|
. | . |
|
by Staff Writers College Park MD (SPX) Aug 20, 2015
Censorship is one of the greatest threats to open communication on the Internet. Information may be censored by a user's country of residence or the information's desired destination. But recent studies show that censorship by countries through which the data travels along its route is also a danger. Now, computer scientists at the University of Maryland have developed a method for providing concrete proof to Internet users that their information did not cross through certain geographic areas. The new system offers advantages over existing systems: it is immediately deployable and does not require knowledge of--or modifications to--the Internet's routing hardware or policies. "With recent events, such as censorship of Internet traffic, suspicious 'boomerang routing' where data leaves a region only to come back again, and monitoring of users' data, we became increasingly interested in this notion of empowering users to have more control over what happens with their data," says project lead Dave Levin, an assistant research scientist in the University of Maryland Institute for Advanced Computer Studies (UMIACS). This new system, called Alibi Routing, will be presented on August 20, 2015, at the Association for Computing Machinery Special Interest Group on Data Communication (ACM SIGCOMM) conference in London. Levin teamed with associate professor Neil Spring and professor Bobby Bhattacharjee, who have appointments in UMD's Department of Computer Science and UMIACS, on the paper. Information transmitted over the Internet, such as website requests or email content, is broken into packets and sent through a series of routers on the way to its destination. However, users have very little control over what parts of the world these packets traverse. Some parts of the world have been known to modify data returned to users, thus censoring content. In 2012, researchers demonstrated that Domain Name System (DNS) queries that merely pass through China's borders are subject to the same risk as if the requests came from one of the country's own residents. To evaluate their Alibi Routing method, the researchers simulated a network with 20,000 participants and selected forbidden regions from the 2012 "Enemies of the Internet" report published by Reporters Without Borders--China, Syria, North Korea and Saudi Arabia--as well as the three other countries with the highest number of Internet users at the time of the study--the United States, China and Japan. Alibi Routing works by searching a peer-to-peer network to locate "peers"--other users running the alibi routing software--that can relay a user's packets to its ultimate destination while avoiding specified forbidden regions. The peer is called an "alibi." The alibi provides proof--calculations that exploit the fact that information cannot travel faster than the speed of light--that at a particular time, a packet was at a specific geographic location sufficiently far enough away from the forbidden areas that the data could not have entered them. If successful, users receive proof that their information reached its desired destination and that it did not traverse the forbidden regions. Alternatively, the response could indicate that the packets may have traversed forbidden areas. Levin says the success rate for Alibi Routing depends on a few things, including how close the source and destination are to the forbidden region and how central the forbidden region is to Internet routing. "There's also a safety parameter that we use. Basically, it's a way for users to select a desired level of confidence that the packet absolutely does not traverse the forbidden region," Levin says. "The larger the safety parameter, the harder it is to find an alibi. The smaller the safety parameter, the easier it is to find an alibi." Based on simulated deployments, the system successfully found an alibi more than 85 percent of the time. With a small safety parameter, the success rate rose to 95 percent. The results suggest that users can typically avoid the part of the world they wish to route around, according to Levin. Users do not always need an alibi, though. If two users are in the same room in Maryland and they want their information to avoid China, they don't need an alibi to help them; they can just send the data directly to one another and measure the time it takes to do so. "For some of the countries we tested, we only needed an alibi about one-third of the time" says Levin. The team plans to release a version of Alibi Routing--likely as an Internet browser plug-in--for users to test by the end of 2015. "The more participants this type of peer-to-peer system has in different geographical locations, the more useful it will be," says Levin. The conference paper, "Alibi Routing," Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee, was presented August 20, 2015 at ACM SIGCOMM in London
Related Links University of Maryland Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service. |