Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2023

12-07-2023

B-Tor: Anonymous communication system based on consortium blockchain

Authors: Dawei Xu, Jiaqi Gao, Liehuang Zhu, Feng Gao, Yang Han, Jian Zhao

Published in: Peer-to-Peer Networking and Applications | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The rapid development of the Internet has led to the increasingly prominent feature of openness and transparency of user information. Tor, which is used to protect personal privacy, is one of the most widely used anonymous communication systems with the largest number of users. However, there are many problems with Tor, such as: illegal transactions in the dark network disturbing social security, high communication delays, and security problems such as vulnerability to DOS attacks, man-in-the-middle attacks, and censorship attacks. In this paper, we design and implement a new anonymous communication system B-Tor based on the original Tor architecture model combined with the mainstream consortium blockchain architecture Fabric, which can trace illegal transactions by using the traceability feature of blockchain and group signature algorithm. The consensus algorithm mechanism in blockchain is utilized to improve the communication efficiency and increase the throughput of the system. The system utilizes the decentralized feature of blockchain to solve the security problem of Tor mentioned above. The system performance evaluation and security evaluation are given in this paper. The experiments show that the communication delay of B-Tor anonymous communication system is low, and in the 600s user loop test, the system successfully receives the consensus file 790629 times with 98% success rate, the highest throughput is 1352.8 TPS, and the average delay is 0.1s. It is verified through the experiments that the system can be affected less during DOS attacks and can recover the state quickly.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Spadaccino P, Garlisi D, Cuomo F, Pillon G, Pisani P. Discovery privacy threats via device de-anonymization in LoRaWAN 189:1–10. Publisher: Elsevier Spadaccino P, Garlisi D, Cuomo F, Pillon G, Pisani P. Discovery privacy threats via device de-anonymization in LoRaWAN 189:1–10. Publisher: Elsevier
4.
go back to reference Xueshuo X, Jiming W, Junyi Y, Yaozheng F, Ye L, Tao L, Guiling W. AWAP: Adaptive weighted attribute propagation enhanced community detection model for bitcoin de-anonymization 109:107507. Publisher: Elsevier Xueshuo X, Jiming W, Junyi Y, Yaozheng F, Ye L, Tao L, Guiling W. AWAP: Adaptive weighted attribute propagation enhanced community detection model for bitcoin de-anonymization 109:107507. Publisher: Elsevier
5.
go back to reference Ma Y, Wu Y, Ge J (2020) Accountability and Privacy in Network Security. SpringerCrossRef Ma Y, Wu Y, Ge J (2020) Accountability and Privacy in Network Security. SpringerCrossRef
6.
go back to reference Dingledine R, Mathewson N, Syverson P. Tor: The Second-generation Onion Router Dingledine R, Mathewson N, Syverson P. Tor: The Second-generation Onion Router
7.
go back to reference Hoang NP, Doreen S, Polychronakis M. Measuring ${$i2p$}$ censorship at a global scale. In: 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19) Hoang NP, Doreen S, Polychronakis M. Measuring ${$i2p$}$ censorship at a global scale. In: 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19)
8.
go back to reference Mislove A, Oberoi G, Post A, Reis C, Druschel P, Wallach DS. AP3: Cooperative, decentralized anonymous communication. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, p 30 Mislove A, Oberoi G, Post A, Reis C, Druschel P, Wallach DS. AP3: Cooperative, decentralized anonymous communication. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, p 30
9.
go back to reference Clarke I, Sandberg O, Wiley B, Hong TW. Freenet: A distributed anonymous information storage and retrieval system. In: Designing Privacy Enhancing Technologies, p 46–66. Springer Clarke I, Sandberg O, Wiley B, Hong TW. Freenet: A distributed anonymous information storage and retrieval system. In: Designing Privacy Enhancing Technologies, p 46–66. Springer
10.
go back to reference Piotrowska AM, Hayes J, Elahi T, Meiser S, Danezis G. The loopix anonymity system. In: 26th USENIX Security Symposium (USENIX Security 17), p 1199–1216 Piotrowska AM, Hayes J, Elahi T, Meiser S, Danezis G. The loopix anonymity system. In: 26th USENIX Security Symposium (USENIX Security 17), p 1199–1216
13.
go back to reference Meland PH, Bayoumy YFF, Sindre G. The ransomware-as-a-service economy within the darknet 92:101762. Publisher: Elsevier Meland PH, Bayoumy YFF, Sindre G. The ransomware-as-a-service economy within the darknet 92:101762. Publisher: Elsevier
