
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | August 8, 2016 |
Latest Amendment Date: | December 22, 2016 |
Award Number: | 1618955 |
Award Instrument: | Standard Grant |
Program Manager: |
Phillip Regalia
pregalia@nsf.gov (703)292-2981 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | September 1, 2016 |
End Date: | August 31, 2020 (Estimated) |
Total Intended Award Amount: | $499,795.00 |
Total Awarded Amount to Date: | $507,795.00 |
Funds Obligated to Date: |
FY 2017 = $8,000.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
360 HUNTINGTON AVE BOSTON MA US 02115-5005 (617)373-5600 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
360 Huntington Ave Boston MA US 02115-5001 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): |
Special Projects - CNS, Secure &Trustworthy Cyberspace |
Primary Program Source: |
01001718DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Internet users concerned about their privacy, including whistleblowers and dissident citizens of totalitarian states, depend on reliable means to access Internet services anonymously. However, recent events publicized in popular press demonstrate that these services offer little privacy and anonymity in practice. For example, recent subpoena requiring Twitter to provide connection details of suspected Wikileaks supporters showed that governments can readily discover the network identities of Web users. To restore and promote free speech on the Internet, there is a need for systems of communication that protect users from identification through their Internet activity---even from powerful adversaries such as state actors. The proposed research will enable this through design, implementation, and deployment of anonymous communication networks that prevent eavesdroppers from identifying the source, recipient, or content of Internet communication.
Network anonymization services like Tor provide a higher degree of protection than direct communication with Web sites like Twitter, but are not designed to withstand traffic analysis (a technique that the British intelligence agency GCHQ is actively pursuing to deanonymize Tor users). While several researchers proposed designs for low-latency, traffic-analysis resistant anonymity networks, the performance of these systems was discouraging. This project will investigate anonymity network designs that are resilient to traffic analysis and that exhibit an acceptable benefit-cost ratio under some set of realistic assumptions. The project will leverage three key ideas: (i) combine trusted infrastructure (for mixing traffic) with untrusted P2P nodes (for scalability); (ii) incorporate the notion of zones to give users the ability to select the jurisdiction in which they trust their proxies to run; (iii) leverage empirically observed properties of communication workloads to develop optimized designs that provide acceptable performance/cost trade-offs. The goal is to produce networks that provide anonymity guarantees under a strong adversarial model for file sharing, Web traffic and real-time communication (VoIP), and that work for both fixed-line and mobile environments.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.