2013
DOI: 10.1145/2534169.2486032
|View full text |Cite
|
Sign up to set email alerts
|

Expressive privacy control with pseudonyms

Abstract: As personal information increases in value, the incentives for remote services to collect as much of it as possible increase as well. In the current Internet, the default assumption is that all behavior can be correlated using a variety of identifying information, not the least of which is a user's IP address. Tools like Tor, Privoxy, and even NATs, are located at the opposite end of the spectrum and prevent any behavior from being linked. Instead, our goal is to provide users with more control over linkabilit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
16
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 16 publications
1
16
0
Order By: Relevance
“…However, the number of IPv6 addresses generated by the lower eight bytes of the IPv6 address is limited, which is not considered in this paper. Therefore, Han et al [17] propose a pseudonym-based IPv6 addressing architecture in which Each pseudonym is an IPv6 address. However, the mapping between the pseudonym and the IPv6 address is obtained by the attacker, the privacy of the user will be revealed.…”
Section: A Various Identity Anonymity Of Usersmentioning
confidence: 99%
“…However, the number of IPv6 addresses generated by the lower eight bytes of the IPv6 address is limited, which is not considered in this paper. Therefore, Han et al [17] propose a pseudonym-based IPv6 addressing architecture in which Each pseudonym is an IPv6 address. However, the mapping between the pseudonym and the IPv6 address is obtained by the attacker, the privacy of the user will be revealed.…”
Section: A Various Identity Anonymity Of Usersmentioning
confidence: 99%
“…That is, the user does not want other nodes know his IP address when the data is being forwarded by them. Because the IP address can expose the user's location, attributes, and other information [7]. At the same time, if the user is a malicious user, and use anonymous tools such as Tor network to attack servers in the website, the service provider (the website company) and network administrator (e.g., Internet service provider or government) will not be able to find the attacker.…”
Section: B Scenariomentioning
confidence: 99%
“…The IP address as an identity identifier, may expose their names, attributes, locations and other information [7]. Therefore, how to protect the user's privacy in this process is a challenging issue.…”
Section: Introductionmentioning
confidence: 99%
“…However, an attacker can easily obtain the identity of a certain user through long-term observation. Many previous schemes have mentioned the traceability of a single pseudonym [ 28 , 29 , 30 , 31 ]. In our system model, the attacker can obtain contact information for the pseudonym in an emergency.…”
Section: System Models Threat Models and Security Objectivesmentioning
confidence: 99%
“…To generate an AID, the user encrypts their using a public key of the RA and sends this to the RA. At this point, we employ a set of session pseudonyms such that each user uses one pseudonym for only one session, to deal with forward and backward privacy in the single pseudonym approach [ 31 ].…”
Section: System Architecture For Privacy-preserving Intelligent Ecmentioning
confidence: 99%