Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall University.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Reusable Anonymous Return Channels
1 Security Challenges of Location-Aware Mobile Business Emin Islam Tatlı, Dirk Stegemann Theoretical Computer Science, University of Mannheim February.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
Xinwen Fu Anonymous Communication & Computer Forensics Computer & Network Forensics.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Anonymity and Friends: Keeping the Act of Communication Private Chris DuPuis 8 March 2006.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
ORBIT NSF site visit - July 14, Location-based Services & data propagation in ORBIT Henning Schulzrinne Dept. of Computer Science.
Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University.
Scalable Security and Accounting Services for Content-based Publish/Subscribe Systems Himanshu Khurana NCSA, University of Illinois.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Anonymous Communication -- a brief survey
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Denial-of-Service Flooding Detection in Anonymity Networks Computer Networks & Communications Group Institute for IT-Security and Security Law University.
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan.
Anonymous Health Information Exchange (HIE) Transfer with Credibility Check against Fraud through Chaum Mixes and Crowds. By: Aaron Silcott.
Effectiveness of Blending Attacks on Mixes Meng Tang.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing and its Proof of Concept By: Gyanranjan Hazarika.
Internet Business Associate v2.0
Security Outline Encryption Algorithms Authentication Protocols
Anonymous Communication
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
The quieter you become, the more you are able to hear By: Ben Knapic
E-Commerce Security.
The University of Adelaide, School of Computer Science
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
Chapter 14: Representing Identity
An Introduction to Privacy and Anonymous Communication
0x1A Great Papers in Computer Security
Pooja programmer,cse department
PLUG-N-HARVEST ID: H2020-EU
Cost to defeat the N-1 Attack
Anonymous Communication
Multi-party Authentication in Web Services
Amar B. Patel , Shushan Zhao
Public-Key, Digital Signatures, Management, Security
Advanced Computer Networks
Anonymity – Chaum Mixes
Anonymous Communication
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany

2 Overview  Mobile Business Research Group  Anonymity & Unlinkability  Dynamic Anonymity  The Framework  The Algorithm  Future Work

3 Mobile Business Research Group Generic platform for context-aware and location- aware mobile business applications  Joint project of 7 research groups at the University of Mannheim  Web:

4 Context-aware Applications  A Context-aware application considers context when providing its service  Examples Find a pizza delivery service that can deliver my favourite pizza for less than 8 EUR within 15 minutes to my current location Locating moving objects (e.g. fleet management) Locating kids Indoor navigation in fairs Panic alarms Location-based chat/games

5 Anonymity  Mobile users require to hide their real identity  Anonymity ensures that a user may use a resource or service without disclosing the user's identity  Service providers require a unique representation of users  (partial) Solution Pseudonymity  Pseudonyms are faked names (e.g. nicknames)

6 Unlinkability of Pseudonyms  Linkability of pseudonyms may break anonymity  „unlinkability requires that users and/or subjects are unable to determine whether the same user caused certain specific operations in the system“  Main existing solutions for unlinkability: Proxies Mix-net Peer-to-peer networks

7 MIX-NET Mix-Net  Mix: Computer between sender and receiver Decrypts messages and forwards to other mix/receiver MC SP K Mix1 (K Mix2 ( K Mix3 (K SP (M)))) K SP (M) incomingoutgoing Mix 3 Mix 1 Mix 2 Mix n

8 Dynamic Anonymity  Different applications require different anonymity levels finding the nearest shop vs. mobile dating  Different users require different anonymity levels Celebrity v.s. a normal person  Performance problems of Mix-net

9 Configuration Parameters  6 parameters defined affecting the anonymity level: encryption type mix number path picker message threshold dummy message time delay  Configuration parameters are encoded within policies

10 Configuration Parameters (cont.)  A sample policy: symmetric 3 sender 5 10 send

11 The Framework

12 The Algorithm

13 The Algorithm (cont.)

14 Future Work  We are currently implementing the anonymity and policy components  Empricial-test for specifying the optimum configurations for individual users and applications  Integrating the anonymity framework within the application framework

15 References  Jap: Anonymity and privacy tool for internet. URL: dresden.de.  The mobile business research group.URL: mannheim.de.  Smtp r ers.URL:  The Anonymizer. URL:  David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84–90,  Andreas Pfitzmann et al. Anonymity, unobservability, and pseudonymity: A proposal for terminology, July  Michael Reiter and Aviel Rubin. Crowds: Anonymity for web trans- actions. ACM Transactions on Information and System Security, 1(1), June  Emin Islam Tatlı, Dirk Stegemann, and Stefan Lucks: Security Challenges of location-aware mobile business, In Proceedings of the 2nd International Workshop on Mobile Commerce and Services, München, IEEE Computer Society.

Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany