A Survey on Measuring Anonymity in Anonymous Communication Systems

被引:6
|
作者
Lu, Tianbo [1 ,2 ]
Du, Zeyu [1 ,2 ]
Wang, Z. Jane [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Software Engn, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Trustworthy Distributed Comp & Serv, Beijing 100876, Peoples R China
[3] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Anonymous systems; formalization; metrics; information theory; UNIVERSAL RE-ENCRYPTION; LOCATION PRIVACY; K-ANONYMITY; AUTHENTICATION PROTOCOL; PROBABILISTIC ANONYMITY; INFORMATION; MIXES; FORMALIZATION; ATTACKS; DESIGN;
D O I
10.1109/ACCESS.2019.2919322
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularity of Internet applications has made communication privacy an increasingly important security requirement. As an important aspect of privacy, anonymity ensures that a subject may use resources or services without disclosing user identity or corresponding relationships. Since the seminal work by Chaum for anonymous communication, many different anonymous communication systems, and anonymous protocols have been developed and investigated extensively. In recent years, anonymous communication systems have evolved from academic tools used by specialists to mass-market software used by millions of ordinary people. How to evaluate and quantify the anonymity that different anonymous communication systems can offer has been a new focus. Though some efforts have been made on anonymity metrics and measuring techniques, systematic research on measuring anonymity of anonymous communication systems is still needed. In this paper, we give a comprehensive overview of state-of-the-art research on measuring anonymity. We first summarize the anonymous mechanisms applied by different anonymous systems. We then introduce the formalization of the notion of anonymity for measuring the anonymity degree. Further, metrics based on various theories and approaches are reviewed. We particularly elaborate on the metrics based on information theory as a separate section because of its popularity and multiple branches. The metrics based on information entropy is probably of the greatest interest.
引用
收藏
页码:70584 / 70609
页数:26
相关论文
共 50 条
  • [41] A survey on anonymous voice over IP communication: attacks and defenses
    Zhang, Ge
    Fischer-Hubner, Simone
    ELECTRONIC COMMERCE RESEARCH, 2019, 19 (03) : 655 - 687
  • [42] A Survey on Hidden Service Location Technologies in Anonymous Communication System
    Zhao N.
    Su J.-S.
    Zhao B.-K.
    Han B.
    Zou H.-C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (02): : 393 - 411
  • [43] ACADEMICS ANONYMOUS: A MEDITATION ON ANONYMITY, POWER, AND POWERLESSNESS
    Warhol-Down, Robyn
    SYMPLOKE, 2008, 16 (1-2) : 51 - 59
  • [44] A survey on anonymous voice over IP communication: attacks and defenses
    Ge Zhang
    Simone Fischer-Hübner
    Electronic Commerce Research, 2019, 19 : 655 - 687
  • [45] Quantifying and Measuring Anonymity
    Murdoch, Steven J.
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 3 - 13
  • [46] Towards measuring anonymity
    Díaz, C
    Seys, S
    Claessens, J
    Preneel, B
    PRIVACY ENHANCING TECHNOLOGIES, PROCEEDINGS, 2003, 2482 : 54 - 68
  • [47] Voluntary identification in an anonymous mail survey Which personal characteristics and attributes suggest a willingness to forgo anonymity?
    Reuband, Karl-Heinz
    MONATSSCHRIFT FUR KRIMINOLOGIE UND STRAFRECHTSREFORM, 2011, 94 (01): : 17 - 33
  • [48] Anonymous mechanisms in group decision support systems communication
    Gavish, B
    Gerdes, JH
    DECISION SUPPORT SYSTEMS, 1998, 23 (04) : 297 - 328
  • [49] Ant Colonies for Efficient and Anonymous Group Communication Systems
    Grube, Tim
    Hauke, Sascha
    Daubert, Joerg
    Muehlhaeuser, Max
    2017 INTERNATIONAL CONFERENCE ON NETWORKED SYSTEMS (NETSYS), 2017,
  • [50] Evaluating the effectiveness of anonymity communication systems against malicious insiders
    Liao, Gen-Yih
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 1838 - 1844