Preventing Privacy-Invasive Software Using Collaborative Reputation Systems

نویسندگان

  • Martin Boldt
  • Bengt Carlsson
  • Tobias Larsson
  • Niklas Lindén
چکیده

Privacy-invasive software, loosely labeled spyware, is an increasingly common problem for today’s computer users, one to which there is no absolute cure. Most of the privacy-invasive software are positioned in a legal gray zone, as the user accepts the malicious behaviour when agreeing to the End User License Agreement. This paper proposes the use of a specialized reputation system to gather and share information regarding software behaviour between community users. A client application helps guide the user at the point of executing software on the local computer, displaying other users’ feedback about the expected behaviour of the software. We discuss important aspects to consider when constructing such a system, and propose possible solutions. Based on the observations made, we implemented a client/server based proof-of-concept tool, which allowed us to demonstrate how such a system would work. We also compare this solution to other, more conventional, protection methods such as anti-virus and anti-spyware software.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Invasive Software Exploring Effects and Countermeasures

As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for separating legitimate software from their unwanted counterparts. We use the term Privacy-Invasive Software (PIS) to refer to such illegitimate software, sometimes loosely labelled as spyware. In this thesis, we include an introduction to PIS, and how it differs from both legitimate and traditionall...

متن کامل

Privacy-Invasive Software

As computers are increasingly more integrated into our daily lives we become more dependent on software. This situation is exploited by villainous actors on the Internet that distribute malicious software in search for fast financial gains at the expense of deceived computer users. As a result, computer users need more accurate and aiding mechanisms to assist them when separating legitimate sof...

متن کامل

The "Transparent" Knowledge Worker and Locational Privacy

keywords: knowledge management locational data privacy organizational learning weblogs klogs reputation systems authenticity Jo Ann Oravec is an Associate Professor in the College of Business and Economics at the University of Wisconsin at Whitewater (USA). She received her MBA, MA, MS and PhD degrees from the University of Wisconsin at Madison. She taught computer information systems and publi...

متن کامل

A robust reputation-based location-privacy recommender system using opportunistic networks

Location-sharing services have grown in use commensurately with the increasing popularity of smart phones. As location data can be sensitive, it is important to preserve people’s privacy while using such services, and so location-privacy recommender systems have been proposed to help people configure their privacy settings. These recommenders collect and store people’s data in a centralised sys...

متن کامل

Privacy-Preserving Collaborative Filtering

Collaborative filtering (CF) techniques are becoming very popular on the Internet and are widely used in several domains to cope with information overload. E-commerce sites use filtering systems to recommend products to customers based on the preferences of like-minded customers, but their systems do not protect user privacy. Because users concerned about privacy may give false information, it ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007