Review of Network-Based Approaches for Privacy
نویسندگان
چکیده
We first provide an overview of the better-known network approaches for assuring anonymity and privacy over networks. These approaches include anonymous communication networks such as MIX network, Onion Routing network, Crows system and Freedom network. We also examine peer-to-peer networks such as OpenPrivacy and JXTA. We then analyze their effectiveness and the possible attacks to these networks based on traffic analysis techniques. We also discuss their implementation and design issues for network privacy, and some problems engendered by firewalls, dynamic IP, NAT and VPN. In the conclusions we summarize the results and describe the research opportunities in this domain.
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAn Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling
In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...
متن کاملA theoretical review of the concept of aloneness from the perspective of psychological approaches
From the point of view of a group of psychological theories, solitary behaviors may be inconsistent with mental health, so that in these theories aloneness is considered a difficult situation that must be prevented or remedied by children who play alone, it is as if they are unhealthy and break the norm and have mercy on those who engage in individual activities. But from other perspectives, al...
متن کاملAnalysis the privacy statement of the American Public Libraries and provide privacy statement for public libraries in Iran
Aim: The purpose of this study was to review the privacy statement of the American top public libraries and provide privacy statement for users of public libraries in Iran. Method: The research method is a combination of descriptive survey and Delphi library. The research community consisted of 25 American public libraries based on the rankings of the American Library Association's libraries. T...
متن کاملA Review Of DEA Approaches For Health Supply Chain
More than 200 papers have been published in the last 20 years on the topic of health supply chains (HSC). Looking at the research methodologies employed, less than 15 papers apply data envelopment analysis (DEA) models. This is in contrast to, for example, A Network Data Envelopment Analysis (NDEA) Model for Supply Chain Performance Evaluation where several reviews on respective NDEA models hav...
متن کامل