ISSN: A/F

Anonymity and Skepticism: The Evolution and Implications of the TOR Network

Abstract

In today's era of increasing reliance on mobile devices, chatbots play a vital role due to their simplicity and accessibility. The COVID-19 pandemic has further highlighted the insufficiency of healthcare resources, emphasizing the need for scalable digital solutions. This paper presents an application that leverages deep learning to assist with online disease diagnosis via a chatbot interface. The study focuses on predicting an individual’s susceptibility to heart attacks based on specific health indicators. Using a robust dataset, a deep learning model was developed to analyse key features and accurately assess the risk of cardiac events. The model was then integrated into a chatbot, allowing users to access personalized health insights in real-time. By combining advanced machine learning techniques with an intuitive conversational interface, the proposed system aims to enhance early detection and preventive care. The application is designed to reduce the burden on healthcare systems while empowering individuals with critical health information in a user-friendly format. This approach demonstrates the potential of integrating artificial intelligence with conversational platforms to address pressing health challenges effectively.

References

  1. Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium. USENIX.
  2. Murdoch, S. J., & Zieliński, P. (2007). Low-cost traffic analysis of Tor. In Proceedings of the 2007 IEEE Symposium on Security and Privacy. IEEE.
  3. Winter, P., & Lindskog, S. (2012). How the Tor network is being used: A study on web usage patterns and anonymity tools. Privacy Enhancing Technologies Symposium.
  4. Johnson, A., Jansen, R., & Hopper, N. (2014). Shadow: Running Tor in a box for accurate and efficient experimentation. Network and Distributed System Security Symposium.
  5. Chen, T., McSorley, K., & Feamster, N. (2015). Exploring the ethical implications of Tor usage: A mixed-method study. Journal of Cybersecurity and Privacy, 3(4), 256–270.
  6. Mohaisen, A., & Wang, Y. (2014). Understanding Tor usage with privacy-preserving measurement. ACM Transactions on Internet Technology, 14(2), 10.
  7. De, M. (2017). VPNs vs. Tor: A comparative analysis of user perspectives and privacy features. International Journal of Internet Privacy Studies, 5(1), 45–60.
  8. McCoy, D., Bauer, K., & Grunwald, D. (2008). Shining light in dark places: Understanding the Tor network. In Proceedings of the 2008 Privacy Enhancing Technologies Symposium.
  9. Anderson, C. (2013). The Dark Web dilemma: Balancing privacy and security in online spaces. Stanford Law Review, 65(2), 235–287.
  10. ] Christos Beretas. (Chronicle Journal of Engineering Science, 2020). The role of IoT in Smart Cities: Security and Privacy in Smart World.
  11. Christos Beretas. (Biomedical Journal of Scientific & Technical Research, 2020). Smart Cities and Smart Devices: The Back Door to Privacy and Data Breaches.
  12. Christos Beretas. (International Journal of Innovative Research in Electronics and Communications, 2019). Governments Failure on Global Digital Geopolitical Strategy.
  13. Christos Beretas. (Research in Medical & Engineering Sciences, 2018). Security and Privacy in Data Networks.
  14. Syverson, P. (2017). Why I'm not an anonymity pessimist: Thoughts on the trajectory of anonymity systems. Communications of the ACM, 60(3), 60–69.
Download PDF

How to Cite

Dr. Dalia Mohamed Younis, Krishan kumar Yadav, (2025-03-05 23:49:29.649). Anonymity and Skepticism: The Evolution and Implications of the TOR Network. JANOLI International Journal of Computer Science and Engineering , Volume rn1ql9uo4BygpjFCAoIa, Issue 1.