Data Retention and Anonymity Services - Introducing a New Class of Realistic Adversary Models
نویسندگان
چکیده
The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.
منابع مشابه
Anonymity and Historical-Anonymity in Location-Based Services
The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving ...
متن کاملSource Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as F...
متن کاملInternet Banking Law: An Iranian Perspective Problems and Prospects of Introducing Islamic Microfinance in Azerbaijan Republic
Bank supervision and monetary policy are strategic concepts in the economy of countries. Development of electronic communications, especially in online and international spheres, has largely threatened financial services in view of security and illegal access to banking networks. Anonymity and identity theft has endangered electronic commerce by crimes like phishing, fraud and different types...
متن کاملProbabilistic Anonymity and Admissible Schedulers
When studying safety properties of (formal) protocol models, it is customary to view the scheduler as an adversary: an entity trying to falsify the safety property. We show that in the context of security protocols, and in particular of anonymizing protocols, this gives the adversary too much power; for instance, the contents of encrypted messages and internal computations by the parties should...
متن کاملPreserving Anonymity in Location-based Services When Requests from the Same Issuer May Be Correlated
This paper investigates privacy issues in Location-Based Services (LBS) under the assumption that the adversary may be able to understand that a sequence of (anonymous) requests have been issued by the same user. A formal framework is presented to model this kind of privacy attack under two different assumptions in terms of the adversary’s knowledge about the users’ actual locations. Defense te...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008