Abstract
Ensuring subscriber’s privacy in a network security monitoring system is usually in the conflict with security and accountability controls that are imposed by the security policy. This balance between subscriber’s anonymity and visibility is often a dilemma for service providers and enterprises. This paper presents results of author’s research in the field of distributed network security monitoring architectures and the proposal of such a monitoring system that incorporates cryptographic protocols and a group signature scheme to deliver privacy protecting, network surveillance system architecture that provides subscriber’s accountability and controlled, revocable anonymity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bianchi, G., Boschi, E., Kaklamani, D.I., Koutsoloukas, E.A., Lioudakis, G.V., Oppedisano, F., Petraschek, M., Ricciato, F., Schmoll, C.: Towards Privacy-Preserving Network Monitoring: Issues and Challenges. In: Personal, Indoor and Mobile Radio Communications, PIMRC 2007, pp. 1–5 (September 2007)
Xu, K., Zhang, Z.-L., Bhattacharyya, S.: Internet Traffic Behavior Profiling for Network Security Monitoring. IEEE/ACM 16(6), 1241–1252 (2008)
Gogoulos, F., Antonakopoulou, A., Mousas, A.S., Lioudakis, G.V., Kaklamani, D.I., Venieris, I.S.: Privacy-Aware Passive Network Monitoring. In: Panhellenic Conference on Informatics, pp. 171–175. IEEE Computer Society, Los Alamitos (2009)
European Commission: Directive on protection of individuals with regard to the processing of personal data and on the free movement of such data (1995), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML
Wooldridge, M., Jennings, N.R.: Intelligent agents: Theory and practice. The Knowledge Engineering Review 10(2), 115–152 (1995)
Jennings, N.R., Sycara, K., Wooldridge, M.: A roadmap of agent research and development. Autonomous Agents and Multi-Agent Systems 1(1), 7–38 (1998)
Nguyen, N. Ganzha, M., Paprzycki, M.: A Consensus-Based Multi-agent Approach for Information Retrieval in Internet. In: International Conference on Computational Science, ICCS 2006, pp. 208–215 (2006), http://dx.doi.org/10.1007/11758532_29
ITU-T Study Group 17: ITU-T Recommendation X.805. ITU-T (2003), http://www.itu.int/itudoc/itu-t/aap/sg17aap/history/x805/index.html
Minsky, M.: Minsky’s frame system theory. In: Theoretical Issues in Natural Language Processing, TINLAP 1975. Association for Computational Linguistics, Morristown, USA, pp. 104–116, (1975)
Chatzikokolakis, K.: Probabilistic and Information-Theoretic Approaches to Anonymity. PhD thesis, pp. 35–36, Laboratoire d’Informatique (LIX), École Polytechnique, Paris (October 2007), http://www.lix.polytechnique.fr/~kostas/thesis.pdf
Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology v0.33 (April 2010), http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136–153. Springer, Heidelberg (2005)
Groth, J.: Fully anonymous group signatures without random oracles. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 164–180. Springer, Heidelberg (2007)
Bellare, M., Duan, S.: New Definitions and Designs for Anonymous Signatures. In: Cryptology ePrint Archive, Report 2009/336 (2009), http://eprint.iacr.org/
Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 372–386. Springer, Heidelberg (2004)
Ateniese, G., Camenisch, J., Hohenberger, S., de Medeiros, B.: Practical Group Signatures without Random Oracles. In: Cryptology ePrint Archive, Report 2005/385 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Baniak, K. (2011). Revocable Anonymity in Network Monitoring Systems. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2011. Communications in Computer and Information Science, vol 160. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21771-5_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-21771-5_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21770-8
Online ISBN: 978-3-642-21771-5
eBook Packages: Computer ScienceComputer Science (R0)