considered the prevailing technique for circumventing the traffic surveillance and providing cyber anonymity. Tor operates by tunneling a traffic through a series of relays, making such traffic to appear as if it originated from the last relay in the traffic path, rather than from the original user. However, Tor faced some obstructions in carrying out its goal effectively, such as insufficient performance and limited capacity. This paper presents a cyber anonymity technique based on software-defined networking; named SOR, which builds onion-routed tunnels across multiple anonymity service providers. SOR architecture enables any cloud tenants to participate in the anonymity service via software-defined networking. Our proposed architecture leverages the large capacity and robust connectivity of the commercial cloud networks to elevate the performance of the cyber anonymity service.

URLhttp://ieeexplore.ieee.org/document/8073856/
DOI10.1109/DESEC.2017.8073856
Citation Keyelgzil_cyber_2017