Skip to main content

Towards Privacy-Preserving Web Metering via User-Centric Hardware

  • Conference paper
  • First Online:
Book cover International Conference on Security and Privacy in Communication Networks (SecureComm 2014)

Abstract

Privacy is a major issue today as more and more users are connecting and participating in the Internet. This paper discusses privacy issues associated with web metering schemes and explores the dilemma of convincing interested parties of the merits of web metering results with sufficient detail, and still preserving users’ privacy. We propose a web metering scheme utilising user-centric hardware to provide web metering evidence in an enhanced privacy-preserving manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    at National Center for Digital Certification (NCDC): Research & Development. www.ncdc.gov.sa.

References

  1. Google analytics blog. Official weblog offering news, tips and resources related to google’s web traffic analytics service. analytics.blogspot.com

  2. Atterer, R., Wnuk, M., Schmidt, A.: Knowing the user’s every move: user activity tracking for website usability evaluation and implicit interaction. In: WWW 2006: Proceedings of the 15th International Conference on World Wide Web, pp. 203–212. ACM, New York (2006)

    Google Scholar 

  3. Barwick, S.G., Jackson, W.-A., Martin, K.M.: A general approach to robust web metering. Des. Codes Crypt. 36(1), 5–27 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  4. Bergadano, F., De Mauro, P.: Third party certification of HTTP service access statistics (Position Paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 95–99. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  5. Blundo, C., Bonis, A.D., Masucci, B.: Bounds and constructions for metering schemes. Commun. Inf. Syst. 2, 1–28 (2002)

    MathSciNet  MATH  Google Scholar 

  6. Blundo, C., Martn, S., Masucci, B., Padr, C.: A linear algebraic approach to metering schemes. Cryptology ePrint Archive, Report 2001/087 (2001)

    Google Scholar 

  7. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM, New York (2004)

    Google Scholar 

  8. Camenisch, J.L., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61–76. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Chen, L., Mao, W.: An auditable metering scheme for web advertisement applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 475–485. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inf. Theory 46(3), 893–910 (2000)

    Article  MATH  Google Scholar 

  11. Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J., Schunter, M., Stampley, D.A., Wenning, R.: The platform for privacy preferences. W3C Recommendation, November 2006

    Google Scholar 

  12. Dent, A.W., Mitchell, C.J.: User’s Guide to Cryptography and Standards. Artech House Computer Security. Artech House Inc., Norwood (2004)

    MATH  Google Scholar 

  13. Dolev, D., Yao, A.C.: On the security of public key protocols. Technical report, Stanford, CA, USA (1981)

    Google Scholar 

  14. Franklin, M.K., Malkhi, D.: Auditable metering with lightweight security. J. Comput. Secur. 6(4), 237–256 (1998)

    Article  Google Scholar 

  15. Harn, H., Lin, L.: A non-repudiation metering scheme. IEEE Commun. Lett. 37(5), 486–487 (2001)

    Article  Google Scholar 

  16. International Organization for Standardization: ISO 11889–1:2009. Information technology - Trusted Platform Module - Part 1: Overview, May 2009

    Google Scholar 

  17. International Organization for Standardization: ISO 7498–2:1989. Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture (1989)

    Google Scholar 

  18. Jakobsson, M., MacKenzie, P.D., Stern, J.P.: Secure and lightweight advertising on the web. Comput. Netw. 31(11–16), 1101–1109 (1999)

    Article  Google Scholar 

  19. Laih, C.-S., Fu, C.-J., Kuo, W.-C.: Design a secure and practical metering scheme. In: International Conference on Internet Computing, pp. 443–447 (2006)

    Google Scholar 

  20. Naor, M., Pinkas, B.: Secure and efficient metering. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 576–590. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  21. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  22. Roesner, F., Kohno, T., Wetherall, D.: Detecting and defending against third-party tracking on the web. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI 2012, p. 12. USENIX Association, Berkeley (2012)

    Google Scholar 

  23. Schnorr, C.-P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)

    Google Scholar 

  24. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  25. Wang, R.-C., Juang, W.-S., Lei, C.-L.: A web metering scheme for fair advertisement transactions. Int. J. Secure. Appl. 2(4), 453–456 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fahad Alarifi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Alarifi, F., Fernández, M. (2015). Towards Privacy-Preserving Web Metering via User-Centric Hardware. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 153. Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23802-9_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23801-2

  • Online ISBN: 978-3-319-23802-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics