Dynamic Anonymity
Autor: | Tatlı, Emin Islam, Stegemann, Dirk, Lucks, Stefan |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2007 |
Předmět: | |
DOI: | 10.5281/zenodo.1335065 |
Popis: | Encryption protects communication partners from disclosure of their secret messages but cannot prevent traffic analysis and the leakage of information about "who communicates with whom". In the presence of collaborating adversaries, this linkability of actions can danger anonymity. However, reliably providing anonymity is crucial in many applications. Especially in contextaware mobile business, where mobile users equipped with PDAs request and receive services from service providers, providing anonymous communication is mission-critical and challenging at the same time. Firstly, the limited performance of mobile devices does not allow for heavy use of expensive public-key operations which are commonly used in anonymity protocols. Moreover, the demands for security depend on the application (e.g., mobile dating vs. pizza delivery service), but different users (e.g., a celebrity vs. a normal person) may even require different security levels for the same application. Considering both hardware limitations of mobile devices and different sensitivity of users, we propose an anonymity framework that is dynamically configurable according to user and application preferences. Our framework is based on Chaum-s mixnet. We explain the proposed framework, its configuration parameters for the dynamic behavior and the algorithm to enforce dynamic anonymity. {"references":["Fleet management.URL: http://www.fleetonline.ch.","Indoor & outdoor routing.URL: http://www.falk.de.","Jap: Anonymity and privacy tool for internet.\nURL: http://anon.inf.tu-dresden.de.","Locating people in emergency.URL: http://www.sintrade.ch.","Location-based chat and games.URL: http://www.vodafone.de.","The mobile business research group.URL: http://www.m-business.unimannheim.\nde.","Smtp remailers.URL:http://www.freehaven.net/related-comm.html.","Tracking of kids.URL: http://www.trackyourkid.de.","ISO99 IS 15408.URL: http://www.commoncriteriaportal.org, 1999.\n[10] The Anonymizer. URL: http://anonymizer.com.\n[11] David L. Chaum. Untraceable electronic mail, return addresses, and\ndigital pseudonyms. Commun. ACM, 24(2):84-90, 1981.\n[12] Andreas Pfitzmann et al. Anonymity, unobservability, and\npseudonymity: A proposal for terminology, July 2000.\n[13] Michael J. Freedman and Robert Morris. Tarzan: A peer-to-peer\nanonymizing network layer. In Proceedings of the 9th ACM Conference\non Computer and Communications Security (CCS 2002), Washington,\nDC, November 2002.\n[14] Stefan Köpsell, Hannes Federrath, and Marit Hansen. Erfahrungen mit\ndem Betrieb eines Anonymisierungsdienstes. Datenschutz und Datensicherheit,\n27(3), 2003.\n[15] Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. ISDNmixes:\nUntraceable communication with very small bandwidth overhead.\nIn Proceedings of the GI/ITG Conference on Communication in\nDistributed Systems, pages 451-463, February 1991.\n[16] Michael Reiter and Aviel Rubin. Crowds: Anonymity for web transactions.\nACM Transactions on Information and System Security, 1(1),\nJune 1998.\n[17] Bruce Schneier. Secrets and Lies, chapter 5. Security Needs, pages 63-\n67. Wiley and Sons, 2001.\n[18] Emin Islam Tatl─▒, Dirk Stegemann, and Stefan Lucks: Security\nchallenges in location-aware mobile business, In Proceedings of the 2nd\nInternational Workshop on Mobile Commerce and Services, M├╝nchen,\n2005. IEEE Computer Society."]} |
Databáze: | OpenAIRE |
Externí odkaz: |