Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D....

7
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin

Transcript of Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D....

Page 1: Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.

Lecture 13:Anonymity on the Web

Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin

Page 2: Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.

User privacy – the problem • private information is processed and stored extensively by

various individuals and organizations– location of user telecom operators– financial situation of user banks, tax authorities– wealth of user insurance companies– shopping information of user credit card companies, retailers (via

usage of fidelity cards)– illnesses of user medical institutions– …

• complete and meaningful profiles on people can be created and abused

• information technology makes this easier– no compartmentalization of information– cost of storage and processing (data mining) decreases technology is

available to everyone

2

Page 3: Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.

User privacy – the goal• private data should be protected from abuse by

unauthorized entities– transactional data

• access/usage logs at telecom operators, buildings, parking, public transport, …

– data that reveals personal interests• video rentals, credit card purchases, click stream data

(WWW), …

– data that was disclosed for a well-defined purpose• tax data revealed to tax authorities, health related data

revealed to doctors, address information revealed in mail orders, …

3

Page 4: Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.

User privacy – existing approaches• data avoidance

– “I don’t tell you, so you can’t abuse it.”– effective but not always applicable– often requires anonymity– examples: cash transactions, public phones

• data protection– “If ever you abuse it, you will be punished.”– well-established approach– difficult to define, enforce, and control– requires legislation or voluntary restrictions

• multilateral security– cooperation of more than two parties – shared responsibilities and partial knowledge

• combinations of the above

4

Page 5: Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.

Anonymous Communication Concepts

• What do we want to hide?– sender anonymity

• attacker cannot determine who the sender of a particular message is– receiver anonymity

• attacker cannot determine who the intended receiver of a particular message is

– unlinkability• attacker may determine senders and receivers but not the associations

between them (attacker doesn’t know who communicates with whom)

• From whom do we want to hide this?– communication partner (sender anonymity)– external attackers

• local eavesdropper (sniffing on a particular link (e.g., LAN))• global eavesdropper (observing traffic in the whole network)

– internal attackers• (colluding) compromised system elements (e.g., routers)

5

Page 6: Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.

Degrees of anonymity

• beyond suspicion: – attacker can see evidence of a sent message, but– the sender appears no more likely to be the originator than any other

potential sender in the system• probable innocence:

– the sender may be more likely the originator than any other potential sender, but

– the sender appears no more likely to be the originator than to not be the originator

• possible innocence:– the sender appears more likely to be the originator than to not be the

originator, but– there’s still a non-trivial probability that the originator is someone else

6

absoluteprivacy

beyondsuspicion

probableinnocence

possibleinnocence

exposed provablyexposed

Page 7: Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.

Types of attackers

• local eavesdropper– can observe communication to and from the users

computer

• collaborating crowd members– crowd members that can pool their information

and deviate from the protocol

• end server– the web server to which the transaction is

directed

7