Anonymity and Privacy in Electronic Services

نویسندگان

  • John Donne
  • Joos Vandewalle
  • Geert Deconinck
  • Joris Claessens
  • Andrei Serjantov
  • Len Sassaman
  • George Danezis
  • Roger Dingledine
  • Andreas Pfitzmann
  • Paul Syverson
  • Ben Laurie
  • Joss Wright
  • Danny De Cock
  • Klaus Kursawe
  • Svetla Nikova
  • Jasper Scholten
  • Elvira Wouters
چکیده

This thesis presents information theoretic anonymity metrics and various analysis of anonymous communication nodes. Our contributions are a step towards the understanding of anonymity properties and the development of robust anonymous communications. Anonymous communications are an essential building block for privacy-enhanced applications, as the data available at the communication layer may leak critical private information. One of the main contributions of our work is the degree of anonymity, a practical information theoretic anonymity metric. Entropy-based anonymity metrics can be applied to measure the degree of anonymity provided by an anonymous service to its users. In particular, these metrics can be applied to systems which leak probabilistic relationships between the anonymous subjects and their transactions. We present a taxonomy of the two main building blocks used to implement anonymous communication networks, which are anonymous communication nodes (called mixes) and cover traffic policies (called dummy traffic). We propose a model for describing anonymous communication nodes which extends design possibilities and facilitates the analysis of anonymity properties. We identify the parameters which must be taken into account in the design and analysis of mix-based anonymous communication networks. In order to show the practical applications of information theoretic anonymity metrics, we have applied the metrics to evaluate the anonymity properties of various nodes for anonymous communication which have been proposed in the literature. We analyze the anonymity provided by these nodes when subject to passive and active attacks, while considering scenarios with and without cover traffic techniques. We have analyzed two working implementations of anonymous email in real traffic conditions. The tools used for the analysis are information theoretic metrics and our model for anonymous communication nodes. We show that anonymous email traffic patterns are hard to predict and no assumptions on them should be made. We find that the two studied designs offer very different trade-

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

Anonymity and Accountability in Web Based Transactions

Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when pe...

متن کامل

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commerc...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

A Privacy-Enhancing e-Business Model Based on Infomediaries

Rapid evolution of Internet may largely depend on gaining and maintaining the trust of users. This possibility may especially rule enterprises, whose financial viability depends on electronic commerce. Neither customers will have the time, the ability or the endurance to work out the best deals with vendors, nor will vendors have time to bargain with every customer. In order for customers to st...

متن کامل

A Customizable k-Anonymity Model for Protecting Location Privacy

Continued advances in mobile networks and positioning technologies have created a strong market push for location-based services (LBSs). Examples include location-aware emergency services, location based service advertisement, and location sensitive billing. One of the big challenges in wide deployment of LBS systems is the privacy-preserving management of location-based data. Without safeguard...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998