Balancing accountability and privacy in the network

  title={Balancing accountability and privacy in the network},
  author={David Naylor and Matthew K. Mukerjee and Peter Steenkiste},
  journal={ACM SIGCOMM Computer Communication Review},
  pages={75 - 86}
Though most would agree that accountability and privacy are both valuable, today's Internet provides little support for either. Previous efforts have explored ways to offer stronger guarantees for one of the two, typically at the expense of the other; indeed, at first glance accountability and privacy appear mutually exclusive. At the center of the tussle is the source address: in an accountable Internet, source addresses undeniably link packets and senders so hosts can be punished for bad… 
Source Accountability with Domain-brokered Privacy
This paper proposes an architecture that guarantees source accountability and privacy-preserving communication by enlisting ISPs as accountability agents and privacy brokers, and demonstrates that EphIDs can be generated and processed efficiently, and examines the practical considerations for deployment.
Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from Scratch
A dedicated quantitative analysis shows that the proposed PAVI achieves satisfactory levels of accountability and privacy, and the results of evaluation of a PAVI prototype show that it incurs little performance overhead, and is widely deployable.
PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet
A dedicated quantitative analysis shows that the proposed PAVI achieves satisfactory levels of accountability and privacy, and the results of the evaluation of a PAVI prototype show that it incurs little performance overhead, and is widely deployable.
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer
This work first shows that existing representative approaches mainly suffer from narrow-range accountability, low efficiency or risky key management, and proposes an efficient network layer protocol called APGS to balance the accountability and privacy.
Web Surfing in Anonymity Status
  • Vishnu Vardhanaan.S, S. M., A. J
  • Computer Science
    2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
  • 2019
The protocol in the paper allows the analysis of web data usage only by the interested parties (i.e. ISP) and the criminal abuses are greatly reduced and also supports the law enforcement by providing flexibility.
Network Transparency for Better Internet Security
TRIS enables the definition of misbehavior according to the unique requirements of hosts, and then it constructs verifiable evidence of mis Behavior, so that if misbehavior is detected, it can be proven to the ISPs of the communicating hosts.
A Flow-Level Architecture for Balancing Accountability and Privacy
  • Yuxiang Ma, Yulei Wu, Jingguo Ge, Jun Yu Li
  • Computer Science
    2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
  • 2018
A self-certifying identifier is proposed to efficiently identify a flow and a delegate-registry cooperation scheme and a multi-delegate mechanism are developed to ensure users' privacy.
Network-Layer Accountability Protocols: A Survey
A network-layer accountability framework is proposed and a taxonomy of network- layer accountability protocols according to accountability granularity is presented and compared and their pros and cons mainly from accountability function, deployability, and security are discussed.
Anonymous and analysable web browsing
A web access protocol that provides anonymity to the user, allows the web usage data to be analyzed by interested parties, and reduces the risk of abuse by criminal elements thereby allowing for flexibility in the enactment of laws that mandate collection of web usage information in support of law enforcement.


Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
This work suggests a middle-ground: enlisting ISPs to assist in improving the identity privacy of users in a manner compatible with the existing Internet architecture, ISP best practices, and potential legal requirements.
LAP: Lightweight Anonymity and Privacy
This paper proposes Lightweight Anonymity and Privacy (LAP), an efficient network-based solution featuring lightweight path establishment and stateless communication, by concealing an end-host's topological location to enhance anonymity against remote tracking.
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
This paper proposes a practical anonymous credential system that is based on the strong RSA assumption and the decisional Diffie-Hellman assumption modulo a safe prime product and is considerably superior to existing ones.
Tor instead of IP
This paper proposes to run Tor on top of IP instead of IP, and argues that the design achieves reasonable efficiency compared to today's Internet, and is consistent with ISP economic concerns.
A Contractual Anonymity System
The significant advantages of the system are that the service provider is not able to take any action toward a particular user unless she violates her contract, the system can enforce a variety of policies, and the system is efficient.
Accountability as a Service
This work designs a scheme for allowing accountability services, rather than connectivity-providing ISPs, to vouch for traffic, allowing victims to report abuse, filter abusive traffic, and isolate malicious senders.
Leveraging good intentions to reduce unwanted network traffic
A solution to reduce unwanted network traffic by enabling either side of a conversation to summarily terminate the conversation without the other end-point's cooperation, which prevents an endhost from blatantly disregarding requests to cease traffic generation.
SCION: Scalability, Control, and Isolation on Next-Generation Networks
This work presents the first Internet architecture designed to provide route control, failure isolation, and explicit trust information for end-to-end communications, and shows that SCION naturally prevents numerous attacks and provides a high level of resilience, scalability, control, and isolation.
Anonymous connections and onion routing
Anonymous connections and their implementation using onion routing are described and several application proxies for onion routing, as well as configurations of onion routing networks are described.
Untraceable electronic mail, return addresses, and digital pseudonyms
A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of