Evaluating Common Privacy Vulnerabilities in Internet Service Providers

نویسندگان

  • Panayiotis Kotzanikolaou
  • Sotiris Maniatis
  • Eugenia G. Nikolouzou
  • Vassilios Stathopoulos
چکیده

Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users’ needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users. This paper discusses the role of the ISP in the privacy of the communications. Based on real security audits performed in national-wide ISPs, we illustrate privacy-specific threats and vulnerabilities that many providers fail to address when implementing their security policies. We subsequently provide and discuss specific security measures that the ISPs can implement, in order to fine-tune their security policies in the context of privacy protection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Shifts of Fortune Test the Reliability of Friends - The Brittle Nature of Signal Reliability in Cloud Service Markets

Signaling theory has compellingly demonstrated that embedding internet signals (i.e., web assurance seals, privacy policies, consumer feedback) by cloud service providers can be considered as credible indicators of provider’s attributes, thereby reducing uncertainties and information asymmetries in cloud service markets. However, cloud service providers are operating in a dynamic environment ch...

متن کامل

Privacy risks, security and accountability in the Cloud

Migrating data, applications or services to the cloud exposes a business to a number of new threats and vulnerabilities, which need to be properly assessed. Assessing privacy risk in cloud environments remains a complex challenge; mitigation of this risk requires trusting a cloud service provider to implement suitable privacy controls. Furthermore, auditors and authorities need to be able to ho...

متن کامل

Survey Paper on Security & Privacy Issues in Cloud Storage Systems

We are increasingly relying on a number of online file storage systems to back up our data or use it as a collaborative tool in real time. All these services bring with it a fair share of security and privacy vulnerabilities for all the conveniences provided by them. In this survey paper, I seek to describe the various issues related to data security, privacy and availability with storing data ...

متن کامل

PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale

The management of identities on the Internet has evolved from the traditional approach (where each service provider stores and manages identities) to a federated identity management system (where the identity management is delegated to a set of identity providers). On the one hand, federated identity ensures usability and provides economic benefits to service providers. On the other hand, it po...

متن کامل

Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment

In the current IoT (Internet of Things) environment, more and more Things: devices, objects, sensors, and everyday items not usually considered computers, are connected to the Internet, and these Things affect and change our social life and economic activities. By using IoTs, service providers can collect and store personal information in the real world, and such providers can gain access to de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009