I have a few questions

Q1: Regarding network bootstrap protocol: Consider the scenario where
a censor mines the boostrap node list and blocks these nodes. Do you
implement any mechanisms to prevent a censor from obtaining the entire
set of bootstrap nodes? Similarly, aren't public directory servers
also vulnerable to censorship?

Q2: Regarding token redemption: Does an ASP relay contact the ASP
token bank through COR? Could the token verification history be used
to reveal which paths were constructed?

--Aaron

On Wed, Jul 13, 2011 at 11:47 AM, Nick Jones <[email protected]> wrote:
> Hi All,
>
> I'm a graduate student at Princeton, and our research group has recently 
> submitted a paper proposing a design for cloud based onion routing. The goal 
> of our research is to securely perform onion routing on cloud based 
> infrastructure (like Amazon EC2 and Rackspace) while allowing users to retain 
> the same (or almost the same) privacy as when using Tor. We distribute trust 
> across multiple cloud providers, and use Chaum's e-cash for payment and 
> access control. Additionally, we hope that the elasticity of cloud 
> infrastructure will make cloud based OR more censorship resistant than 
> current systems.
>
> This project is still in a relatively early stage, and we would love to get 
> feedback from the Tor community. We would welcome any 
> comments/questions/criticisms.
>
>
>
> Our project's website is available at:
>
> http://sns.cs.princeton.edu/projects/cor/
>
>
> A direct link to our paper is here:
>
> http://www.cs.princeton.edu/~najones/publications/cor-foci11.pdf
>
>
> Our abstract:
>
> Internet censorship and surveillance have made anonymity tools increasingly 
> critical for free and open Internet access. Tor, and its associated ecosystem 
> of vol- unteer traffic relays, provides one of the most secure and 
> widely-available means for achieving Internet anonymity today. Unfortunately, 
> Tor has limitations, including poor performance, inadequate capacity, and a 
> susceptibility to wholesale blocking. Rather than utilizing a large number of 
> volunteers (as Tor does), we propose mov- ing onion-routing services to the 
> “cloud” to leverage the large capacities, robust connectivity, and economies 
> of scale inherent to commercial datacenters. This paper de- scribes 
> Cloud-based Onion Routing (COR), which builds onion-routed tunnels over 
> multiple anonymity service providers and through multiple cloud hosting 
> providers, dividing trust while forcing censors to incur large collat- eral 
> damage. We discuss the new security policies and mechanisms needed for such a 
> provider-based ecosys- tem, and present some preliminary benchmarks. At to- 
> day’s prices, a user could gain fast, anonymous network access through COR 
> for only pennies per day.
>
>
> Thanks!
>
> Nick Jones
> _______________________________________________
> tor-dev mailing list
> [email protected]
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
_______________________________________________
tor-dev mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to