Information Hiding, Anonymity and Privacy: a Modular Approach

نویسندگان

  • Dominic J. D. Hughes
  • Vitaly Shmatikov
چکیده

We propose a new specification framework for information hiding properties such as anonymity and privacy. The framework is based on the concept of a function view, which is a concise representation of the attacker’s partial knowledge about a function. We describe system behavior as a set of functions, and formalize different information hiding properties in terms of views of these functions. We present an extensive case study, in which we use the function view framework to systematically classify and rigorously define a rich domain of identity-related properties, and to demonstrate that privacy and anonymity are independent. The key feature of our approach is its modularity. It yields precise, formal specifications of information hiding properties for any protocol formalism and any choice of the attacker model as long as the latter induce an observational equivalence relation on protocol instances. In particular, specifications based on function views are suitable for any cryptographic process calculus that defines some form of indistinguishability between processes. Our definitions of information hiding properties take into account any feature of the security model, including probabilities, random number generation, timing, etc., to the extent that it is accounted for by the formalism in which the system is specified.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fast Survey on Methods for Classification Anonymity Requirements

Anonymity has become a significant issue in security field by recent advances in information technology and internet. The main objective of anonymity is hiding and side a system. Many methods and protocols have been proposed with different anonymity services to provide anonymity requirements in various fields until now. Each anonymity method or protocol is developed using particular approach. I...

متن کامل

Hybrid Approach for Data Publishing Using Privacy Preservation Techniques

Now a day’s governmental and nongovernmental organization wants to share their information for the purpose of knowledge discovery. When the data’s are shared individuals personal data or sensitive data which should not be known to others. Eg. Medical record, voters list, census data. This may leads a latest research field called Privacy preserving data mining. To address these issues, released ...

متن کامل

A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks

Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a dest...

متن کامل

Information Leakage in Optimal Anonymized and Diversified Data

To reconcile the demand of information dissemination and preservation of privacy, a popular approach generalizes the attribute values in the dataset, for example by dropping the last digit of the postal code, so that the published dataset meets certain privacy requirements, like the notions of k-anonymity and `-diversity. On the other hand, the published dataset should remain useful and not ove...

متن کامل

A Survey on Anonymity in Location Based Services

Due to the increased use of Location Based Services (LBS), which require personal data of the user to provide the service, protecting the privacy of these data has become a challenge. An approach to provide privacy is through anonymity, by hiding the identity and location of the mobile device from the service provider or from any unauthorized party who has access at the user’s request. Consider...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Computer Security

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2004