University of Maryland to introduce Alibi Routing
COLLEGE PARK, MD: One of the greatest concerns for open communication over the internet is censorship imposed by different countries while data is routed through their territory. Information may be censored by a user’s country of residence or the information’s final destination. But studies have revealed that countries through which the data has been routed might also alter it by imposing censorship authorities.
Scientists at University of Maryland’s Institute for Advanced Computer Studies have come up with a solution to this concern by introducing Alibi Routing. It works by searching through a peer-to-peer network to locate peers (Alibi) who are also running the alibi software. Together they can relay data packets to its intended destination while avoiding specified forbidden geographical regions.
Highlighting this particular scenario, Project Lead Dave Levin, an assistant research scientist at the UMIACS says, “With recent events, such as censorship of Internet traffic, suspicious ‘boomerang routing’ where data leaves a region only to come back again, and monitoring of users’ data, we became increasingly interested in this notion of empowering users to have more control over what happens with their data.”.
Data transmitted over the internet are broken into packets before they are sent through a series of hundreds and thousands of routers towards their destination. However, till now senders and receivers enjoyed little or no control over the routing path of the data and what parts of the world these packets travel through.
The system is immediately deployable and does not require knowledge of Internet routing technologies and hardware and can be implemented by using the already existing infrastructure.
For the purpose of testing Alibi Routing method, the researchers have simulated a network with 20,000 participants and some designated forbidden regions.
The alibi provides proof—calculations that exploit the fact that information cannot travel faster than the speed of light—that at a particular time, a packet was at a specific geographic location sufficiently far enough away from the forbidden areas that the data could not have entered them.
Recognizing Bare Metal Switches
Nomadix Launches New Gateway to Support Hotels with High Speed Fiber Internet
By Debra Jensen, CIO, Charlotte Russe
By Phil Jordan, CIO, Telefonica
By Alberto Ruocco, CIO, American Electric Power
By Sven Gerjets, SVP-IT, DIRECTV
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
By Mike Dieter, CTO, Transplace
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Kevin Kometer, CIO, CME Group
By John Landwehr, Public Sector CTO, Adobe
By Marc Probst, CIO & VP, Intermountain Healthcare
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
By Jeff Bauserman, VP-Information Systems & Technology,...