Effectivity of Various Data Retention Schemes for Single-Hop Proxy Servers

نویسندگان

  • Dominik Herrmann
  • Rolf Wendolsky
چکیده

Recently, member states of the European Union have legislated new data retention policies. Anonymisation services and proxy servers undermine such data retention efforts, as they allow users tomasquerade their IP addresses. Providers of such services have to implement effective data retention mechanisms allowing for traceability while at the same time preserving users’ privacy as far as possible. In this paper we analyse the effectivity of four data retention schemes for single-hop proxy servers which use information already stored in logs today. We assess their effectivity by applying them to the historic logs of a mid-range proxy server. According to our evaluation it is insufficient to record data on session-level. Users can only be unambiguously identified with high probability if access time and source address of each request are stored together with the destination address. This result indicates that effective data retention based on currently available identifiers comes at a high cost for users’ privacy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Various Proxy Re-Encryption Schemes from Lattices

Proxy re-encryption (PRE) was introduced by Blaze, Bleumer and Strauss [Eurocrypt ’98]. Basically, PRE allows a semi-trusted proxy to transform a ciphertext encrypted under one key into an encryption of the same plaintext under another key, without revealing the underlying plaintext. Since then, many interesting applications have been explored, and many constructions in various settings have be...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

بهبود کارایی پروتکلSIP در شرایط اضافه بار با استفاده از قابلیت مبتنی بر پنجره

The extent and diversity of systems provided by IP networks have made various technologies to approach integrating various types of access networks and converting to next generation network. The Session Initiation Protocol (SIP) with respect to facilities such as being in text form, end-to-end connection, independence from the type of transmitted data, and supporting various forms of transmissi...

متن کامل

A Distributed Architecture of Edge Proxy Servers for Cooperative Transcoding

The large variety of devices that are gaining access to the Internet requires novel server functionalities to tailor Web content at run-time, namely transcoding. Traditional schemes assign transcoding operations to the Web server or single edge proxies. We propose an alternative architecture consisting of cooperative proxy servers which collaborate in discovering and transcoding multiple versio...

متن کامل

Proxy Ecology - Cooperative Proxies with Artificial Life

Proxy servers have been widely used by institutions to serve their clients behind firewalls. Recently many schemes have been proposed to organize the proxy servers into a cooperative proxy cache system. However most of existing proxy cache schemes require manual configuration of the cooperative proxies based on the network architecture. In this paper, we propose a novel P2P proxy caching scheme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009