The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfortunately, the research in this field can still be considered in its infancy. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a set of defense techniques is proposed. These techniques are validated through the use of a simulator and an extensive set of experiments.

Protecting Users' Anonymity in Pervasive Computing Environments / L. Pareschi, D. Riboni, C. Bettini - In: PerCom 2008 : Sixth Annual IEEE International Conference on Pervasive Computing and CommunicationsLos Alamitos : IEEE Computer Society, 2008. - ISBN 978-0-7695-3113-7. - pp. 11-19 (( Intervento presentato al 6. convegno Annual IEEE International Conference on Pervasive Computing and Communications tenutosi a Hong Kong nel 2008 [10.1109/PERCOM.2008.58].

Protecting Users' Anonymity in Pervasive Computing Environments

L. Pareschi
Primo
;
D. Riboni
Secondo
;
C. Bettini
Ultimo
2008

Abstract

The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfortunately, the research in this field can still be considered in its infancy. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a set of defense techniques is proposed. These techniques are validated through the use of a simulator and an extensive set of experiments.
Settore INF/01 - Informatica
2008
Book Part (author)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/36409
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 15
  • ???jsp.display-item.citation.isi??? 5
social impact