Information Hiding, Anonymity and Privacy: a Modular Approach
نویسندگان
چکیده
We propose a new specification framework for information hiding properties such as anonymity and privacy. The framework is based on the concept of a function view, which is a concise representation of the attacker’s partial knowledge about a function. We describe system behavior as a set of functions, and formalize different information hiding properties in terms of views of these functions. We present an extensive case study, in which we use the function view framework to systematically classify and rigorously define a rich domain of identity-related properties, and to demonstrate that privacy and anonymity are independent. The key feature of our approach is its modularity. It yields precise, formal specifications of information hiding properties for any protocol formalism and any choice of the attacker model as long as the latter induce an observational equivalence relation on protocol instances. In particular, specifications based on function views are suitable for any cryptographic process calculus that defines some form of indistinguishability between processes. Our definitions of information hiding properties take into account any feature of the security model, including probabilities, random number generation, timing, etc., to the extent that it is accounted for by the formalism in which the system is specified.
منابع مشابه
A Fast Survey on Methods for Classification Anonymity Requirements
Anonymity has become a significant issue in security field by recent advances in information technology and internet. The main objective of anonymity is hiding and side a system. Many methods and protocols have been proposed with different anonymity services to provide anonymity requirements in various fields until now. Each anonymity method or protocol is developed using particular approach. I...
متن کاملHybrid Approach for Data Publishing Using Privacy Preservation Techniques
Now a day’s governmental and nongovernmental organization wants to share their information for the purpose of knowledge discovery. When the data’s are shared individuals personal data or sensitive data which should not be known to others. Eg. Medical record, voters list, census data. This may leads a latest research field called Privacy preserving data mining. To address these issues, released ...
متن کاملA novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks
Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a dest...
متن کاملInformation Leakage in Optimal Anonymized and Diversified Data
To reconcile the demand of information dissemination and preservation of privacy, a popular approach generalizes the attribute values in the dataset, for example by dropping the last digit of the postal code, so that the published dataset meets certain privacy requirements, like the notions of k-anonymity and `-diversity. On the other hand, the published dataset should remain useful and not ove...
متن کاملA Survey on Anonymity in Location Based Services
Due to the increased use of Location Based Services (LBS), which require personal data of the user to provide the service, protecting the privacy of these data has become a challenge. An approach to provide privacy is through anonymity, by hiding the identity and location of the mobile device from the service provider or from any unauthorized party who has access at the user’s request. Consider...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Computer Security
دوره 12 شماره
صفحات -
تاریخ انتشار 2004