Balancing accountability and privacy in the network
@article{Naylor2014BalancingAA, title={Balancing accountability and privacy in the network}, author={David Naylor and Matthew K. Mukerjee and Peter Steenkiste}, journal={ACM SIGCOMM Computer Communication Review}, year={2014}, volume={44}, pages={75 - 86} }
Though most would agree that accountability and privacy are both valuable, today's Internet provides little support for either. Previous efforts have explored ways to offer stronger guarantees for one of the two, typically at the expense of the other; indeed, at first glance accountability and privacy appear mutually exclusive. At the center of the tussle is the source address: in an accountable Internet, source addresses undeniably link packets and senders so hosts can be punished for bad…
Figures and Tables from this paper
36 Citations
Source Accountability with Domain-brokered Privacy
- Computer ScienceCoNEXT
- 2016
This paper proposes an architecture that guarantees source accountability and privacy-preserving communication by enlisting ISPs as accountability agents and privacy brokers, and demonstrates that EphIDs can be generated and processed efficiently, and examines the practical considerations for deployment.
Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from Scratch
- Computer ScienceIEEE INFOCOM 2019 - IEEE Conference on Computer Communications
- 2019
A dedicated quantitative analysis shows that the proposed PAVI achieves satisfactory levels of accountability and privacy, and the results of evaluation of a PAVI prototype show that it incurs little performance overhead, and is widely deployable.
APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks
- Computer ScienceInf. Sci.
- 2020
PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet
- Computer ScienceIEEE/ACM Transactions on Networking
- 2021
A dedicated quantitative analysis shows that the proposed PAVI achieves satisfactory levels of accountability and privacy, and the results of the evaluation of a PAVI prototype show that it incurs little performance overhead, and is widely deployable.
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer
- Computer ScienceIEEE Transactions on Information Forensics and Security
- 2021
This work first shows that existing representative approaches mainly suffer from narrow-range accountability, low efficiency or risky key management, and proposes an efficient network layer protocol called APGS to balance the accountability and privacy.
Web Surfing in Anonymity Status
- Computer Science2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
- 2019
The protocol in the paper allows the analysis of web data usage only by the interested parties (i.e. ISP) and the criminal abuses are greatly reduced and also supports the law enforcement by providing flexibility.
Network Transparency for Better Internet Security
- Computer ScienceIEEE/ACM Transactions on Networking
- 2019
TRIS enables the definition of misbehavior according to the unique requirements of hosts, and then it constructs verifiable evidence of mis Behavior, so that if misbehavior is detected, it can be proven to the ISPs of the communicating hosts.
A Flow-Level Architecture for Balancing Accountability and Privacy
- Computer Science2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
- 2018
A self-certifying identifier is proposed to efficiently identify a flow and a delegate-registry cooperation scheme and a multi-delegate mechanism are developed to ensure users' privacy.
Network-Layer Accountability Protocols: A Survey
- Computer ScienceIEEE Access
- 2018
A network-layer accountability framework is proposed and a taxonomy of network- layer accountability protocols according to accountability granularity is presented and compared and their pros and cons mainly from accountability function, deployability, and security are discussed.
Anonymous and analysable web browsing
- Computer Science2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)
- 2017
A web access protocol that provides anonymity to the user, allows the web usage data to be analyzed by interested parties, and reduces the risk of abuse by criminal elements thereby allowing for flexibility in the enactment of laws that mandate collection of web usage information in support of law enforcement.
References
SHOWING 1-10 OF 44 REFERENCES
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
- Computer Science, BusinessPrivacy Enhancing Technologies
- 2009
This work suggests a middle-ground: enlisting ISPs to assist in improving the identity privacy of users in a manner compatible with the existing Internet architecture, ISP best practices, and potential legal requirements.
LAP: Lightweight Anonymity and Privacy
- Computer Science2012 IEEE Symposium on Security and Privacy
- 2012
This paper proposes Lightweight Anonymity and Privacy (LAP), an efficient network-based solution featuring lightweight path establishment and stateless communication, by concealing an end-host's topological location to enhance anonymity against remote tracking.
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2001
This paper proposes a practical anonymous credential system that is based on the strong RSA assumption and the decisional Diffie-Hellman assumption modulo a safe prime product and is considerably superior to existing ones.
Tor instead of IP
- Computer ScienceHotNets-X
- 2011
This paper proposes to run Tor on top of IP instead of IP, and argues that the design achieves reasonable efficiency compared to today's Internet, and is consistent with ISP economic concerns.
A Contractual Anonymity System
- Computer Science
- 2010
The significant advantages of the system are that the service provider is not able to take any action toward a particular user unless she violates her contract, the system can enforce a variety of policies, and the system is efficient.
Accountability as a Service
- Computer ScienceSRUTI
- 2007
This work designs a scheme for allowing accountability services, rather than connectivity-providing ISPs, to vouch for traffic, allowing victims to report abuse, filter abusive traffic, and isolate malicious senders.
Leveraging good intentions to reduce unwanted network traffic
- Computer Science
- 2006
A solution to reduce unwanted network traffic by enabling either side of a conversation to summarily terminate the conversation without the other end-point's cooperation, which prevents an endhost from blatantly disregarding requests to cease traffic generation.
SCION: Scalability, Control, and Isolation on Next-Generation Networks
- Computer Science2011 IEEE Symposium on Security and Privacy
- 2011
This work presents the first Internet architecture designed to provide route control, failure isolation, and explicit trust information for end-to-end communications, and shows that SCION naturally prevents numerous attacks and provides a high level of resilience, scalability, control, and isolation.
Anonymous connections and onion routing
- Computer ScienceIEEE J. Sel. Areas Commun.
- 1998
Anonymous connections and their implementation using onion routing are described and several application proxies for onion routing, as well as configurations of onion routing networks are described.
Untraceable electronic mail, return addresses, and digital pseudonyms
- Computer ScienceCACM
- 1981
A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of…