Seminar Topics

www.seminarsonly.com

IEEE Seminar Topics

PPT : Anonymous Communication Seminar with Free Download


Published on Apr 02, 2024

Abstract

Slide 1 :

WELCOME TO THE SEMINAR

ON

Anonymous Communication

Slide 2 :

Introduction

==> Anonymous communication is a necessary measure to protect the privacy of users, and protect computer systems against traffic analysis.

==> Anonymity systems seeks to build an infrastructure running on top of the existing Internet protocols that allows people to communicate with each other without necessarily revealing their personal network identifiers.

==> The basic idea behind any anonymous system is to provide unlinkability between communicating parties by relaying traffic through a number of intermediate nodes

==> All the anonymous systems are used by diverse group of users to protect their identities on the Internet

Slide 3 :

What Is Anonymous Communication

==> Figure

Slide 4 :

CHAUM'S MIX

==> It is a concept introduced by David Chaum which is based on public key cryptography that allows an electronic mail system to hide whom a participant communicates with as well as the content of the communication .

==> The basic building block of such a high latency anonymous communication systems is a mix.

==> The principal idea is that messages to be anonymized are relayed through a mix.

==> The mix has a well-known RSA public key, and messages are divided into blocks and encrypted using this key.

Slide 5 :

CHAUM'S MIX Figure

==> Figure

Slide 6 :

Mix Networks

==> More level of anonymity can be achieved by using a series of mixes instead of a single mix.

==> In mix networks senders can choose an ordered sequence of mixes through which to send their messages.

==> In a mix cascade topology, there are one or more predefined routes through which all client traffic is relayed.

==> If Alice wants to anonymously send a message M to Bob via a path P = {x, y, z} , she would iteratively create a layer of encryption, in the same manner as above, for each mix starting with the last mix in the path and working back toward the first.

Slide 7 :

Onion Routing

==> The objective of the onion routing is to protect the unlinkability between the communicating parties for real time applications that can tolerate only low latency.

==> The system consist of a set of servers called onion routers that relay traffic for clients.

==> Here anonymity is achieved by passing messages through a sequence of randomly selected onion routers to destination.

Slide 8 :

Establishing Circuit

==> Figure

Slide 9 :

TOR

==> The Onion Router Tor is the most recent evolution of onion routing and represents the current state-of-the-art in low-latency anonymity systems.

==> The Tor design makes several modifications and improvements over the original onion routing design in terms of security, efficiency, and deployability.

==> Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency.

==> The Tor network is currently the largest deployed anonymity network ever, consisting of over 1000 servers and more than an estimated 250,000 users as of December 2007

Slide 10 :

Conclusion

==> Researches in the last 30 years have made significant progress towards enabling private and anonymous communication on the Internet.

==> With an increasing level of public awareness about threats to personal privacy, such as identity theft or online advertisers tracking user behavior, academic and public interest in anonymous communication systems is likely to continue to increase in the near future.

==> As a result public and academic interest in improving existing systems for anonymity is also increasing.

Slide 11 :

References

==> www.seminarsonly.com

==> mail : contactv2@gmail.com












Are you interested in this topic.Then mail to us immediately to get the full report.

email :- contactv2@gmail.com

Related Seminar Topics