16th International Conference on Advanced Communication Technology 2014
DOI: 10.1109/icact.2014.6778917
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous communication and its importance in social networking

Abstract: Abstract-Digital information has become a social infrastructure and with the expansion of the Internet, network infrastructure has become an indispensable part of social life and industrial activity for mankind. For various reasons, however, today's networks are vulnerable to numerous risks, such as information leakage, privacy infringement and data corruption. Through this research, the authors tried to establish an in-depth understanding of the importance of anonymous communication in social networking which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 27 publications
(22 citation statements)
references
References 2 publications
(2 reference statements)
0
21
0
1
Order By: Relevance
“…Note that our proposal does not aim to anonymize a given user's browsing activities by decoupling the link between users and their DNS queries, which is not the original purpose of DoH/DoT either. For anonymous DNS resolutions, users may use anonymous communication systems to route their DNS traffic [15]. For instance, DNS-over-HTTPSover-Tor is one of the more complicated methods to secure DNS traffic, which has been already implemented by Cloudflare [40].…”
Section: Threat Modelmentioning
confidence: 99%
“…Note that our proposal does not aim to anonymize a given user's browsing activities by decoupling the link between users and their DNS queries, which is not the original purpose of DoH/DoT either. For anonymous DNS resolutions, users may use anonymous communication systems to route their DNS traffic [15]. For instance, DNS-over-HTTPSover-Tor is one of the more complicated methods to secure DNS traffic, which has been already implemented by Cloudflare [40].…”
Section: Threat Modelmentioning
confidence: 99%
“…For this reason, anonymous communication has drawn attention from both researchers and Internet users [10,13,42,46,69,71,74]. As anonymous communication networks grow to support more users, more anonymity and censorship circumvention tools are becoming freely available [23]. Some of these tools include proxy servers, Virtual Private Network (VPN) services, the Onion Router (Tor) [10], and the Invisible Internet Project (I2P) [74].…”
Section: Introductionmentioning
confidence: 99%
“…This solution has multiple encryption layers and employs asymmetric cryptography. Later, professional attackers pointed out certain vulnerabilities of TOR at exit node; As a solution, TOR uses dynamic IP address to prevent continuous monitoring of exit node [1] Many works have employed trust in social networks to enhance system anonymity, one of the earlier approaches is [6], which uses personal digital certificates issued by a trusted certificate authority. Then, it applies certain technique such as idemix to make the certificates anonymous, un-linkable, and non-transferable.…”
Section: ) Identity In Social Networkmentioning
confidence: 99%