Overview of Web Anonymization

  • Tomas Sochor Institute of Informatics Faculty of Business and Economics Mendel University in Brno http://orcid.org/0000-0002-1704-1883
  • Cyril Klimes Institute of Informatics Faculty of Business and Economics Mendel University in Brno

Abstract

Web anonymization tools have been used for a long time, primarily by the users afraid of possible undesirable consequences of their on-line activity on the web. The paper analyzes both historically proven anonymization tools like TOR and newer tools, namely JAP/JonDo and CyberGhost VPN that are based on slightly modified technological principles. The primary focus is given to the measurement and evaluation of the latency increase and the transmission speed decrease in comparison to normal (non--anonymized) web browser operation. Results show that all anonymization tools being subject of the analysis provide relatively moderate latency increase. On the opposite, the transmission speed decrease was more significant, especially for JonDo.This confirms the conclusions of previous studies resulting that no anonymization tool is suitable for daily web browsing. On the other hand, in the case when higher anonymity is required, their use can be reasonably comfortable from the point of view of latency increase. However, their usefulness for downloading larger files is always disputable.

References

BAGAI, R. and LU, H. 2016. Measuring Client-Server Anonymity. In: Gaj, P., Kwiecien, A., Stera, P. (eds.) Computer Networks: Proceedings of 23rd Int. Conf. CN 2016. Berlin Heidelberg: Springer Verlag: CCIS, Vol 608, 96-106.
CyberGhost (n.d.) CyberGhost VPN. [online] Available at: http://www.cyberghostvpn.com/en. [Accessed 2017, October 25].
DINGLEDINE R., MATHEWSON N. and SYVERSON P. (n.d.). Tor: The Second-Generation Onion Router. [online]. Available at: https://svn.torproject.org/svn/projects/design-paper/tor- design.pdf. [Accessed 2017, October 25].
FEIGENBAUM, J., JOHNSON, A. and SYVERSON, P. 2012. Probabilistic analysis of onion routing in a black-box model. ACM Transactions on Information and System Security (TISSEC). 15(3), 14.
GLENNY, M. 2012. DarkMarket: How Hackers Became the New Ma a, London: Vintage Books.
I2P (n.d.) The Invisible Internet Project [online]. Available at: https://geti2p.net/en/, [Accessed 2017, October 25].
JAP (n.d.). Anonymity & privacy. Project AN.ON Anonymity Online. [online]. Available at: http://anon.inf.tu-dresden.de. [Accessed 2017, October 25].
KAPUSTA L. 2016. Tools and Techniques for Anonymous Www Communication. (Nastroje a techniky anonymni www komunikace, in Czech). University of Ostrava. Bc. thesis.
LISKA T., SOCHOR T., and SOCHOROVA H. 2010: Comparison between normal and TOR-anonymized web client tra c. Procedia – Social and Behavioral Sciences. Vol. 9, 542–546
SOCHOR T. 2012. Anonymization of web client tra c e ciency study. In: Gaj, P., Kwiecien, A., Stera, P. (eds.) Computer Networks: Proceedings of 19th Int. Conf. CN 2012. Berlin Heidelberg: Springer Verlag: CCIS, Vol. 291, 237–246
SOCHOR T. 2013. Automatic Control of Con guration of Web Anonymization. Int. Jour. of New Computer Architectures and Their Applications (IJNCAA). Vol. 3(2), 1–10
STATISTA.COM (n.d.) The Statistics Portal. [online]. Available at: https://www.statista.com/. [Accessed 2017, November 1].
ZUZCAK, M., SOCHOR, T. 2017. Behavioral analysis of bot activity in infected systems using honeypots. In: Gaj, P., Kwiecien, A., Sawicki, M. (eds.) Computer Networks: Pro- ceedings of 24th Int. Conf. CN 2017. Berlin Heidelberg: Springer Verlag: CCIS, Vol. 718, 118–133
Published
2017-12-31
Section
Articles