Provable Network Activity for Protecting Users Against False Accusation

被引:0
|
作者
Papadopoulos, Panagiotis [1 ]
Athanasopoulos, Elias [2 ]
Kosta, Eleni [4 ]
Siganos, George [3 ]
Keromytis, Angelos D. [5 ]
Markatos, Evangelos P. [1 ]
机构
[1] FORTH, Inst Comp Sci, Iraklion, Greece
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] HBKU, Qatar Comp Res Inst, Doha, Qatar
[4] Tilburg Univ, Tilburg Law Sch, Tilburg, Netherlands
[5] Columbia Univ, New York, NY USA
关键词
D O I
10.1007/978-3-319-45931-8_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of the World Wide Web, data traces that correspond to users' network activity can be collected by several Internet actors, including (i) web sites, (ii) smartphone apps, and even (iii) Internet Service Providers. Given that the collection and storage of these data are beyond the control of the end user, these data traces can be easily manipulated, if not, tampered with. The result of such manipulated digital traces can be severe: Innocent users can be shamed or even wrongfully accused of carrying out illegal transactions. To eliminate these potential accusations on innocent users, we introduce Provable Network Activity (PNA): a framework with which the ISPs can give the end users control of their stored traces. The framework guarantees that the information collected for the end users is accurate and will remain accurate for as long as it is stored. Our implementation and preliminary evaluation suggest that PNA is fast, easy to deploy, and introduces zero network latency to the end clients.
引用
收藏
页码:254 / 261
页数:8
相关论文
共 50 条
  • [21] Protecting a multicast session against single link failures in a mesh network
    Singhal, NK
    Sahasrabuddhe, LH
    Mukherjee, B
    2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 1504 - 1508
  • [22] PROTECTING PACKETS AGAINST MALICIOUS NODES IN MOBILE AD HOC NETWORK
    Devi
    Jayakumar
    IIOAB JOURNAL, 2016, 7 (09) : 64 - 68
  • [23] Slowing Down to Speed Up: Protecting Users Against Massive Attacks in Content Distribution Systems
    Santos, Flavio Roberto
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [24] Defending reputation system against false recommendation in mobile Ad Hoc network
    Wang, Fei
    Mo, Yijun
    Huang, Benxiong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 488 - 493
  • [25] Recommending activity to users via deep graph neural network
    Wei X.-H.
    Sun B.-Y.
    Cui J.-X.
    1600, Editorial Board of Jilin University (51): : 278 - 284
  • [26] A Network-Based Rating Mechanism Against False-Name Attack
    Lian, Xinyuan
    Zhao, Dengji
    AI 2021: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, 13151 : 216 - 227
  • [27] Measurement fusion method against false-target jamming for radar network
    Zhao, S.-S., 1600, Univ. of Electronic Science and Technology of China (43):
  • [28] False Data Attacks Against AC State Estimation With Incomplete Network Information
    Liu, Xuan
    Li, Zuyi
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) : 2239 - 2248
  • [29] ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering Attacks
    Halder, Dipal
    Merugu, Maneesh
    Ray, Sandip
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2023, 22 (05)
  • [30] Survivable Cloud Network Design Against Multiple Failures Through Protecting Spanning Trees
    Zhou, Zhili
    Lin, Tachun
    Thulasiraman, Krishnaiyan
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2017, 35 (02) : 288 - 298