14.
go back to reference Abu Al-Haija Q, Krichen M, Abu Elhaija W. Machine-learning-based darknet traffic detection system for IoT applications 11(4):556. Publisher: MDPI Abu Al-Haija Q, Krichen M, Abu Elhaija W. Machine-learning-based darknet traffic detection system for IoT applications 11(4):556. Publisher: MDPI
15.
go back to reference Sarwar MB, Hanif MK, Talib R, Younas M, Sarwar MU. DarkDetect: darknet traffic detection and categorization using modified convolution-long short-term memory 9:113705–113713. Publisher: IEEE Sarwar MB, Hanif MK, Talib R, Younas M, Sarwar MU. DarkDetect: darknet traffic detection and categorization using modified convolution-long short-term memory 9:113705–113713. Publisher: IEEE
16.
go back to reference Lan J, Liu X, Li B, Li Y, Geng T. DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification 116:102663. Publisher: Elsevier Lan J, Liu X, Li B, Li Y, Geng T. DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification 116:102663. Publisher: Elsevier
17.
go back to reference Nazah S, Huda S, Abawajy J, Hassan MM. Evolution of dark web threat analysis and detection: A systematic approach 8:171796–171819. Publisher: IEEE Nazah S, Huda S, Abawajy J, Hassan MM. Evolution of dark web threat analysis and detection: A systematic approach 8:171796–171819. Publisher: IEEE
18.
go back to reference van der Bruggen M, Blokland A (2022) Profiling darkweb child sexual exploitation material forum members using longitudinal posting history data. Soc Sci Comput Rev 40(4):865–891CrossRef van der Bruggen M, Blokland A (2022) Profiling darkweb child sexual exploitation material forum members using longitudinal posting history data. Soc Sci Comput Rev 40(4):865–891CrossRef
22.
go back to reference Traudt M, Jansen R, Johnson A. Flashflow: A secure speed test for tor. In: 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), p 381–391. IEEE Traudt M, Jansen R, Johnson A. Flashflow: A secure speed test for tor. In: 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), p 381–391. IEEE
23.
go back to reference Mellette WM, Das R, Guo Y, McGuinness R, Snoeren AC, Porter G. Expanding across time to deliver bandwidth efficiency and low latency. In: 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), p 1–18 Mellette WM, Das R, Guo Y, McGuinness R, Snoeren AC, Porter G. Expanding across time to deliver bandwidth efficiency and low latency. In: 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), p 1–18
24.
go back to reference Jansen R, Johnson A. On the accuracy of tor bandwidth estimation. In: International Conference on Passive and Active Network Measurement, p 481–498. Springer Jansen R, Johnson A. On the accuracy of tor bandwidth estimation. In: International Conference on Passive and Active Network Measurement, p 481–498. Springer
25.
go back to reference Winter P, Edmundson A, Roberts LM, Dutkowska-Zuk A, Chetty M, Feamster N. How do tor users interact with onion services? In: 27th USENIX Security Symposium (USENIX Security 18), p 411–428 Winter P, Edmundson A, Roberts LM, Dutkowska-Zuk A, Chetty M, Feamster N. How do tor users interact with onion services? In: 27th USENIX Security Symposium (USENIX Security 18), p 411–428
26.
go back to reference Sanatinia A, Noubir G. Off-path man-in-the-middle attack on tor hidden services Sanatinia A, Noubir G. Off-path man-in-the-middle attack on tor hidden services
27.
go back to reference Pries R, Yu W, Fu X, Zhao W. A new replay attack against anonymous communication networks. In: 2008 IEEE International Conference on Communications, p 1578–1582. IEEE Pries R, Yu W, Fu X, Zhao W. A new replay attack against anonymous communication networks. In: 2008 IEEE International Conference on Communications, p 1578–1582. IEEE
28.
go back to reference Zhang Y (2009) Effective attacks in the tor authentication protocol. In: 2009 Third International Conference on Network and System Security, p 81–86. IEEE Zhang Y (2009) Effective attacks in the tor authentication protocol. In: 2009 Third International Conference on Network and System Security, p 81–86. IEEE
29.
go back to reference Alhijawi B, Almajali S, Elgala H, Salameh HB, Ayyash M. A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets 99:107706. Publisher: Elsevier Alhijawi B, Almajali S, Elgala H, Salameh HB, Ayyash M. A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets 99:107706. Publisher: Elsevier
30.
go back to reference Jansen R, Tschorsch F, Johnson A, Scheuermann B. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Jansen R, Tschorsch F, Johnson A, Scheuermann B. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
31.
