The ubiquitous proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote service providers over mobile network operators which are assumed to be trusted and not improperly use or disclose users' information. In this paper, we remove this assumption, offering privacy protection of users' requests again the prying eyes of the network operators, which we consider to be honest but curious. Furthermore, to prevent abuse of the communication privacy we provide, we elevate traffic accountability as a primary design requirement. We build on prior work on network k-anonymity and multi-path communications to provide communications' anonymity in a mobile environment. The resulting system protects users' privacy while maintaining data integrity and accountability. To verify the effectiveness of our approach and measure its overhead, we implemented a prototype of our system using WiFi-enabled devices. Our preliminary results indicate that the overall impact on the end-to-end latency is negligible, thus ensuring applicability of our solution to protect the privacy of real-time services including video streaming and voice activated services.

A multi-path approach for k-anonymity in mobile hybrid networks / C.A. Ardagna, A. Stavrou, S. Jajodia, P. Samarati, R. Martin - In: PILBA '08 : privacy in location-based applications : workshop co-located with ESORICS 2008 : Malaga, Spain, october 9, 2008 : proceedings / [a cura di] C. Bettini [et al.]. - Aachen : null, 2008. - pp. 82-101 (( Intervento presentato al 1. convegno International Workshop on Privacy in Location-Based Applications (PILBA) tenutosi a Malaga nel 2008.

A multi-path approach for k-anonymity in mobile hybrid networks

C.A. Ardagna
Primo
;
P. Samarati
Penultimo
;
2008

Abstract

The ubiquitous proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote service providers over mobile network operators which are assumed to be trusted and not improperly use or disclose users' information. In this paper, we remove this assumption, offering privacy protection of users' requests again the prying eyes of the network operators, which we consider to be honest but curious. Furthermore, to prevent abuse of the communication privacy we provide, we elevate traffic accountability as a primary design requirement. We build on prior work on network k-anonymity and multi-path communications to provide communications' anonymity in a mobile environment. The resulting system protects users' privacy while maintaining data integrity and accountability. To verify the effectiveness of our approach and measure its overhead, we implemented a prototype of our system using WiFi-enabled devices. Our preliminary results indicate that the overall impact on the end-to-end latency is negligible, thus ensuring applicability of our solution to protect the privacy of real-time services including video streaming and voice activated services.
Settore INF/01 - Informatica
2008
http://sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-397/
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
ProceedingsPiLBA08.pdf

accesso aperto

Tipologia: Publisher's version/PDF
Dimensione 5.68 MB
Formato Adobe PDF
5.68 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/52786
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact