Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Privacy-Enhanced WAP Browsing with mCrowds: Anonymity Properties and Performance Evaluation of the mCrowds System
Karlstad University, Division for Information Technology.
Karlstad University, Division for Information Technology. (Datavetenskap)
Karlstad University, Division for Information Technology. (Datavetenskap)ORCID iD: 0000-0002-6938-4466
2004 (English)Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
2004.
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-1950OAI: oai:DiVA.org:kau-1950DiVA, id: diva2:5137
Conference
The 4th Annual Information Security South Africa Conference (ISSA 2004)
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-06-04Bibliographically approved
In thesis
1. Design and Evaluation of Anonymity Solutions for Mobile Networks
Open this publication in new window or tab >>Design and Evaluation of Anonymity Solutions for Mobile Networks
2007 (English)Doctoral thesis, comprehensive summary (Other scientific)
Abstract [en]

Internet and mobile communications have had a profound effect on today's society. New services are constantly being deployed, in which personal data are being processed in return for personally tailored services. While mobile networks lay the groundwork for new innovative services, at the same time they pose numerous privacy challenges. There is the risk that honest citizens participating in mobile communications will have their privacy invaded for "the greater good". We argue that it is highly important that individuals are empowered to retain control over their personal spheres. Thus, the goal of this thesis is to design and evaluate anonymous overlay networks} adapted for mobile networks that allow users to control which information leaves their personal spheres in a mobile communication.

Technically, by using an anonymous overlay network, users can communicate with their communication partners without disclosing their network identities. In this thesis, we propose three different anonymous overlay networks tailored for mobile networks. First, two approaches are proposed for anonymous browsing on the mobile Internet, namely mCrowds and a Tor-based approach. By applying theoretical analysis and\,/\,or practical experiments, we show that these approaches offer an appropriate trade-off between the offered degree of anonymity and performance loss. Second, an anonymous overlay network for use in mobile ad hoc networks - Chameleon - is suggested.

Besides the actual design of these anonymous overlay networks, this thesis provides novel contributions in other essential areas of privacy protection and anonymous communication. First, also non-technical aspects of privacy protection are thoroughly discussed, including legal, social, and user interface aspects. Second, we survey existing metrics for quantifying anonymity and also propose new ideas regarding anonymity metrics. Third, we review and classify existing mechanisms for anonymous communication in mobile ad hoc networks. Lastly, we also propose a cryptographic technique for building up the user base of an anonymous overlay network in a secure and privacy-friendly manner.

Place, publisher, year, edition, pages
Fakulteten för ekonomi, kommunikation och IT, 2007
Series
Karlstad University Studies, ISSN 1403-8099 ; 2007:48
Keywords
privacy, anonymity, anonymous overlay networks, anonymity metrics, pseudonymity, identity management, mobile Internet, location based services, mobile ad hoc networks
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-1282 (URN)978-91-7063-152-8 (ISBN)
Public defence
2008-01-21, Sjöströmssalen, 1B 309, Karlstads universitet, Karlstad, 13:00
Opponent
Supervisors
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-01-12
2. Towards Measurable and Tunable Security
Open this publication in new window or tab >>Towards Measurable and Tunable Security
2007 (English)Licentiate thesis, comprehensive summary (Other scientific)
Abstract [en]

Many security services today only provides one security configuration at run-time, and cannot then utilize the trade-off between performance and security. In order to make use of this trade-off, tunable security services providing several security configurations that can be selected at run-time are needed. To be able to make intelligent choices on which security configuration to use for different situations we need to know how good they are, i.e., we need to order the different security configurations with respect to each security attribute using measures for both security and performance.

However, a key issue with computer security is that it is due to its complex nature hard to measure.

As the title of this thesis indicates, it discusses both security measures and tunable security services. Thus, it can be seen to consist of two parts. In the first part, discussing security measures for tunable security services, an investigation on the security implications of selective encryption by using guesswork as a security measure is made. Built on this an investigation of the relationship between guesswork and entropy. The result shows that guesswork,

after a minor redefinition, is equal to the sum of the entropy and the relative entropy.

The second part contributes to the area of tunable security services, e.g., services that provides several security configurations at run-time. In particular, we present the mobile Crowds (mCrowds) system,

an anonymity technology for the mobile Internet developed at Karlstad University, and a tunable encryption service, that is based on a selective encryption paradigm and designed as a middleware. Finally, an investigation of the tunable features provided by Mix-Nets and Crowds are done, using a conceptual model for tunable security services.

Place, publisher, year, edition, pages
Fakulteten för ekonomi, kommunikation och IT, 2007
Series
Karlstad University Studies, ISSN 1403-8099 ; 2007:39
Keywords
tunable security, security measures, metrics, entropy, guesswork, privacy, anonymity, selective encryption
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-1200 (URN)978-91-7063-142-9 (ISBN)
Presentation
2007-10-23, Sjöströmsalen, 1B 309, Karlstads universitet, Karlstad, 10:00
Opponent
Supervisors
Available from: 2007-10-09 Created: 2007-10-09 Last updated: 2018-01-12
3. Enhancing Privacy for Mobile Networks: Examples of Anonymity Solutions and Their Analysis
Open this publication in new window or tab >>Enhancing Privacy for Mobile Networks: Examples of Anonymity Solutions and Their Analysis
2005 (English)Licentiate thesis, comprehensive summary (Other scientific)
Abstract [en]

Internet and mobile communications have had a profound effect on today’s society. New services are constantly being deployed, in which an increasing amount of personal data is being processed in return for personally tailored services. Further, the use of electronic surveillance is increasing. There is the risk that honest citizens will have their privacy invaded for “the greater good”. We argue that it is of uttermost importance to retain the individuals’ control over their personal spheres.

One approach for enhancing the users’ privacy is to deploy technical measures for safeguarding privacy, so-called Privacy-Enhancing Technologies (PETs). This thesis examines a set of PETs for enabling anonymous communication, so-called anonymous overlay networks,which eliminate the processing of personal data altogether by allowing the users act anonymously when communicating in a networked environment.

This thesis focuses mainly on mobile networks. These are of great interest because on the one hand they lay the groundwork for new innovative applications, but on the other hand they pose numerous novel challenges to privacy. This thesis describes the implementation

and performance evaluation of mCrowds – an anonymous overlay network for mobile Internet that enables anonymous browsing. It also describes the ongoing investigation on how to design anonymous overlay networks in order to make them suitable for mobile ad hoc

networks, a required building block for ambient intelligence.

Place, publisher, year, edition, pages
Institutionen för informationsteknologi, 2005
Series
Karlstad University Studies, ISSN 1403-8099 ; 2005:53
Keywords
privacy, anonymity, pseudonymity, identity management, mobile Internet, location based services, mobile ad hoc networks
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-1560 (URN)91-7063-025-9 (ISBN)
Presentation
2005-12-16, Andersalen, 11D121, Karlstads universitet, Karlstad, 10:30
Opponent
Supervisors
Available from: 2008-03-28 Created: 2008-03-28 Last updated: 2018-01-12

Open Access in DiVA

No full text in DiVA

Authority records BETA

Andersson, ChristerLundin, ReineFischer-Hübner, Simone

Search in DiVA

By author/editor
Andersson, ChristerLundin, ReineFischer-Hübner, Simone
By organisation
Division for Information Technology
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 263 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf