Anonymity v . s . Information Leakage in a Anonymity Systems ∗

نویسندگان

  • Ye Zhu
  • Riccardo Bettati
چکیده

Measures for anonymity in systems must be on one hand simple and concise, and on the other hand reflect the realities of real systems. Such systems are heterogeneous, as are the ways they are used, the deployed anonymity measures, and finally the possible attack methods. Implementation quality and topologies of the anonymity measures must be considered as well. We therefore propose a new measure for the anonymity degree, which takes into account possible heterogeneity. We model the effectiveness of single mixes or of mix networks in terms of information leakage and measure it in terms of covert channel capacity. The relationship between the anonymity degree and information leakage is described, and an example is shown.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems. PhD Thesis, Radboud University Nijmegen, the Netherlands

Een wetenschappelijke proeve op het gebied van de Natuurwetenschappen, Wiskunde en Informatica. Proefschrift ter verkrijging van de graad van doctor aan de Radboud Universiteit Nijmegen op gezag van de rector magnificus, prof. mr. A scientific essay in Science. Summary As we dive into the digital era, there is growing concern about the amount of personal digital information that is being gather...

متن کامل

Anonymity, information, and machine-assisted proof

This report demonstrates a technique for proving the anonymity guarantees of communication systems, using a mechanised theorem-prover. The approach is based on Shannon’s theory of information and can be used to analyse probabilistic programs. The information-theoretic metrics that are used for anonymity provide quantitative results, even in the case of partial anonymity. Many of the development...

متن کامل

Anonymity Leakage Reduction in Network Latency

Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source and destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency, thus, the minimization of anonymity leakage ...

متن کامل

How (Not) to Apply Differential Privacy in Anonymity Networks

Differential privacy is a particularly appealing way of defining privacy due to its ability to handle adversaries with arbitrary auxiliary information at their disposal [1]. In essence, using differential privacy should imply that we do not have to worry about the external databases or specialized knowledge that an attacker has access to. Meanwhile, one of the biggest challenges for anonymity n...

متن کامل

Weak Probabilistic Anonymity 1 Yuxin Deng

Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be described probabilistically. In this paper we propose a notion of weak probabilistic anonymity, where weak refers to the fact that some amount of probabilistic information may be revealed by the protocol. This information c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004