Current and future privacy enhancing technologies for the internet

  title={Current and future privacy enhancing technologies for the internet},
  author={Yves Deswarte and Carlos Aguilar Melchor},
  journal={Annales Des T{\'e}l{\'e}communications},
This paper presents an overview of the current and next solutions for privacy protection on the Internet. We highlight five categories of Privacy Enhancing Technologies (Pets).First, we introduce the multiple virtual identities that can represent a person, and the way the person can manage them. Then, we focus on the untraceability problem, which has been a major field of research since the very first papers on privacy protection in the early eighties. Anonymous access to services will be the… 
Privacy by Design: A Matter of Choice
The goal of this chapter is to review this gap between a toolset of available technologies and the still unrealized promises of privacy by design.
Can Homomorphic Cryptography ensure Privacy
This work investigates how homomorph cryptography can enable privacy, by first giving a deep insight of the field of privacy in computer science and then presenting homomorphic cryptography and more specifically (fully) homomorphic encryption, aggregating the work done in this branch of cryptography in the last 30 years.
A Privacy-Enhanced Access Control Model
  • Fei Xu, Jingsha He, Xu Wu, Jing Xu
  • Computer Science
    2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
  • 2009
It is demonstrated that the privacy-enhanced access control model can better describe and support user requirements for protecting private information when access control is used for making access decisions to user information.
PETs in the Surveillance Society: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm
It is argued using perspectives from surveillance studies that the computer scientists’ conception of privacy through data or communication confidentiality is techno-centric and displaces end-user perspectives and needs in a surveillance society.
Privacy-sensitive Business Models: Barriers of Organizational Adoption of Privacy-Enhancing Technologies
This work reviews the literature on barriers of PET adoption to shed light on the unsolved question why organizations resist adopting PETs and reflects the state of research on the trade-off between creating value using data and information privacy.
Privacy by design: a formal framework for the analysis of architectural choices
This paper proposes a framework to express the parameters to be taken into account and an inference system to derive properties such as the possibility for an actor to detect potential errors (or frauds) in the computation of a variable.
Une architecture pour la protection étendue des données personnelles
This work proposes a new TC-based architecture, ensuring both a high level of trust and an absence of risk for the user, and suggests three criteria for evaluating whether a TC- based architecture is fruitful or threatening to the user.
Privacy policy preference (P3P) in e-commerce: Key for improvement
This study investigates the concept of a privacy policy and the role of a platform for privacy policy preference (P3P) in e-commerce and suggests some key improvements that should be included in privacy policy statements based on P3P.
Privacy by Design: From Technologies to Architectures - (Position Paper)
This paper advocates the idea that privacy by design should also be addressed at the architectural level and be associated with suitable methodologies, and believes that formal methods should play a key role in this area.
Hippocratic Multi-Agent Systems
This article proposes a model, ”Hippocratic Multi-Agent System” (HiMAS), which defines a set of principles bearing on an agency to preserve privacy, and chooses the concrete application of decentralized calendars management.


Towards accountable management of identity and privacy: sticky policies and enforceable tracing services
This document describes an innovative approach and related mechanisms to enforce users' privacy by putting users in control and making organizations more accountable that leverages identity-based encryption (IBE) and TCPA technologies.
Smartcard-based Anonymization
This analysis shows that the most important privacy needs can be met by using smartcards to carry out the critical part of the anonymizaton procedure, and the use of the smartcard seems be the most suitable means of keeping the secret.
Local anonymity in the internet
This two-part dissertation investigates techniques for protecting the identities of communication partners from worst-case adversaries such as the network infrastructure itself, including routers, switches, and hubs and introduces local anonymity as a new model of network anonymity that complements the protection afforded by existing network privacy schemes.
Direct anonymous attestation
DAA allows for pseudonyms, i.e., for each signature a user can decide whether or not the signature should be linkable to another signature, and is provably secure in the random oracle model under the strong RSA and the decisional Diffie-Hellman assumption.
Onion Routing for Anonymous and Private Internet Connections
In this article, the prototype network is processing more than 1 million Web connections per month from more than six thousand IP addresses in twenty countries and in all six main top level domains.
Hordes: a Multicast-Based Protocol for Anonymity
This work presents a protocol for initiator anonymity called Hordes, which uses forwarding mechanisms similar to those used in previous protocols for sending data, but is the first protocol to make use of multicast routing to anonymously receive data.
A peer-to-peer anonymizing network layer
This thesis proposes Tarzan, a peer-to-peer anonymous IP ne twork overlay that is fault-tolerant, highly sc alable, and easy to manage and quantifies Tarzan’s anonymity properties and shows that Tarzan imposes minimal performance overhead over a corresponding non-anonymous overlay route.
A new and efficient all-or-nothing disclosure of secrets protocol
A new protocol which achieves the same functionality, but which is much more efficient and can easily be implemented is presented, which involves a novel use of computational zero-knowledge techniques combined with semantic security.
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol
A new protocol which achieves the same functionality, but which is much more efficient and can easily be implemented and which is especially efficient when a large number of secrets is involved and it can be used in various applications.
Onion routing
Onion Routing operates by dynamically building anonymous connections within a network of real-time Chaum Onion Routing, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis.