New system to empower internet users with more data control

New system to empower internet users with more data control
x
Highlights

Computer scientists have developed a novel method for providing concrete proof to internet users that their information did not cross through certain undesired geographic areas. The new system called “Alibi Routing” offers advantages over existing systems as it is immediately deployable and does not require knowledge of the internet\'s routing hardware or policies.

New York: Computer scientists have developed a novel method for providing concrete proof to internet users that their information did not cross through certain undesired geographic areas. The new system called “Alibi Routing” offers advantages over existing systems as it is immediately deployable and does not require knowledge of the internet's routing hardware or policies.


Recent events such as censorship of internet traffic, suspicious “boomerang routing” where data leaves a region only to come back again, and monitoring of users' data have alerted the researchers. “We became increasingly interested in this notion of empowering users to have more control over what happens with their data," said project lead Dave Levin, assistant research scientist at University of Maryland in a statement.


Information transmitted over the internet such as website requests or email content is broken into packets and sent through a series of routers on the way to its destination. However, users have very little control over what parts of the world these packets traverse. “Alibi Routing” works by searching a peer-to-peer network to locate “peers” - other users running the alibi routing software - that can relay a user's packets to its ultimate destination while avoiding specified forbidden regions.


The peer is called an "alibi." The alibi provides proof that at a particular time, a packet was at a specific geographic location sufficiently far enough away from the forbidden areas that the data could not have entered them. If successful, users receive proof that their information reached its desired destination and that it did not traverse the forbidden regions.

Show Full Article
Print Article
Next Story
More Stories
ADVERTISEMENT
ADVERTISEMENTS