Abstract
Currently, Personal Privacy Violation is aggravated via regular internet activities, such as social networks, chats, or browsing websites. The providers of those services may have no user privacy policy. This may lead an intruder leaks the user personal data and violate the user’s privacy. Even worse, the intruder may cause an identity theft. Therefore, the development of an API for Tor on a Smartphone to prevent the privacy violation is crucial. Additionally, the highest usage-value Smartphone Operating System is iOS. As a result, we have developed an API to facilitate an application requiring privacy in communication with its server. The proposed API can send data without exposing the sender information via Tor Network. The experimental results show that the API can send data through Tor Network successfully, and it gives programmer convenience in the implementation process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second- Generation Onion Router. In: Proceeding of the 13th conference on USENIX Security Symposium, p. 21. USENIX Association, Berkeley (2004)
Ling, Z., Luo, J., Wu, K., Fu, X.: Protocol-level Hidden Server Discovery. In: Proceeding of the 2013 IEEE INFOCOM, pp. 1046–1047 (2013)
Doswell, S., Aslam, N., Kendall, D., Sexton, G.: Please slow down!: The Impact on Tor Performance from Mobility. In: Proceeding of the 3rd ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 87–92. ACM Press, New York (2013)
Wang, X., Shi, J., Fang, B., Guo, L.: An Empirical Analysis of Family in the Tor Network. In: Proceeding of the IEEE International Conference on Communication, pp. 1995–2000 (2013)
Chimbunlang, Y., Tuaycharoen, N.: A Web-based Information System for Traffic Police Bribery Reporting via Android Smart Phone (in Thai). In: Proceeding of the ECTI-CARD 2014 (2014)
Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 84–90 (1981)
Diffie, W., Hellman, M.: New Directions in Cryptography. Information Theory. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceeding of th13th USENIX Security Symposium, p. 21. USENIX Association, Berkeley (2004)
Google Play, Orbot: Proxy with Tor (2014), https://play.google.com/store/apps/details?id=org.torproject.android
Haraty, R.A., Zantout, B.: The TOR Data Communication System. J. Communications and Networks 16(4), 415–420 (2014)
Andersson, C., Panchenko, A.: Practical Anonymous Communication on the Mobile Internet using Tor. In: Proceeding of the 3rd conference on Security and Privacy in Communications Networks and the Workshops, pp. 39–48. IEEE Press, Nice (2007)
Tigas, M.: Onion Browser. Available via iTunes Store (2014), https://itunes.apple.com/th/app/onion-browser/id519296448?mt=8
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wittayasatiankul, S., Chumjai, S., Tuaycharoen, N. (2015). Tor’s API on iOS. In: Unger, H., Meesad, P., Boonkrong, S. (eds) Recent Advances in Information and Communication Technology 2015. Advances in Intelligent Systems and Computing, vol 361. Springer, Cham. https://doi.org/10.1007/978-3-319-19024-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-19024-2_27
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19023-5
Online ISBN: 978-3-319-19024-2
eBook Packages: EngineeringEngineering (R0)