Skip to main content

Revocable Anonymity in Network Monitoring Systems

  • Conference paper
Computer Networks (CN 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 160))

Included in the following conference series:

  • 980 Accesses

Abstract

Ensuring subscriber’s privacy in a network security monitoring system is usually in the conflict with security and accountability controls that are imposed by the security policy. This balance between subscriber’s anonymity and visibility is often a dilemma for service providers and enterprises. This paper presents results of author’s research in the field of distributed network security monitoring architectures and the proposal of such a monitoring system that incorporates cryptographic protocols and a group signature scheme to deliver privacy protecting, network surveillance system architecture that provides subscriber’s accountability and controlled, revocable anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bianchi, G., Boschi, E., Kaklamani, D.I., Koutsoloukas, E.A., Lioudakis, G.V., Oppedisano, F., Petraschek, M., Ricciato, F., Schmoll, C.: Towards Privacy-Preserving Network Monitoring: Issues and Challenges. In: Personal, Indoor and Mobile Radio Communications, PIMRC 2007, pp. 1–5 (September 2007)

    Google Scholar 

  2. Xu, K., Zhang, Z.-L., Bhattacharyya, S.: Internet Traffic Behavior Profiling for Network Security Monitoring. IEEE/ACM 16(6), 1241–1252 (2008)

    Article  Google Scholar 

  3. Gogoulos, F., Antonakopoulou, A., Mousas, A.S., Lioudakis, G.V., Kaklamani, D.I., Venieris, I.S.: Privacy-Aware Passive Network Monitoring. In: Panhellenic Conference on Informatics, pp. 171–175. IEEE Computer Society, Los Alamitos (2009)

    Google Scholar 

  4. European Commission: Directive on protection of individuals with regard to the processing of personal data and on the free movement of such data (1995), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML

  5. Wooldridge, M., Jennings, N.R.: Intelligent agents: Theory and practice. The Knowledge Engineering Review 10(2), 115–152 (1995)

    Article  Google Scholar 

  6. Jennings, N.R., Sycara, K., Wooldridge, M.: A roadmap of agent research and development. Autonomous Agents and Multi-Agent Systems 1(1), 7–38 (1998)

    Article  Google Scholar 

  7. Nguyen, N. Ganzha, M., Paprzycki, M.: A Consensus-Based Multi-agent Approach for Information Retrieval in Internet. In: International Conference on Computational Science, ICCS 2006, pp. 208–215 (2006), http://dx.doi.org/10.1007/11758532_29

  8. ITU-T Study Group 17: ITU-T Recommendation X.805. ITU-T (2003), http://www.itu.int/itudoc/itu-t/aap/sg17aap/history/x805/index.html

  9. Minsky, M.: Minsky’s frame system theory. In: Theoretical Issues in Natural Language Processing, TINLAP 1975. Association for Computational Linguistics, Morristown, USA, pp. 104–116, (1975)

    Google Scholar 

  10. Chatzikokolakis, K.: Probabilistic and Information-Theoretic Approaches to Anonymity. PhD thesis, pp. 35–36, Laboratoire d’Informatique (LIX), École Polytechnique, Paris (October 2007), http://www.lix.polytechnique.fr/~kostas/thesis.pdf

  11. Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology v0.33 (April 2010), http://dud.inf.tu-dresden.de/Anon_Terminology.shtml

  12. Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: The case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136–153. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Groth, J.: Fully anonymous group signatures without random oracles. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 164–180. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Bellare, M., Duan, S.: New Definitions and Designs for Anonymous Signatures. In: Cryptology ePrint Archive, Report 2009/336 (2009), http://eprint.iacr.org/

  15. Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 372–386. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Ateniese, G., Camenisch, J., Hohenberger, S., de Medeiros, B.: Practical Group Signatures without Random Oracles. In: Cryptology ePrint Archive, Report 2005/385 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Baniak, K. (2011). Revocable Anonymity in Network Monitoring Systems. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2011. Communications in Computer and Information Science, vol 160. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21771-5_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21771-5_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21770-8

  • Online ISBN: 978-3-642-21771-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics