WIP
This commit is contained in:
parent
55054e27c3
commit
7fba134d50
5 changed files with 35 additions and 100 deletions
47
donar.tex
47
donar.tex
|
@ -1,5 +1,5 @@
|
|||
|
||||
\section{Tor performances \\ \& VoIP requirements}
|
||||
%\section{Tor performances \\ \& VoIP requirements}
|
||||
|
||||
\begin{frame}{What are voice calling requirements?}
|
||||
\tikzsetnextfilename{rtapp}
|
||||
|
@ -9,8 +9,11 @@
|
|||
\draw[->, solid, black,line width=1mm] (micro) edge node[sloped,anchor=north,text width=6.5cm]{
|
||||
\Large Call Requirements \\
|
||||
\normalsize
|
||||
\textbf{Delay:} $99^{th}$-perc delay $<$ 360 ms \\
|
||||
\textbf{Drop:} Dropped calls $<$ 2\% \\
|
||||
\underline{Single call}\\
|
||||
\textbf{Interactive:} $99^{th}$-perc delay $<$ 360 ms\\
|
||||
\underline{System}\\
|
||||
\textbf{Acceptable:} $>$ 80\% \\
|
||||
\textbf{Drop:} $<$ 2\% \\
|
||||
\textbf{Duration:} 5 min avg, up to 90 min \\
|
||||
\textbf{Anonymity:} 2-way anonymity\\
|
||||
\small Alice is anonymous to Bob,\\Bob is anonymous to Alice
|
||||
|
@ -19,7 +22,6 @@
|
|||
|
||||
|
||||
\begin{center}
|
||||
\Large \includegraphics[scale=0.6]{img/question.pdf} \color{blue} Which Tor configuration should we use? \\
|
||||
\Large \includegraphics[scale=0.6]{img/question.pdf} \color{blue} Can Tor satisfy these requirements?
|
||||
\end{center}
|
||||
\end{frame}
|
||||
|
@ -126,7 +128,6 @@ Each configuration is repeated 64 times\\
|
|||
\underline{Questions}\\
|
||||
Do Onion Service meet latency requirements?\\
|
||||
Do Onion Service are stable enough?\\
|
||||
Get insights on Onion Services' latency
|
||||
\end{frame}
|
||||
|
||||
|
||||
|
@ -156,12 +157,15 @@ Get insights on Onion Services' latency
|
|||
\includegraphics[width=0.8\textwidth]{img/x1.pdf}
|
||||
\end{column}
|
||||
\begin{column}{0.5\textwidth}
|
||||
\normalsize \underline{Acceptable 5-minute calls}\\
|
||||
|
||||
\vspace{0.5cm}
|
||||
|
||||
\normalsize \underline{5-minute calls $<$ 360ms}\\
|
||||
\Large \textcolor{red}{9\%}
|
||||
|
||||
\vspace{0.5cm}
|
||||
|
||||
\normalsize \underline{Acceptable 90-minute calls}\\
|
||||
\normalsize \underline{90-minute calls $<$ 360ms}\\
|
||||
\Large \textcolor{red}{3\%}
|
||||
|
||||
\end{column}
|
||||
|
@ -172,7 +176,7 @@ Get insights on Onion Services' latency
|
|||
\end{center}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Even with onion service using 2-hop circuits?}
|
||||
\begin{frame}{What is we use 2-hop circuits?}
|
||||
|
||||
\tikzsetnextfilename{petitschema2}
|
||||
\begin{tikzpicture}
|
||||
|
@ -197,12 +201,16 @@ Get insights on Onion Services' latency
|
|||
\includegraphics[width=0.8\textwidth]{img/x2.pdf}
|
||||
\end{column}
|
||||
\begin{column}{0.5\textwidth}
|
||||
\normalsize \underline{Acceptable 5-minute calls}\\
|
||||
|
||||
\vspace{0.5cm}
|
||||
|
||||
|
||||
\normalsize \underline{5-minute calls $<$ 360ms}\\
|
||||
\Large \textcolor{red}{44\%}
|
||||
|
||||
\vspace{0.5cm}
|
||||
|
||||
\normalsize \underline{Acceptable 90-minute calls}\\
|
||||
\normalsize \underline{90-minute calls $<$ 360ms}\\
|
||||
\Large \textcolor{red}{23\%}
|
||||
|
||||
\end{column}
|
||||
|
@ -254,11 +262,15 @@ Get insights on Onion Services' latency
|
|||
