How to apply Database Anonymity Notions to Mix Networks
dc.contributor.author | Roßberger, Marc | |
dc.contributor.author | Aksoy, Alperen | |
dc.contributor.author | Kesdoğan, Doğan | |
dc.date.accessioned | 2021-12-14T10:57:42Z | |
dc.date.available | 2021-12-14T10:57:42Z | |
dc.date.issued | 2021 | |
dc.description.abstract | Communication networks are an indispensable part of our society. By observing network traffic, one can acquire sensitive information about individuals, businesses, or governments. Thus, the protection of this traffic data is important and a well-researched topic. While encryption can protect the content of these messages, it can not hide the link between communication partners. Mix networks can be used to achieve this anonymity goal. However, these networks can not guarantee anonymity since they only apply technical protocols to improve anonymity. On the contrary, one can guarantee anonymity when releasing information from databases. Here, the principles of k-anonymity, l-diversity, and t-closeness can be applied to determine anonymity. In this work, we transfer these principles towards network anonymity, highlight problems that occur, and give an outlook on how a protocol could look like, with which users can build anonymity groups to guarantee anonymity. | en |
dc.identifier.doi | 10.18420/informatik2021-069 | |
dc.identifier.isbn | 978-3-88579-708-1 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/37736 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik, Bonn | |
dc.relation.ispartof | INFORMATIK 2021 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-314 | |
dc.subject | anonymity | |
dc.subject | mix networks | |
dc.subject | data privacy | |
dc.title | How to apply Database Anonymity Notions to Mix Networks | en |
gi.citation.endPage | 818 | |
gi.citation.startPage | 807 | |
gi.conference.date | 27. September - 1. Oktober 2021 | |
gi.conference.location | Berlin | |
gi.conference.sessiontitle | Workshop: Security, Datenschutz und Anonymisierung |
Dateien
Originalbündel
1 - 1 von 1