Abstract
In an untrusted Internet environment, there is a large amount of user privacy information being vulnerable to various attacks, and it is an important security concern for users on how to protect their privacy, and to further provide the anonymity guarantee. Recently, most privacy-sensitive users prefer anonymous communication to protect their private information from eavesdropping by attackers. Each user has different privacy protection demands for anonymous communication. However, anonymous communication methods cannot meet the various anonymity needs of users. Hence, the user on-demand anonymous communication is proposed, which can dynamically adjust the anonymity level according to a user’s anonymity needs. However, the defense capabilities against attacks are insufficient in the existing user on-demand anonymous communication. Some malicious users in the network employ anonymous communication to hide their identities and attack the Internet. Moreover, the existing user on-demand anonymous communication is weak against traffic classification attacks based on machine learning. Therefore, this paper investigates its progresses and defects in privacy protection and network security. User on-demand anonymous communication is mainly composed of the user side and the transmission side. We separately investigate privacy protection and network security of user on-demand anonymous communication from the user side and the transmission side. By surveying various identity anonymity of users on the user side and the hierarchical anonymous transmission on the transmission side, we find two kinds of serious attacks in user on-demand anonymous communication, i.e., abuse of anonymous communication and traffic classification attacks based on machine learning. To solve the above security issues, we suggest the balancing mechanism of anonymous communication and behavior tracking which is used to prevent anonymous abuse, and the secure defense mechanism which is used to resist traffic classification attacks. To inspire follow-up research, we identify some open problems and emphasize future trends concerning user on-demand anonymous communication.
Highlights
With the rapid development of the Internet, it has been widely used in all aspects of our daily living
It is necessary to carry out a survey of privacy protection and network security in on-demand anonymous communication, which will provide a reference for future research for the user on-demand anonymous communication
We find a kind of serious attack on the transmission side, i.e., traffic classification attacks based on machine learning
Summary
With the rapid development of the Internet, it has been widely used in all aspects of our daily living. It is necessary to carry out a survey of privacy protection and network security in on-demand anonymous communication, which will provide a reference for future research for the user on-demand anonymous communication. As far as we know, there has been no survey on privacy protection and network security of user on-demand anonymous communication so far. We will give a detailed survey on the privacy protection and network security of user on-demand anonymous communication. We separately investigate privacy protection and network security of user on-demand anonymous communication from the user side and the transmission side. The challenges and future research trends of privacy protection and network security in user on-demand anonymous communication are discussed in detail. 3) We discuss open challenges in the research of privacy protection and network security in user on-demand anonymous communication and give future research suggestions.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.