Auflistung nach Schlagwort "anonymity"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- TextdokumentHow to apply Database Anonymity Notions to Mix Networks(INFORMATIK 2021, 2021) Roßberger, Marc; Aksoy, Alperen; Kesdoğan, DoğanCommunication networks are an indispensable part of our society. By observing network traffic, one can acquire sensitive information about individuals, businesses, or governments. Thus, the protection of this traffic data is important and a well-researched topic. While encryption can protect the content of these messages, it can not hide the link between communication partners. Mix networks can be used to achieve this anonymity goal. However, these networks can not guarantee anonymity since they only apply technical protocols to improve anonymity. On the contrary, one can guarantee anonymity when releasing information from databases. Here, the principles of k-anonymity, l-diversity, and t-closeness can be applied to determine anonymity. In this work, we transfer these principles towards network anonymity, highlight problems that occur, and give an outlook on how a protocol could look like, with which users can build anonymity groups to guarantee anonymity.
- ZeitschriftenartikelResource allocation in peer-to-peer networks(Wirtschaftsinformatik: Vol. 45, No. 3, 2003) Grothoff, ChristianResource allocation in peer-to-peer networks — An excess-based economic model This paper describes economic aspects of GNUnet, a peer-to-peer framework for anonymous distributed file-sharing. GNUnet is decentralized; all nodes are equal peers. In particular, there are no trusted entities in the network. This paper describes an economic model to perform resource allocation and defend against malicious participants in this context. The approach presented does not use credentials or payments; rather, it is based on trust. The design is much like that of a cooperative game in which peers take the role of players. Nodes must cooperate to achieve individual goals. In such a scenario, it is important to be able to distinguish between nodes exhibiting friendly behavior and those exhibiting malicious behavior. GNUnet aims to provide anonymity for its users. Its design makes it hard to link a transaction to the node where it originated from. While anonymity requirements make a global view of the end-points of a transaction infeasible, the local link-to-link messages can be fully authenticated. Our economic model is based entirely on this local view of the network and takes only local decisions.