Provable Network Activity for Protecting Users Against False Accusation

被引:0
|
作者
Papadopoulos, Panagiotis [1 ]
Athanasopoulos, Elias [2 ]
Kosta, Eleni [4 ]
Siganos, George [3 ]
Keromytis, Angelos D. [5 ]
Markatos, Evangelos P. [1 ]
机构
[1] FORTH, Inst Comp Sci, Iraklion, Greece
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] HBKU, Qatar Comp Res Inst, Doha, Qatar
[4] Tilburg Univ, Tilburg Law Sch, Tilburg, Netherlands
[5] Columbia Univ, New York, NY USA
关键词
D O I
10.1007/978-3-319-45931-8_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of the World Wide Web, data traces that correspond to users' network activity can be collected by several Internet actors, including (i) web sites, (ii) smartphone apps, and even (iii) Internet Service Providers. Given that the collection and storage of these data are beyond the control of the end user, these data traces can be easily manipulated, if not, tampered with. The result of such manipulated digital traces can be severe: Innocent users can be shamed or even wrongfully accused of carrying out illegal transactions. To eliminate these potential accusations on innocent users, we introduce Provable Network Activity (PNA): a framework with which the ISPs can give the end users control of their stored traces. The framework guarantees that the information collected for the end users is accurate and will remain accurate for as long as it is stored. Our implementation and preliminary evaluation suggest that PNA is fast, easy to deploy, and introduces zero network latency to the end clients.
引用
收藏
页码:254 / 261
页数:8
相关论文
共 50 条
  • [1] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    COMPUTER JOURNAL, 2006, 49 (05): : 554 - 561
  • [2] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    Computer Journal, 2006, 49 (05): : 554 - 561
  • [3] The Influence of False Accusation against the Party Cadres in the Process of Anti-corruption
    Wu, Zu-yu
    2ND INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND SYSTEMS ENGINEERING (EMSE 2017), 2017, : 308 - 312
  • [4] Protecting Users' Identity Against Browser Fingerprinting
    Shingote, Prem
    Ayala-Rivera, Vanessa
    Portillo-Dominguez, A. Omar
    2023 11TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION, CONISOFT 2023, 2023, : 150 - 158
  • [5] Protecting users against phishing attacks with AntiPhish
    Kirda, E
    Kruegel, C
    Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005, : 517 - 524
  • [6] Protecting the users against gnss service interruption
    Navigation (Paris), 46 (182):
  • [7] Application of PKC-Based Digital Watermarking Model against False-accusation
    Yu Da-peng
    Song Hang
    2008 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS, VOLS 1-6, 2008, : 2736 - +
  • [8] The Threat of Spoofing Protecting Against False Navigation Data
    Orr, Xavier
    SEA TECHNOLOGY, 2024, 65 (05)
  • [9] Protecting network users in mobile code systems
    Shieh, SP
    Yang, WH
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2004, 64 (02) : 191 - 200
  • [10] FALSE ACCUSATION AND MISLEADING JUDICIAL AUTHORITIES - 2 BASES OF CRIMES AND OFFENCES AGAINST THE SWISS JUDICIAL SYSTEM
    FAES, J
    KRIMINALISTIK, 1981, (10): : 421 - 427