Is Privacy possible without Anonymity? The case for microblogging services

被引:1
作者
Papadopoulos, Panagiotis [1 ,4 ]
Papadogiannakis, Antonis [2 ,4 ]
Polychronakis, Michalis [3 ]
Markatos, Evangelos P. [4 ]
机构
[1] Brave Software, London, England
[2] ProtectWise, Denver, CO USA
[3] SUNY Stony Brook, Stony Brook, NY 11794 USA
[4] FORTH ICS, Iraklion, Greece
来源
PROCEEDINGS OF THE 12TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2019) | 2019年
关键词
Obfuscation; Anonymous Subscription; User Interests;
D O I
10.1145/3301417.3312498
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional approaches to privacy are usually based on top of anonymizing or pseudonymizing systems. For example, users who would like to protect their identity and/or hide their activities while browsing the web frequently use anonymizing systems (e.g., Tor) or services (e.g., VPNs and proxies). Although anonymizing systems are usually effective, recent revelations suggest that anonymization can be compromised and can be used to provide a false sense of security. In this paper we assume a world where anonymization is (practically) not possible. Imagine, for example, a community where the use of anonymizing systems is frowned upon or even forbidden. Is it possible for users to protect their privacy when they can not hide their identity? In this paper, we focus our question on users interested in following information channels in microblogging services and we show that it is possible for users to protect their privacy even if they can not hide their identity. To do so, we propose two obfuscation-based algorithms and quantify their effectiveness. We show that obfuscation can be used in such a way so that attackers can not use this service to increase their a priori knowledge on whether a user is interested in a channel or not.
引用
收藏
页数:6
相关论文
共 22 条
[1]   Detecting Hoaxes, Frauds, and Deception in Writing Style Online [J].
Afroz, Sadia ;
Brennan, Michael ;
Greenstadt, Rachel .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :461-475
[2]  
[Anonymous], 2009, Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society
[3]  
Balsa E., 2012, SP 12
[4]  
Dingledine R., SSYM 04
[5]   h(k)-private information retrieval from privacy-uncooperative queryable databases [J].
Domingo-Ferrer, Josep ;
Solanas, Agusti ;
Castella-Roca, Jordi .
ONLINE INFORMATION REVIEW, 2009, 33 (04) :720-+
[6]  
Elovici Y., 2005, INTERNET RES
[7]   Quantifying Web-Search Privacy [J].
Gervais, Arthur ;
Shokri, Reza ;
Singla, Adish ;
Capkun, Srdjan ;
Lenders, Vincent .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :966-977
[8]  
Goga O., 2013, TECHNICAL REPORT
[9]  
Gralla P., 2011, TRACKMENOT FIREFOX A
[10]  
King L., 2014, FACEBOOK WHATSAPP IN