DNS in the Time of Curiosity: A Tale of Collaborative User Privacy Protection

📅 2025-09-28
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Public DNS resolvers may collude to aggregate user behavioral data, compromising privacy. Method: This paper proposes a user-centric, collaborative DNS privacy protection mechanism integrating encrypted queries, multi-hop relaying, and responsibility separation—replacing traditional trust models reliant on single-point encryption or provider policy commitments. A lightweight protocol optimization ensures low latency, bandwidth, and computational overhead across mainstream DNS scenarios. Contribution/Results: Experiments demonstrate that the system achieves performance close to standard DNS resolution while significantly reducing the risk of centralized analysis of user activity data. It is the first work to empirically validate—without requiring any trusted third party—that strong privacy guarantees and high operational efficiency can be simultaneously achieved in DNS resolution.

Technology Category

Application Category

📝 Abstract
The Domain Name System (DNS) is central to all Internet user activity, resolving accessed domain names into Internet Protocol (IP) addresses. As a result, curious DNS resolvers can learn everything about Internet users' interests. Public DNS resolvers are rising in popularity, offering low-latency resolution, high reliability, privacy-preserving policies, and support for encrypted DNS queries. However, client-resolver traffic encryption, increasingly deployed to protect users from eavesdroppers, does not protect users against curious resolvers. Similarly, privacy-preserving policies are based solely on written commitments and do not provide technical safeguards. Although DNS query relay schemes can separate duties to limit data accessible by each entity, they cannot prevent colluding entities from sharing user traffic logs. Thus, a key challenge remains: organizations operating public DNS resolvers, accounting for the majority of DNS resolutions, can potentially collect and analyze massive volumes of Internet user activity data. With DNS infrastructure that cannot be fully trusted, can we safeguard user privacy? We answer positively and advocate for a user-driven approach to reduce exposure to DNS services. We will discuss key ideas of the proposal, which aims to achieve a high level of privacy without sacrificing performance: maintaining low latency, network bandwidth, memory/storage overhead, and computational overhead.
Problem

Research questions and friction points this paper is trying to address.

Protecting user privacy from curious DNS resolvers collecting activity data
Preventing collusion between entities sharing DNS query logs
Achieving privacy without sacrificing DNS performance and overhead
Innovation

Methods, ideas, or system contributions that make the work stand out.

Collaborative user-driven approach for DNS privacy
Separates duties to limit resolver data access
Maintains low latency and minimal resource overhead
🔎 Similar Papers
No similar papers found.
P
Philip Sjösvärd
KTH Royal Institute of Technology, Stockholm, Sweden
H
Hongyu Jin
KTH Royal Institute of Technology, Stockholm, Sweden
Panos Papadimitratos
Panos Papadimitratos
KTH (Royal Institute of Technology)
SecurityPrivacyNetworkingWireless communications