PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
نویسندگان
چکیده
Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhancing Technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered. This paper proposes a forensic investigation technique, which can be embedded in the framework of existing PETs , thereby adding network forensic functionality to the PET. This approach introduces a new dimension to the implementation of Privacy Enhancing Technologies, which enhances their viability in the global network environment.
منابع مشابه
Network Forensics and Privacy Enhancing Technologies “living” together in harmony
Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who perform illegal actions through the Internet. The paper identifies the collision of these opposite-goal technologies and describes what happens in case they come across. Can a Netwo...
متن کاملLogging and Collecting Evidence in Flocks
Flocks is a privacy-enhancing technology (PET) used to hide the web usage patterns of employees in an organization against profiling or mere inspection by administrators and other officials. However, Flocks is intended to support the identification of senders of malicious requests by means of a legitimate forensic investigation. This paper formalizes what should be logged for an appropriate for...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملPrivacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible to address consumer privacy concerns. One is to kill RFID tags at store exits. The second is to lock tags and have user unlock them if they want to initiate reader communication (user scheme). The third is to let the...
متن کاملHandbook of Privacy and Privacy-Enhancing Technologies. The case of Intelligent Software Agents
An investigation of available and applicable Agent Technologies has been carried out.Goal of the investigation was to determine the usage of the available technologies. Thetechnologies have been investigated and are described per ‘topic’. The following top-ics have been used: ‘Agent platforms’, ‘Agent Mobility’, ‘Standardisation initiatives’,‘Legacy System Integration’, ‘Knowled...
متن کامل