Limits of Anonymity in Open Environments

  • Authors:
  • Dogan Kedogan;Dakshi Agrawal;Stefan Penz

  • Affiliations:
  • -;-;-

  • Venue:
  • IH '02 Revised Papers from the 5th International Workshop on Information Hiding
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity providing technique is to establish an anonymity set. In open environments, such as the Internet, the established anonymity sets in the whole are observable and change with every anonymous communication. We use this fact of changing anonymity sets and present a model where we can determine the protection limit of an anonymity technique, i.e. the number of observations required for an attacker to "break" uniquely a given anonymity technique. In this paper, we use the popular MIX method to demonstrate our attack. The MIX method forms the basis of most of the today's deployments of anonymity services (e.g. Freedom, Onion Routing, Webmix). We note that our approach is general and can be applied equally well to other anonymity providing techiques.