Privacy-enhancing technologies for private services:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Bamberg
Univ. of Bamberg Press
2009
|
Schriftenreihe: | Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg
2 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis |
Beschreibung: | Zsfassung in dt. und engl. Sprache |
Beschreibung: | 213 S. Ill., graph. Darst. |
ISBN: | 9783923507450 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035619660 | ||
003 | DE-604 | ||
005 | 20220417 | ||
007 | t | ||
008 | 090709s2009 gw ad|| m||| 00||| eng d | ||
020 | |a 9783923507450 |c Broschur : EUR 17.60 |9 978-3-923507-45-0 | ||
024 | 3 | |a 9783923507450 | |
035 | |a (OCoLC)645454673 | ||
035 | |a (DE-599)BVBBV035619660 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BY | ||
049 | |a DE-473 |a DE-12 |a DE-22 |a DE-355 |a DE-384 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Loesing, Karsten |e Verfasser |0 (DE-588)1228637628 |4 aut | |
245 | 1 | 0 | |a Privacy-enhancing technologies for private services |c von Karsten Loesing |
264 | 1 | |a Bamberg |b Univ. of Bamberg Press |c 2009 | |
300 | |a 213 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg |v 2 | |
500 | |a Zsfassung in dt. und engl. Sprache | ||
502 | |a Zugl.: Bamberg, Univ., Diss., 2009 | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Instant Messaging |0 (DE-588)4768766-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Instant Messaging |0 (DE-588)4768766-6 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |C b |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o urn:nbn:de:bvb:473-opus-1832 |
830 | 0 | |a Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg |v 2 |w (DE-604)BV035260948 |9 2 | |
856 | 4 | 1 | |s 2,941 MB |u https://fis.uni-bamberg.de/handle/uniba/204 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017674834&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-017674834 |
Datensatz im Suchindex
_version_ | 1804139289798246400 |
---|---|
adam_text | Contents
1
Introduction
1
2
Background
on Pseudonymous Services
9
2.1
Definition of Pseudonymous Services
........... 10
2.1.1
Distributed Systems
................. 10
2.1.2
Security Properties
.................. 13
2.1.3
Properties of Privacy-Enhancing Technologies
. . 15
2.1.4
Pseudonymous Services
............... 18
2.2*
Technologies for High-Latency Recipient
Pseudonymity
. 19
2.2.1
Usenet Message Pools
................ 19
2.2.2
Pseudonymous Remailers
............. 20
2.2.3
Reply-Block-Based Nymservers
........... 22
2.2.4
Private Information Retrieval
............ 28
2.2.5
Comparison
..................... 29
2.3
Technologies for Low-Latency
Responder
Pseudonymity .
31
2.3.1
ISDN Mixes
..................... 31
2.3.2
Onion Routing
.................... 33
2.3.3
TAZ
Servers and Rewebber Network
........ 35
2.3.4
Pseudonymous IP Network
............. 36
2.3.5
Tarzan
........................ 38
2.3.6
I2P
.......................... 38
2.3.7
Tor
.......................... 39
2.3.8
Comparison
..................... 41
XIV
3
Tor Hidden Services
45
3.1
Circuit Creation
....................... 45
3.2
Directory System
....................... 49
3.3
Hidden Services
....................... 51
3.4
Threat Model
......................... 54
4
Distributed Descriptor Storage
57
4.1
Requirements
........................ 58
4.2
Previous Work on Descriptor Storage
............ 59
4.3
Existing Tor Hidden Service Directory Design
....... 61
4.4
Proposed Tor Hidden Service Directory Design
...... 64
4.4.1
Overview
....................... 66
4.4.2
Distribution of Consistent Routing Information
. 67
4.4.3
Publication of Hidden Service Descriptors
..... 69
4.4.4
Fetching Hidden Service Descriptors
....... 73
4.5
Security Implications
.................... 73
4.6
Evaluation
........................... 77
4.6.1
Network Characteristics
............... 77
4.6.2
Descriptor Availability
................ 82
4.7
Implementation
....................... 92
4.8
Conclusion
.......................... 98
5
Client Authorization
101
5.1
Requirements
........................ 102
5.2
Existing Client Authorization Approaches
......... 103
5.2.1
Single Service for All Users
............. 104
5.2.2
Separate Service For Each Client
.......... 105
5.2.3
Separate Service For Groups of Clients
...... 106
5.2.4
Conclusions from Existing Approaches
...... 107
5.3
Basic Pseudonymous Client Authorization Protocol
.... 107
5.3.1
New Introduction Key for Introduction Points
. . 108
XV
5.3.2
Encryption of Introduction Points in Hidden Ser¬
vice Descriptor
.................... 109
5.3.3
Client Authorization at Hidden Server
.......
