Abstract
Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhancing Technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered. This paper proposes a forensic investigation technique, which can be embedded in the framework of existing PETs , thereby adding network forensic functionality to the PET. This approach introduces a new dimension to the implementation of Privacy Enhancing Technologies, which enhances their viability in the global network environment.
Chapter PDF
Similar content being viewed by others
References
Pfitzmann, A.: Anonymity, Unlinkability, Unobservability, Pseudonymity and Identity Management - A Consolidated Proposal for Terminology (2005)
http://www.ntia.doc.gov/ntiahome/ntiageneral/esign/105b/esign7.htm
Blythe, S.E.: Digital Signature Law of the United Nations, European Union, United Kingdom and United Stats: Promotion of Growth in E-Commerce with Enhanced Security, 11 RICH. J.L. & TECH. 2 (2005), at: http://law.richmond.edu/jolt/v11i2/article6.pdf
http://europa.eu.int/eur-lex/pri/en/oj/dat/2000/l_013/l_01320000119en00120020.pdf
Gritzalis, S.: Enhancing Web Privacy and Anonymity in the Digital Era. Information Management and Computer Security 12(3), 255–288 (2004)
Anonymizer (2003), available at: http://www.anonymizer.com
Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security (TISSEC) 1(1), 66–92 (1998)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security, Symposium (August 2004)
Shields, C., Levine, B.N.: A Protocol for Anonymous Communication Over the Internet. In: Proceedings of the 7th ACM conference on Computer and communications security (November 2000)
Golle, P., Juels, A.: Parallel Mixing. In: Proceedings of the 11th ACM conference on Computer and communications security (October 2004)
Möller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol, Version 2. Draft (July 2003), available at: http://www.abditum.com/mixmaster-spec.txt
Rennhard, M., Plattner, B.: Practical anonymity for the masses with morphMix. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 233–250. Springer, Heidelberg (2004)
Acquisti, A.: Privacy in Electronic Commerce and the Economics of Immediate Gratification (2005)
Brown, P.W.: Digital signatures: can they be accepted as legal signatures in EDI? In: Proceedings of the 1st ACM conference on Computer and communications security (December 1993)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2006 IFIP International Federation for Information Processing
About this paper
Cite this paper
Antoniou, G., Wilson, C., Geneiatakis, D. (2006). PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies. In: Leitold, H., Markatos, E.P. (eds) Communications and Multimedia Security. CMS 2006. Lecture Notes in Computer Science, vol 4237. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11909033_17
Download citation
DOI: https://doi.org/10.1007/11909033_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47820-1
Online ISBN: 978-3-540-47823-2
eBook Packages: Computer ScienceComputer Science (R0)