Review of Network-Based Approaches for Privacy

نویسندگان

  • Ronggong Song
  • Larry Korba
چکیده

We first provide an overview of the better-known network approaches for assuring anonymity and privacy over networks. These approaches include anonymous communication networks such as MIX network, Onion Routing network, Crows system and Freedom network. We also examine peer-to-peer networks such as OpenPrivacy and JXTA. We then analyze their effectiveness and the possible attacks to these networks based on traffic analysis techniques. We also discuss their implementation and design issues for network privacy, and some problems engendered by firewalls, dynamic IP, NAT and VPN. In the conclusions we summarize the results and describe the research opportunities in this domain.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

An Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling

In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...

متن کامل

A theoretical review of the concept of aloneness from the perspective of psychological approaches

From the point of view of a group of psychological theories, solitary behaviors may be inconsistent with mental health, so that in these theories aloneness is considered a difficult situation that must be prevented or remedied by children who play alone, it is as if they are unhealthy and break the norm and have mercy on those who engage in individual activities. But from other perspectives, al...

متن کامل

Analysis the privacy statement of the American Public Libraries and provide privacy statement for public libraries in Iran

Aim: The purpose of this study was to review the privacy statement of the American top public libraries and provide privacy statement for users of public libraries in Iran. Method: The research method is a combination of descriptive survey and Delphi library. The research community consisted of 25 American public libraries based on the rankings of the American Library Association's libraries. T...

متن کامل

A Review Of DEA Approaches For Health Supply Chain

More than 200 papers have been published in the last 20 years on the topic of health supply chains (HSC). Looking at the research methodologies employed, less than 15 papers apply data envelopment analysis (DEA) models. This is in contrast to, for example, A Network Data Envelopment Analysis (NDEA) Model for Supply Chain Performance Evaluation where several reviews on respective NDEA models hav...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002