Dissertation/Thesis Abstract

The Onion Name System: Tor-powered distributed DNS for tor hidden services
by Victors, Jesse, M.C.S., Utah State University, 2015, 72; 1598486
Abstract (Summary)

Tor hidden services are anonymous servers of unknown location and ownership who can be accessed through any Tor-enabled web browser. They have gained popularity over the years, but still suffer from major usability challenges due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced distributed DNS that allows users to reference a hidden service by a meaningful globally-unique verifiable domain name chosen by the hidden service operator. We introduce a new distributed self-healing public ledger and construct OnioNS as an optional backwards-compatible plugin for Tor on top of existing hidden service infrastructure. We simplify our design and threat model by embedding OnioNS within the Tor network and provide mechanisms for authenticated denial-of-existence with minimal networking costs. Our reference implementation demonstrates that OnioNS successfully addresses the major usability issue that has been with Tor hidden services since their introduction in 2002.

Supplemental Files

Some files may require a special program or browser plug-in. More Information

Indexing (document details)
Advisor: Li, Ming
Commitee: Flann, Nicholas, Watson, Dan
School: Utah State University
Department: Computer Science
School Location: United States -- Utah
Source: MAI 55/01M(E), Masters Abstracts International
Subjects: Computer science
Keywords: Anonymous, Communications, Networking, Private, Security
Publication Number: 1598486
ISBN: 978-1-339-03347-1
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy