Can Pseudonymity Really Guarantee Privacy?

نویسندگان

  • Josyula R. Rao
  • Pankaj Rohatgi
چکیده

One of the core challenges facing the Internet today is the problem of ensuring privacy for its users. It is believed that mechanisms such as anonymity and pseudonymity are essential building blocks in formulating solutions to address these challenges and considerable eeort has been devoted towards realizing these primitives in practice. The focus of this eeort, however, has mostly been on hiding explicit identity information (such as source addresses) by employing a combination of anonymizing proxies, cryptographic techniques to distribute trust among them and traac shaping techniques to defeat traac analysis. We claim that such approaches ignore a signiicant amount of identifying information about the source that leaks from the contents of web traac itself. In this paper, we demonstrate the signiicance and value of such information by showing how techniques from linguistics and stylometry can use this information to compromise pseudonymity in several important settings. We discuss the severity of this problem and suggest possible countermeasures.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Real World Privacy Expectations in VANETs

Vehicular communication technology is nearing deployment in the market. We see initial plug tests in 2013 to confirm interoperability of multiple independent implementations. As the entrance into the market is coming closer it is time to consider the privacy expectations of the relevant standards. These expectations are built upon location privacy through unlinkable pseudonyms. In this paper we...

متن کامل

Thinking Outside the Box: Considering Transparency, Anonymity, and Pseudonymity as Overall Solutions to the Problems of Information Privacy in the Internet Society

Preamble . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1302 R I. Transparency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1305 R I.1. What Is Transparency? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130...

متن کامل

Autonomic Vehicular Networks: Safety, Privacy, Cybersecurity and Societal Issues

Safety, efficiency, privacy, and cybersecurity can be achieved jointly in self-organizing networks of communicating vehicles of various automated driving levels. The underlying approach, solutions and novel results are briefly exposed. We explain why we are faced with a crucial choice regarding motorized society and cyber surveillance. Keywords—vehicular networks, safety, privacy, cybersecurity...

متن کامل

Pseudonymity in the Light of Evidence-Based Trust

This position paper discusses the relation of privacy, namely pseudonymity, to evidence-based trust (or rather reputation). Critical concepts of evidence-based trust/reputation systems are outlined first, followed by an introduction to the four families of the Common Criteria (for security evaluation) Privacy Class: Unobservability, Anonymity, Unlinkability, and Pseudonymity. The paper then dis...

متن کامل

A Foundation for Requirements Analysis of Privacy Preserving Software

Privacy requirements are difficult to elicit for any given software engineering project that processes personal information. The problem is that these systems require personal data in order to achieve their functional requirements and privacy mechanisms that constrain the processing of personal information in such a way that the requirement still states a useful functionality. We present privac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000