go back to reference Bocovich C, Dingledine R, Hanna K, Winter P, Yu T. Addressing denial of service attacks on free and open communication on the internet Bocovich C, Dingledine R, Hanna K, Winter P, Yu T. Addressing denial of service attacks on free and open communication on the internet
32.
go back to reference Debiasi A, Dingledine R, Edelstein A. Addressing denial of service attacks on free and open communication on the internet Debiasi A, Dingledine R, Edelstein A. Addressing denial of service attacks on free and open communication on the internet
33.
go back to reference Mathewson N. Denial-of-service attacks in tor: Taxonomy and defenses Mathewson N. Denial-of-service attacks in tor: Taxonomy and defenses
34.
go back to reference Jansen R, Vaidya T, Sherr M. Point break: A study of bandwidth ${$denial-of-service$}$ attacks against tor. In: 28th USENIX Security Symposium (USENIX Security 19), p 1823–1840 Jansen R, Vaidya T, Sherr M. Point break: A study of bandwidth ${$denial-of-service$}$ attacks against tor. In: 28th USENIX Security Symposium (USENIX Security 19), p 1823–1840
35.
go back to reference Wang R, Yang Z, Li K, Chen C, Chen Y. Research on tor-based anonymous DDoS attack. In: MATEC Web of Conferences, vol. 336. EDP Sciences Wang R, Yang Z, Li K, Chen C, Chen Y. Research on tor-based anonymous DDoS attack. In: MATEC Web of Conferences, vol. 336. EDP Sciences
38.
go back to reference Abe K, Goto S. Fingerprinting attack on tor anonymity using deep learning 42:15–20 Abe K, Goto S. Fingerprinting attack on tor anonymity using deep learning 42:15–20
39.
go back to reference Jahani H, Jalili S. Online tor privacy breach through website fingerprinting attack 27(2):289–326. Publisher: Springer Jahani H, Jalili S. Online tor privacy breach through website fingerprinting attack 27(2):289–326. Publisher: Springer
42.
go back to reference Fifield D, Lan C, Hynes R, Wegmann P, Paxson V. Blocking-resistant communication through domain fronting 2015(2):46–64 Fifield D, Lan C, Hynes R, Wegmann P, Paxson V. Blocking-resistant communication through domain fronting 2015(2):46–64
44.
go back to reference Saleem J, Islam R, Kabir MA. The anonymity of the dark web: A survey 10:33628–33660. Publisher: IEEE Saleem J, Islam R, Kabir MA. The anonymity of the dark web: A survey 10:33628–33660. Publisher: IEEE
45.
go back to reference Nakamoto S. Bitcoin: A peer-to-peer electronic cash system, 21260 Nakamoto S. Bitcoin: A peer-to-peer electronic cash system, 21260
46.
go back to reference Monrat AA, Schelén O, Andersson K. A survey of blockchain from the perspectives of applications, challenges, and opportunities 7:117134–117151. Publisher: IEEE Monrat AA, Schelén O, Andersson K. A survey of blockchain from the perspectives of applications, challenges, and opportunities 7:117134–117151. Publisher: IEEE
47.
go back to reference Rajasekaran AS, Azees M, Al-Turjman F. A comprehensive survey on blockchain technology 52, 102039. Publisher: Elsevier Rajasekaran AS, Azees M, Al-Turjman F. A comprehensive survey on blockchain technology 52, 102039. Publisher: Elsevier
48.
go back to reference Merlo V, Pio G, Giusto F, Bilancia M. On the exploitation of the blockchain technology in the healthcare sector: A systematic review, 118897. Publisher: Elsevier Merlo V, Pio G, Giusto F, Bilancia M. On the exploitation of the blockchain technology in the healthcare sector: A systematic review, 118897. Publisher: Elsevier
50.
go back to reference AlSabah M, Goldberg I. Performance and security improvements for tor: A survey 49(2):1–36. Publisher: ACM New York, NY, USA AlSabah M, Goldberg I. Performance and security improvements for tor: A survey 49(2):1–36. Publisher: ACM New York, NY, USA
51.
go back to reference Grif?th V. Tor growth rates and improving torperf throughput Grif?th V. Tor growth rates and improving torperf throughput
52.
go back to reference Loesing K, Gunasekaran S, Butler K. Requirements and software design for a better tor performance measurement tool Loesing K, Gunasekaran S, Butler K. Requirements and software design for a better tor performance measurement tool
53.
go back to reference Geddes J, Jansen R, Hopper N. IMUX: Managing tor connections from two to infinity, and beyond. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, p 181–190 Geddes J, Jansen R, Hopper N. IMUX: Managing tor connections from two to infinity, and beyond. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, p 181–190
54.
go back to reference AlSabah M, Bauer K, Elahi T, Goldberg I. The path less travelled: Overcoming tor’s bottlenecks with traffic splitting. In: International Symposium on Privacy Enhancing Technologies Symposium, p 143–163. Springer AlSabah M, Bauer K, Elahi T, Goldberg I. The path less travelled: Overcoming tor’s bottlenecks with traffic splitting. In: International Symposium on Privacy Enhancing Technologies Symposium, p 143–163. Springer
