European Journal of Business Science and Technology 2017, 3(2):96-105 | DOI: 10.11118/ejobsat.v3i2.101

Overview of Web Anonymization

Tomáš Sochor1, Cyril Klimeš1
1 Mendel University in Brno, Czech Republic

Web anonymization tools have been used for a long time, primarily by the users afraid of possible undesirable consequences of their on-line activity on the web. The paper analyzes both historically proven anonymization tools like TOR and newer tools, namely JAP/JonDo and CyberGhost VPN that are based on slightly modified technological principles. The primary focus is given to the measurement and evaluation of the latency increase and the transmission speed decrease in comparison to normal (non-anonymized) web browser operation. Results show that all anonymization tools being subject of the analysis provide relatively moderate latency increase. On the opposite, the transmission speed decrease was more significant, especially for JonDo. This confirms the conclusions of previous studies resulting that no anonymization tool is suitable for daily web browsing. On the other hand, in the case when higher anonymity is required, their use can be reasonably comfortable from the point of view of latency increase. However, their usefulness for downloading larger files is always disputable.

Keywords: world wide web, anonymization in communication, onion routing, cascade mix, TOR, JAP, JonDo, I2P, CyberGhost VPN, latency, transmission speed
JEL classification: A10, L86

Published: December 31, 2017  Show citation

ACS AIP APA ASA Harvard Chicago IEEE ISO690 MLA NLM Turabian Vancouver
Sochor, T., & Klimeš, C. (2017). Overview of Web Anonymization. European Journal of Business Science and Technology3(2), 96-105. doi: 10.11118/ejobsat.v3i2.101
Download citation

References

  1. Bagai, R. and Lu, H. 2016. Measuring Client-Server Anonymity. In: Gaj, P., Kwiecień, A. and Stera, P. (eds.). Computer Networks: Proceedings of 23rd Int. Conf., CN 2016, pp. 96-106. Go to original source...
  2. CyberGhost. 2017. CyberGhost VPN. [online]. Available at: http://www.cyberghostvpn.com/en. [Accessed 2017, October 25].
  3. Dingledine, R., Mathewson, N. and Syverson, P. 2017. Tor: The Second-Generation Onion Router. [online]. Available at: https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf. [Accessed 2017, October 25].
  4. Feigenbaum, J., Johnson, A. and Syverson, P. 2012. Probabilistic Analysis of Onion Routing in a Black-box Model. ACM Transactions on Information and System Security, 15 (3). Go to original source...
  5. Glenny, M. 2012. DarkMarket: How Hackers Became the New Mafia. London: Vintage Books.
  6. I2P. 2017. The Invisible Internet Project. [online]. Available at: https://geti2p.net/en/. [Accessed 2017, October 25].
  7. JAP. 2017. Anonymity & privacy. Project AN.ON Anonymity Online. [online]. Available at: http://anon.inf.tu-dresden.de. [Accessed 2017, October 25].
  8. Kapusta, L. 2016. Nástroje a techniky anonymní www komunikace. Bachelor thesis.
  9. Liška, T., Sochor, T. and Sochorová, H. 2010. Comparison Between Normal and TORanonymized Web Client Traffic. Procedia - Social and Behavioral Sciences, 9, 542-546. Go to original source...
  10. Sochor, T. 2012. Anonymization of Web Client Traffic Efficiency Study. In: Gaj, P., Kwiecień, A. and Stera, P. (eds.). Computer Networks: Proceedings of 19th Int. Conf., CN 2012, pp. 237-246. Go to original source...
  11. Sochor, T. 2013. Automatic Control of Configuration of Web Anonymization. International Journal of New Computer Architectures and Their Applications (IJNCAA), 3 (2), 1-10.
  12. Statista.com. 2017. The Statistics Portal. [online]. Available at: https://www.statista.com/. [Accessed 2017, November 1].
  13. Zuzčák, M. and Sochor, T. 2017. Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots. In: Gaj, P., Kwiecień, A. and Sawicki, M. (eds.). Computer Networks: Proceedings of 24th Int. Conf., CN 2017, pp. 118-133. Go to original source...

This is an open access article distributed under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.