\includegraphics[width=0.8\textwidth]{img/x3.pdf}
|
||||
\end{column}
|
||||
\begin{column}{0.5\textwidth}
|
||||
|
||||
\vspace{0.3cm}
|
||||
|
||||
|
||||
\normalsize \underline{Dropped 5-minute calls}\\
|
||||
\Large \textcolor{red}{5\%} \normalsize for 2 hops \\
|
||||
\Large \textcolor{red}{10\%} \normalsize for 3 hops
|
||||
|
||||
\vspace{0.5cm}
|
||||
\vspace{0.3cm}
|
||||
|
||||
\normalsize \underline{Dropped 90-minute calls}\\
|
||||
\Large \textcolor{red}{10\%} \normalsize for 2 hops\\
|
||||
|
@ -268,7 +280,7 @@ Get insights on Onion Services' latency
|
|||
\end{columns}
|
||||
|
||||
\begin{center}
|
||||
\Large \includegraphics[scale=0.4]{img/stop.pdf} \color{red} Calls are dropped too often
|
||||
\Large \includegraphics[scale=0.4]{img/stop.pdf} \color{red} Calls are dropped too often ($>$ 2\%)
|
||||
\end{center}
|
||||
\end{frame}
|
||||
|
||||
|
@ -556,7 +568,7 @@ Alternate + Ranking (6/12 active paths)
|
|||
\textbf{Donar Double Send}\\
|
||||
Double Send + Ranking (6/12 active paths)
|
||||
|
||||
\scriptsize Implemented in \texttt{C}, notable API/lib: \texttt{epoll}, \texttt{gstreamer}, \texttt{glib}
|
||||
\scriptsize Implemented in \texttt{C}, notable API/lib: \texttt{epoll}, \texttt{gstreamer}, \texttt{glib}\\
|
||||
|
||||
\normalsize
|
||||
|
||||
|
@ -666,9 +678,9 @@ Double Send + Ranking (6/12 active paths)
|
|||
\end{center}
|
||||
\end{frame}
|
||||
|
||||
\section{Future work \& Conclusion}
|
||||
|
||||
\section{Conclusion}
|
||||
|
||||
\iffalse
|
||||
\begin{frame}{Future Work}
|
||||
\underline{We plan to evaluate}
|
||||
|
||||
|
@ -691,12 +703,15 @@ Double Send + Ranking (6/12 active paths)
|
|||
To make traffic correlation harder
|
||||
|
||||
\end{frame}
|
||||
\fi
|
||||
|
||||
\begin{frame}{Conclusion}
|
||||
\underline{We contributed}
|
||||
|
||||
\Large Foundations \\
|
||||
\normalsize to build a Tor softphone with stable latency
|
||||
\normalsize to build a Tor softphone with stable latency \\
|
||||
over the existing Tor network \\
|
||||
\scriptsize Source code: github.com/CloudLargeScale-UCLouvain/Donar
|
||||
|
||||
\Large Insights \\
|
||||
\normalsize
|
||||
|
|
BIN
img/fastl.png
Normal file
BIN
img/fastl.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 163 KiB |
BIN
img/proxy.png
Normal file
BIN
img/proxy.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 588 KiB |
BIN
img/torb2.png
Normal file
BIN
img/torb2.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 207 KiB |
|
@ -1,98 +1,18 @@
|
|||
\iffalse
|
||||
\begin{frame}[t]{Privacy concerns}
|
||||
\begin{columns}
|
||||
\begin{column}{0.65\textwidth}
|
||||
\begin{figure}
|
||||
\includegraphics[width=\textwidth]{img/scandals.jpg}
|
||||
\end{figure}
|
||||
\end{column}
|
||||
\begin{column}{0.35\textwidth}
|
||||
\begin{center}
|
||||
\vspace{3cm}
|
||||
\Large Privacy issues have many \underline{different faces}
|
||||
\end{center}
|
||||
\end{column}
|
||||
\end{columns}
|
||||
\end{frame}
|
||||
\begin{frame}{Tor's limitations}
|
||||
|
||||
\begin{frame}
|
||||
\frametitle{The impact of our technological choices}
|
||||
|
||||
%\begin{figure}[h]
|
||||
\Large The underlying Internet \underline{infrastructure}\\allows the collection\\of \underline{communication metadata}.
