An Analysis for Anonymity and Unlinkability for a VoIP Conversation

نویسنده

  • Ge Zhang
چکیده

With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for privacy issues. In this paper, we explore the Items of Interests (IOIs) from anonymisation aspects based on a simplified VoIP model and analyse the potential links between them. We address possible methods to break the links. Finally, we also discuss requirements for a VoIP anonymisation Service (VAS) in terms of functionality, performance and usability. Based on this, we discuss the fundamental design requirements for a VAS which we intend to subsequently implement.

منابع مشابه

Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking"

Recently, Fan et al. proposed a user efficient recoverable off-line e-cash scheme with fast anonymity revoking. They claimed that their scheme could achieve security requirements of an e-cash system such as, anonymity, unlinkability, double spending checking, anonymity control, and rapid anonymity revoking on double spending. They further formally prove the unlinkability and the un-forgeability...

متن کامل

Privacy Enhancing Technologies for Privacy Enhancing Technologies

This work contributes to the field of unlinkability. Unlinkability describes a situation where attackers are unable to correctly cluster items of interest. The focus of this work is on modelling and measuring unlinkability. Additionally a protocol for provision of unlinkable certificates, tailored to the requirements of vehicular communication is introduced. The vehicular scenario is used throu...

متن کامل

TEL-AVIV UNIVERSITY RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES SCHOOL OF COMPUTER SCIENCE Hide and Seek: Provable Anonymity in Computer Networks

Anonymous communication methods have been under heavy research in the last years. Specifically, with the advent of peer to peer networks, anonymity is grasped as a desired property of any well designed system for exchanging information between parties. Previous work dealing with anonymity and privacy is mostly application driven and intuitively based, paying more attention to implementation det...

متن کامل

Lightweight anonymous authentication scheme with unlinkability in global mobility networks

Anonymous user authentication schemes are essential to guarantee personal privacy in global mobility networks. Recently, Chung, Lee and Won proposed an improved authentication scheme with anonymity which remedies security weaknesses showed by Youn, Park and Lim. However, their improved scheme does not provide unlinkability. In this paper, we propose an anonymous authentication scheme which ensu...

متن کامل

Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks

Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible services. However, VoIP calling anonymity, particularly to withhold “who called whom”, is difficult to achieve since VoIP infrastructures are usually deployed in an open networking environment (e.g., the Internet). Our work st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009