55.
go back to reference Gopal D, Heninger N. Torchestra: Reducing interactive traffic delays over tor. In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, p 31–42 Gopal D, Heninger N. Torchestra: Reducing interactive traffic delays over tor. In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, p 31–42
56.
go back to reference AlSabah M, Goldberg I. PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, p 349–360 AlSabah M, Goldberg I. PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, p 349–360
57.
go back to reference Tang C, Goldberg I. An improved algorithm for tor circuit scheduling. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, p 329–339 Tang C, Goldberg I. An improved algorithm for tor circuit scheduling. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, p 329–339
58.
go back to reference AlSabah M, Bauer K, Goldberg I. Enhancing tor’s performance using real-time traffic classification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, p 73–84 AlSabah M, Bauer K, Goldberg I. Enhancing tor’s performance using real-time traffic classification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, p 73–84
59.
go back to reference Panchenko A, Lanze F, Engel T. Improving performance and anonymity in the tor network. In: 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC), p 1–10. IEEE Panchenko A, Lanze F, Engel T. Improving performance and anonymity in the tor network. In: 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC), p 1–10. IEEE
60.
go back to reference Wang T, Bauer K, Forero C, Goldberg I. Congestion-aware path selection for tor. In: International Conference on Financial Cryptography and Data Security, p 98–113. Springer Wang T, Bauer K, Forero C, Goldberg I. Congestion-aware path selection for tor. In: International Conference on Financial Cryptography and Data Security, p 98–113. Springer
61.
go back to reference Akhoondi M, Yu C, Madhyastha HV. LASTor: A low-latency AS-aware tor client. In: 2012 IEEE Symposium on Security and Privacy, p 476–490. IEEE Akhoondi M, Yu C, Madhyastha HV. LASTor: A low-latency AS-aware tor client. In: 2012 IEEE Symposium on Security and Privacy, p 476–490. IEEE
62.
go back to reference Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing. In: International Symposium on Privacy Enhancing Technologies Symposium, p 73–93. Springer Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing. In: International Symposium on Privacy Enhancing Technologies Symposium, p 73–93. Springer
63.
go back to reference Basyoni L, Erbad A, Alsabah M, Fetais N, Mohamed A, Guizani M. QuicTor: Enhancing tor for real-time communication using QUIC transport protocol 9:28769–28784. Publisher: IEEE Basyoni L, Erbad A, Alsabah M, Fetais N, Mohamed A, Guizani M. QuicTor: Enhancing tor for real-time communication using QUIC transport protocol 9:28769–28784. Publisher: IEEE
64.
go back to reference Mittal P, Olumofin F, Troncoso C, Borisov N, Goldberg I (2011) \(\{\)PIR-Tor\(\}\): Scalable anonymous communication using private information retrieval. In: 20th USENIX Security Symposium (USENIX Security 11) Mittal P, Olumofin F, Troncoso C, Borisov N, Goldberg I (2011) \(\{\)PIR-Tor\(\}\): Scalable anonymous communication using private information retrieval. In: 20th USENIX Security Symposium (USENIX Security 11)
65.
go back to reference Han Y, Xu D, Gao J, Zhu L. Using blockchains for censorship-resistant bootstrapping in anonymity networks. In: International Conference on Information and Communications Security, p 240–260. Springer Han Y, Xu D, Gao J, Zhu L. Using blockchains for censorship-resistant bootstrapping in anonymity networks. In: International Conference on Information and Communications Security, p 240–260. Springer
66.
go back to reference Johnson A, Wacek C, Jansen R, Sherr M, Syverson P. Users get routed: Traffic correlation on tor by realistic adversaries. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, p 337–348 Johnson A, Wacek C, Jansen R, Sherr M, Syverson P. Users get routed: Traffic correlation on tor by realistic adversaries. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, p 337–348
Metadata
Title
B-Tor: Anonymous communication system based on consortium blockchain
Authors
Dawei Xu
Jiaqi Gao
Liehuang Zhu
Feng Gao
Yang Han
Jian Zhao
Publication date
12-07-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01514-9

Other articles of this Issue 5/2023

Peer-to-Peer Networking and Applications 5/2023 Go to the issue

Premium Partner