Shadow attacks on users' anonymity in pervasive computing environments

被引:11
作者
Riboni, Daniele [1 ]
Pareschi, Linda [1 ]
Bettini, Claudio [1 ]
机构
[1] Univ Milan, DICo, Via Comel 39, I-20135 Milan, Italy
关键词
Privacy; