On the Privacy and Security of Internet Communications: an Attempt to Fix Some of the Current Conceptual and Practical Issues
نویسندگان
چکیده
Today’s technical and legal landscape present formidable challenges to privacy. The disclosure of private data has become commonplace due to carelessness, theft or legal actions. Increasing reliance on network services causes sensitive data to be cached, copied, and archived by third parties, often without users’ knowledge or control. Cloud computing and ubiquitous computing are becoming an integral part of everyday life. The social consequences of this development are profound, and the technological challenges posed by these paradigms are complex and interesting. While the lack of privacy has, in principle, always characterized Internet communications, never before Internet communication has revealed so much about the personal tastes of its users. This is because never before Internet has contained so much personal user data. This thesis is divided into four parts. The first part introduces different aspects of privacy that are dealt in this thesis, detailing the current privacy and anonymity landscape. The second part of this dissertation focuses on theoretical aspects, introducing new cryptographic algorithms and providing a formal analysis of their security. More specifically it presents the first anonymous identity-based encryption scheme based on the quadratic residuosity problem, which can be used as an anonymous encryption tool or as the fundamental block for a keyword searchable encryption scheme. This thesis also introduce the first sender and receiver public key deniable encryption scheme, which allows communicating parties to deny the existence of an encrypted message even in presence of an adversary who can coerce them into giving up their secret information. The third part of this thesis analyzes several network-related aspects of anonymity and privacy, and provides practical solutions. First it introduces a new pseudonymous authentication and authorization systems, which solves several problems related to digital certificates. Then it focuses on cloud storage presenting DenFS, the first shared deniable file system. Finally it illustrates an anonymous peer-to-peer file sharing system based on network coding, for which it provides efficient strategy for packet verification. The last part concludes this work and discusses some of the open problems. To my wife Miharu, for teaching me every day what is really important in life Every man should know that his conversations, his correspondence, and his personal life are private. (Lyndon B. Johnson)
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملIdentifying and Ranking Ethical Issues of the Internet of Things in Medical Sciences using Stepwise Weight Assessment Ratio Analysis
Background and Objectives: The Internet of Things (IoT) refers to billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. The IoT has been widely applied to interconnect available medical resources and provide reliable, effective and smart healthcare service to the people. The social acceptance of IoT applications and services stron...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010