On preserving privacy in cloud computing using ToR

A. Carnielli, M. Aiash, M. Alazab

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

2 Citations (Scopus)

Abstract

The Internet allows for an efficient, inexpensive collection of information without surfers' consents. This includes surfers' preferences, interests or even credit card information. Furthermore, it is well known that some oppressive governments filter the information that can digitally reach their countries. Also, there are evidences that certain governments spy on citizens and organizations through intercepting phone calls, activities on social media and blogs. For Internet browsing, several methods of privacy-preserving and anonymizers have been developed. An example of such a technology is The Onion Router (ToR) network, which has been proven to guarantee users' anonymity and privacy while they are browsing the Internet. However, with the wide deployment of virtualization solutions and the tremendous migration to cloud-based services, many online services have moved onto the cloud. This situation complicates the issue of preserving a client's privacy and anonymity and raises a "question mark" as to the efficiency of current anonymizers in this new environment. To the best of our knowledge, few studies have been conducted to analyze the compatibility between the ToR network and this new emerging infrastructure. This paper presents a qualitative analysis of the feasibility and efficiency of the ToR in cloud infrastructure and the possibility of integrating these technologies.

Original languageEnglish
Title of host publicationPervasive computing
Subtitle of host publicationnext generation platforms for intelligent data collection
EditorsCiprian Dobre, Fatos Xhafa
Place of PublicationLondon ; San Diego ; Cambridge, USA
PublisherElsevier
Pages3-25
Number of pages23
ISBN (Electronic)9780128037027
ISBN (Print)9780128036631
DOIs
Publication statusPublished - 2016

Keywords

  • Anonymity
  • Cloud computing
  • Compatibility analysis
  • Privacy
  • ToR

Fingerprint

Dive into the research topics of 'On preserving privacy in cloud computing using ToR'. Together they form a unique fingerprint.

Cite this