Ill
5.3.4
Summary of Basic Pseudonymous Client Autho¬
rization Protocol
................... 112
5.4
Stealth Pseudonymous Client Authorization Protocol
. . . 113
5.4.1
Client-specific Service Identities
.......... 114
5.4.2
Private Entries in Descriptor Directory
....... 115
5.4.3
Encryption of Introduction Points
......... 115
5.4.4
Delayed Descriptor Publication
........... 116
5.4.5
Summary
....................... 117
5.5
Security Analysis
....................... 117
5.5.1
Access Service without Permission
......... 119
5.5.2
Perform Denial-of-Service Attack
.......... 120
5.5.3
Censor Service
.................... 121
5.5.4
Track Service Activity
................ 122
5.5.5
Track Client Requests
................ 124
5.5.6
Summary
....................... 125
5.6
Implementation
....................... 125
5.7
Conclusion
.......................... 130
Performance of Pseudonymous Services
133
6.1
Measurement Setup
..................... 134
6.2
Service Publication
...................... 138
6.2.1
Measurements
.................... 139
6.2.2
Improvements
.................... 144
6.3
Connection Establishment
.................. 150
6.3.1
Measurements
.................... 151
6.3.2
Improvements
.................... 162
6.4
Conclusion
.......................... 172
XVI
7
Related Work
175
7.1
Private Hidden Services
................... 175
7.2
Locating Hidden Servers
................... 177
7.3
Attacks on Availability of Hidden Services
......... 182
7.4
Applications Based on Hidden Services
.......... 184
8
Conclusion
187
A Implementation
195
|
any_adam_object | 1 |
author | Loesing, Karsten |
author_GND | (DE-588)1228637628 |
author_facet | Loesing, Karsten |
author_role | aut |
author_sort | Loesing, Karsten |
author_variant | k l kl |
building | Verbundindex |
bvnumber | BV035619660 |
classification_rvk | ST 276 |
collection | ebook |
ctrlnum | (OCoLC)645454673 (DE-599)BVBBV035619660 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02371nam a2200517 cb4500</leader><controlfield tag="001">BV035619660</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220417 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090709s2009 gw ad|| m||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783923507450</subfield><subfield code="c">Broschur : EUR 17.60</subfield><subfield code="9">978-3-923507-45-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783923507450</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)645454673</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035619660</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BY</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-22</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-384</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Loesing, Karsten</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1228637628</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy-enhancing technologies for private services</subfield><subfield code="c">von Karsten Loesing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bamberg</subfield><subfield code="b">Univ. of Bamberg Press</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">213 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg</subfield><subfield code="v">2</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Zsfassung in dt. und engl. Sprache</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Bamberg, Univ., Diss., 2009</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Instant Messaging</subfield><subfield code="0">(DE-588)4768766-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Instant Messaging</subfield><subfield code="0">(DE-588)4768766-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">urn:nbn:de:bvb:473-opus-1832</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg</subfield><subfield code="v">2</subfield><subfield code="w">(DE-604)BV035260948</subfield><subfield code="9">2</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="s">2,941 MB</subfield><subfield code="u">https://fis.uni-bamberg.de/handle/uniba/204</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017674834&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017674834</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV035619660 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:41:43Z |
institution | BVB |
isbn | 9783923507450 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017674834 |
oclc_num | 645454673 |
open_access_boolean | 1 |
owner | DE-473 DE-BY-UBG DE-12 DE-22 DE-BY-UBG DE-355 DE-BY-UBR DE-384 |
owner_facet | DE-473 DE-BY-UBG DE-12 DE-22 DE-BY-UBG DE-355 DE-BY-UBR DE-384 |
physical | 213 S. Ill., graph. Darst. |
psigel | ebook |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Univ. of Bamberg Press |
record_format | marc |
series | Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg |
series2 | Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg |
spelling | Loesing, Karsten Verfasser (DE-588)1228637628 aut Privacy-enhancing technologies for private services von Karsten Loesing Bamberg Univ. of Bamberg Press 2009 213 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg 2 Zsfassung in dt. und engl. Sprache Zugl.: Bamberg, Univ., Diss., 2009 Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Instant Messaging (DE-588)4768766-6 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Instant Messaging (DE-588)4768766-6 s Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s Privatsphäre (DE-588)4123980-5 s b DE-604 Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:473-opus-1832 Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg 2 (DE-604)BV035260948 2 2,941 MB https://fis.uni-bamberg.de/handle/uniba/204 Verlag kostenfrei Volltext Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017674834&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Loesing, Karsten Privacy-enhancing technologies for private services Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Instant Messaging (DE-588)4768766-6 gnd Privatsphäre (DE-588)4123980-5 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 (DE-588)4768766-6 (DE-588)4123980-5 (DE-588)4113937-9 |
title | Privacy-enhancing technologies for private services |
title_auth | Privacy-enhancing technologies for private services |
title_exact_search | Privacy-enhancing technologies for private services |
title_full | Privacy-enhancing technologies for private services von Karsten Loesing |
title_fullStr | Privacy-enhancing technologies for private services von Karsten Loesing |
title_full_unstemmed | Privacy-enhancing technologies for private services von Karsten Loesing |
title_short | Privacy-enhancing technologies for private services |
title_sort | privacy enhancing technologies for private services |
topic | Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Instant Messaging (DE-588)4768766-6 gnd Privatsphäre (DE-588)4123980-5 gnd |
topic_facet | Datenschutz Computersicherheit Instant Messaging Privatsphäre Hochschulschrift |
url | https://fis.uni-bamberg.de/handle/uniba/204 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017674834&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035260948 |
work_keys_str_mv | AT loesingkarsten privacyenhancingtechnologiesforprivateservices |