|
||||
|
||||
\vspace{1cm}
|
||||
|
||||
\tikzsetnextfilename{actors}
|
||||
\begin{tikzpicture}[scale=1]
|
||||
\node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
|
||||
\node[below = 0cm of cp1] (cp1t) {Alice};
|
||||
\node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
|
||||
\node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider};
|
||||
\node (sp) at (4.75,0) {\includegraphics[scale=1]{img/service-provider.pdf}};
|
||||
\node[below = 0.1cm of sp, text width = 2cm,align=center] (spt) {Service Provider};
|
||||
\node (np2) at (7.1,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
|
||||
\node[below = 0.1cm of np2, text width = 2cm,align=center] (spt) {Network Provider};
|
||||
\node (cp2) at (9.5,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
|
||||
\node[below = 0cm of cp2] (cp2t) {Bob};
|
||||
\draw[<->, solid, black, line width=1mm] (cp1) edge (np1);
|
||||
\draw[<->, solid, black, line width=1mm] (np1) edge (sp);
|
||||
\draw[<->, solid, black, line width=1mm] (sp) edge (np2);
|
||||
\draw[<->, solid, black, line width=1mm] (np2) edge (cp2);
|
||||
\node[above=-1.2cm of np1] (snp1) {\includegraphics[scale=0.10]{img/eye.pdf}};
|
||||
\node[above=-1.2cm of sp] (ssp) {\includegraphics[scale=0.10]{img/eye.pdf}};
|
||||
\node[above=-1.2cm of np2] (snp2) {\includegraphics[scale=0.10]{img/eye.pdf}};
|
||||
\end{tikzpicture}
|
||||
|
||||
|
||||
%\end{figure}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Building a privacy-aware network}
|
||||
\tikzsetnextfilename{anonintro2}
|
||||
\begin{tikzpicture}[scale=1]
|
||||
\node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
|
||||
\node[below = 0cm of cp1] (cp1t) {Alice};
|
||||
\node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
|
||||
\node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider};
|
||||
\draw[<->, solid, black, line width=1mm] (cp1) edge (np1);
|
||||
|
||||
\node (anet) at (4.75,0) {\includegraphics[scale=0.16]{img/tor.pdf}};
|
||||
\draw[<->, solid, black, line width=1mm] (np1) edge (anet);
|
||||
\node[below = 0cm of anet, text width = 2cm,align=center] (anett) {Tor};
|
||||
\node (qs) at (7,0) {\includegraphics[scale=1.3]{img/question.pdf}};
|
||||
\draw[<->, solid, black, line width=1mm] (anet) edge (qs);
|
||||
\node[below = 0cm of qs, text width = 2cm,align=center] (qst) {Unknown\\Destination};
|
||||
\node[above=-1.4cm of np1] (cloud1) {\includegraphics[scale=0.8]{img/cloud.pdf}};
|
||||
\end{tikzpicture}
|
||||
\begin{center}
|
||||
\normalsize \emph{"[A] system to hide who a participant communicates with [...] in spite of an \underline{unsecured telecommunication system}"}~\footnotemark[1]
|
||||
|
||||
\Large With 2M+ users, \underline{Tor} is the biggest privacy-aware network
|
||||
\end{center}
|
||||
|
||||
|
||||
|
||||
\footnotetext[1]{\fullcite{chaum1981untraceable}}
|
||||
\end{frame}
|
||||
\fi
|
||||
|
||||
\begin{frame}{Tor's limitation}
|
||||
|
||||
\Large \underline{Performance}
|
||||
hinders Tor's adoption
|
||||
\Large \underline{High latency} hinders Tor's adoption\\for \underline{interactive} applications like VoIP
|
||||
|
||||
\begin{columns}
|
||||
\begin{column}{0.5\textwidth}
|
||||
\vspace{0.5cm}
|
||||
\begin{figure}
|
||||
\includegraphics[width=\textwidth]{img/fast.png}
|
||||
\includegraphics[width=\textwidth]{img/fastl.png}
|
||||
\end{figure}
|
||||
\end{column}
|
||||
\begin{column}{0.5\textwidth}
|
||||
\vspace{1cm}
|
||||
\begin{figure}
|
||||
\includegraphics[width=\textwidth]{img/torb.png}
|
||||
\includegraphics[width=\textwidth]{img/torb2.png}
|
||||
\end{figure}
|
||||
\end{column}
|
||||
\end{columns}
|
||||
|
|
Loading…
Reference in a new issue