2019
DOI: 10.2478/popets-2019-0050
|View full text |Cite
|
Sign up to set email alerts
|

ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments

Abstract: Anonymous communications networks enable individuals to maintain their privacy online. The most popular such network is Tor, with about two million daily users; however, Tor is reaching limits of its scalability. One of the main scalability bottlenecks of Tor and similar network designs originates from the requirement of distributing a global view of the servers in the network to all network clients. This requirement is in place to avoid epistemic attacks, in which adversaries who know which parts of the netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…While PIR-Tor considerably reduces the network load due to the decreased amount of node discovery data transmitted, it creates an additional computational overhead on the DAs and DCs caused by the operation mode of the applied PIR methods. Sasy and Goldberg [16] apply Oblivious RAMs with trusted execution environments to improve the scalability of Tor. Komlo et al [7] have recently proposed a set of protocols and algorithms that reduce the amount of node information Tor users should maintain for creating paths.…”
Section: Related Workmentioning
confidence: 99%
“…While PIR-Tor considerably reduces the network load due to the decreased amount of node discovery data transmitted, it creates an additional computational overhead on the DAs and DCs caused by the operation mode of the applied PIR methods. Sasy and Goldberg [16] apply Oblivious RAMs with trusted execution environments to improve the scalability of Tor. Komlo et al [7] have recently proposed a set of protocols and algorithms that reduce the amount of node information Tor users should maintain for creating paths.…”
Section: Related Workmentioning
confidence: 99%
“…Much like PIR-Tor, ConsenSGX [SG19] allows clients to request relay information from directory servers in a privacy-preserving manner. Rather than using PIR, ConsenSGX combines oblivious RAM (ORAM) [GO96] and trusted execution environments to provide more-efficient directory servers.…”
Section: Constant-sized and On-demand Directory Downloads For Clientsmentioning
confidence: 99%
“…Unprotected metadata will expose the end device's private information; e.g., a malicious adversary can launch a side-channel attack by observing how the gateway performs the resource allocation to obtain the user's privacy information [10]. Some research has shown that it is possible to get a detailed and private picture of a person's contacts and interests just by analyzing metadata, and it is technically much more accessible to search massive amounts of metadata than to listen in on millions of phone calls [11]. In recent years, some researchers have focused on the metadata privacy in secure messaging [12,13], however, in the area of edge computing, we still face the challenge of lower computation resources on the end devices and lower bandwidth requirements.…”
Section: Introductionmentioning
confidence: 99%