Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
نویسندگان
چکیده
Today’s Internet architecture makes no deliberate attempt to provide identity privacy—IP addresses are, for example, often static and the consistent use of a single IP address can leak private information to a remote party. Existing approaches for rectifying this situation and improving identity privacy fall into one of two broad classes: (1) building a privacy-enhancing overlay layer (like Tor) that can run on top of the existing Internet or (2) research into principled but often fundamentally different new architectures. We suggest a middle-ground: enlisting ISPs to assist in improving the identity privacy of users in a manner compatible with the existing Internet architecture, ISP best practices, and potential legal requirements.
منابع مشابه
Privad: Practical Privacy in Online Advertising
Online advertising is a major economic force in the Internet today. The revenue from well-targeted ad placement underlies the lucrative business models of many online services including search, email, social networks and, indirectly, ISPs and data centers. Today’s deployments, however, erode privacy and degrade performance as browsers wait for ad networks to deliver ads. We present Privad, a pr...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملP3CA: Private Anomaly Detection Across ISP Networks
Detection of malicious traffic in the Internet would be much easier if ISP networks shared their traffic traces. Unfortunately, state-ofthe-art anomaly detection algorithms require detailed traffic information which is considered extremely private by operators. To address this, we propose an algorithm that allows ISPs to cooperatively detect anomalies without requiring them to reveal private tr...
متن کاملPhantom Access Agent: a Client-Side Approach to Personal Information Control
People have criticized on-line services for violating privacy by collecting too much personal information. Though web browsers must generally reveal basic network information such as a user’s current IP address, web sites often collect far more, including a user’s name, physical location, and email address. Service providers justify their data collection on the grounds that users benefit from s...
متن کامل