Implementation and Analysis of Profiling Mechanism for Anonymity and Privacy on Whonix Operating System


  • Yana J S Batunanggar * Mail Telkom University, Bandung, Indonesia
  • Adityas Widjajarto Telkom University, Bandung, Indonesia
  • M Tegoeh Kurniawan Telkom University, Bandung, Indonesia
  • (*) Corresponding Author
Keywords: Anonymity; Privacy; Profiling; The Onion Router (TOR); Digital

Abstract

This research will implement anonymity using the Whonix operating system.  This research seeks to analyze the features of the Whonix operating system that can support anonymity and privacy profiling, the function of anonymity and privacy profiling on the operating system, and the character of the operating system capable of maintaining anonymity and privacy. Features owned by the Whonix operating system that support anonymity and privacy profiling on Whonix are application, network, and operating system aspects, as well as analyzing anonymity and privacy functions with metrics. This research produces metrics on each aspect. The application aspect obtained metrics of data encryption, metadata protection, and privacy by design by analyzing profiling experiments on KeePassXC and GnuPG applications. The network aspect uses Tor compatibility, IP Address obfuscation, and logging policy metrics by analyzing profiling experiments on Wireguard and DNSLeakTest. While the operating system aspect uses data encryption, logging and monitoring, and access control metrics by analyzing profiling experiments with fingerprinting and backup and restore scenarios. The results of this study obtained scoring profiling of the Whonix operating system, application aspect profiling scenarios with a score of 1o, network aspects with a total score of 11, and operating system aspects with a total score of 10. So it is obtained from the results of this study that all aspects of the application, network, and operating system were successful by 97% as measured based on the measurement metrics of each aspect.

Downloads

Download data is not yet available.

References

M. Hlatshwayo, “CYBERSECURITY IN THE DIGITAL SPACE,” Oct. 2023, [Online]. Available: https://www.researchgate.net/publication/375115830

L. Kim, “Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information,” Jan. 2022, doi: 10.1007/978-3-030-91237-6_26.

B. Lundgren, “Beyond the concept of anonymity: what is really at stake.” Big data and democracy. 2020.

H. Barstad and C. Li, “Deanonymizing communications on The Onion Router (TOR) network with Deep Learning,” 2021. [Online]. Available: https://github.com/HallyB96/TOR-Deep-Fingerprinting-Master-Thesis.

A. Hulina, “Operating systems for privacy and anonymity: a survey B,” Brno, 2020.

M. B. Betel de Robles, J. C. Anthony Hermocilla, and J. P. Pabico, “Characterization and Classification of Malware Traffic over the Tor Network,” Computing Society of the Philippines, Inc, 2020.

P. Choorod and G. Weir, “Tor Traffic Classification Based on Encrypted Payload Characteristics,” in Proceedings - 2021 IEEE 4th National Computing Colleges Conference, NCCC 2021, Institute of Electrical and Electronics Engineers Inc., Mar. 2021. doi: 10.1109/NCCC49330.2021.9428874.

J. Perno and C. W. Probst, “Human Aspects of Information Security, Privacy and Trust,” T. Tryfonas, Ed., in Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. doi: 10.1007/978-3-319-58460-7.

O. Eriksson and P. J. Ågerfalk, “Speaking things into existence: Ontological foundations of identity representation and management,” Information Systems Journal, vol. 32, no. 1, pp. 33–60, Jan. 2022, doi: 10.1111/isj.12330.

F. M. Purba, P. Warih, and M. Saputra, “Design Of Enterprise Resource Planning System In Inventory Management Module Using Odoo Application With Quickstart Method In Pharmacy Room Of Puskesmas III Denpasar Utara,” 2021.

A. Master, “Password Managers: Secure Passwords the Easy Way,” Center for Education and Research in Information Assurance and Security (CERIAS), 2022, doi: 10.5703/1288284317618.

W. Mahanan, W. A. Chaovalitwongse, and J. Natwichai, “Data privacy preservation algorithm with k-anonymity,” World Wide Web, vol. 24, no. 5, pp. 1551–1561, Sep. 2021, doi: 10.1007/s11280-021-00922-2.

T. Oesch, “An Analysis of Modern Password Manager Security and Usage on An Analysis of Modern Password Manager Security and Usage on Desktop and Mobile Devices Desktop and Mobile Devices,” Information Security Commons, Other Computer Engineering Commons, 2021.

A. Z. Mardiansyah, A. Zubaidi, A. H. Jatmika, and R. B. Huwae, “Implementation of GNU Privacy Guard (GPG) Hybrid Encryption to Improve Information Security in Electronic Signature (E-Sign) Services at the University of Mataram,” 2024.

K. Nair, P. Maitreyi, E. Sushma, and A. H. M, “Providing Security for a Chat Application using RSA Encryption with GPG,” International Conference for Innovation in Technology (INOCON), pp. 1–5, 2024, doi: 10.1109/INOCON60754.2024.10511348.

A. Anbarje, M. Sabbagh, and D. P. Palacin, “Evaluation of WireGuard and OpenVPN,” Dissertation, 2020.

P. A. Wu supervised by Tanja Lange Jacob Appelbaum Jason Donenfeld, “Analysis of the WireGuard protocol,” 2019.

V. Johansson, “A COMPARISON OF OPENVPN AND WIREGUARD ON ANDROID,” Computer Science, 2024.

A. M. Taib, “Securing Network Using Raspberry Pi by Implementing VPN, Pi-Hole, and IPS (VPiSec),” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 1.3, pp. 457–464, Jun. 2020, doi: 10.30534/ijatcse/2020/7291.32020.

Jr. Jonathan A. Goohs, “CULR_Fall_Journal_Apr_Revision,” COLUMBIA UNDERGRADUATE LAW REVIEW, vol. XVIII, no. 1, pp. 133–134, 2021.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementation and Analysis of Profiling Mechanism for Anonymity and Privacy on Whonix Operating System

Dimensions Badge
Article History
Submitted: 2024-07-25
Published: 2024-10-13
Abstract View: 496 times
PDF Download: 360 times
How to Cite
Batunanggar, Y., Widjajarto, A., & Kurniawan, M. T. (2024). Implementation and Analysis of Profiling Mechanism for Anonymity and Privacy on Whonix Operating System. Journal of Information System Research (JOSH), 6(1), 23-33. https://doi.org/10.47065/josh.v6i1.5682
Section
Articles