Proceedings of the 2014 ACM Conference on SIGCOMM 2014
DOI: 10.1145/2619239.2626306
|View full text |Cite
|
Sign up to set email alerts
|

Balancing accountability and privacy in the network

Abstract: Though most would agree that accountability and privacy are both valuable, today's Internet provides little support for either. Previous efforts have explored ways to offer stronger guarantees for one of the two, typically at the expense of the other; indeed, at first glance accountability and privacy appear mutually exclusive. At the center of the tussle is the source address: in an accountable Internet, source addresses undeniably link packets and senders so hosts can be punished for bad behavior. In a priva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…To this end, we should not require large amounts of state, e.g., per-host state, on verifiers. In addition, packet verification should not require additional communication overhead (e.g., a challenge-response protocol [2], [39]) for checking the validity of the segments.…”
Section: A Path Segment As Receiver's Consentmentioning
confidence: 99%
“…To this end, we should not require large amounts of state, e.g., per-host state, on verifiers. In addition, packet verification should not require additional communication overhead (e.g., a challenge-response protocol [2], [39]) for checking the validity of the segments.…”
Section: A Path Segment As Receiver's Consentmentioning
confidence: 99%
“…MorphIT shares a common vision with Network Confessional (NC) [11]: give ISPs an interface for supplying quality-of-service feedback to end users. Both proposals are different from approaches to Internet accountability that either resort to alternative Internet protocols, such as AIP [8] and APIP [32], or alternative designs of the whole Internet architecture, such as SCION [38]. However, unlike our system, NC does not target anonymity guarantees and may interfere with existing anonymous communication systems, Tor [6], by enabling global passive de-anonymization attacks [17,27,31].…”
Section: Related Workmentioning
confidence: 99%
“…We want to support any architecture, and each architecture has a different header format. For example, the Accountable and Private Internet Protocol (APIP) [14] replaces IP's source addresses with two new addresses, a return address and an accountability address. Similarly, the Internet Indirection Infrastructure (i3) [16] uses a flow identifier in place of the ultimate destination.…”
Section: Goals and Challengesmentioning
confidence: 99%
“…Many techniques have been developed to prevent headers from leaking identity information (e.g., mixes, crowds, and onion routing). More recently, a number of network architectures have also focused on improving privacy [9,14,12]. However, none of these solutions can defend against an arbitrary adversary with unlimited capabilities.…”
Section: Introductionmentioning
confidence: 99%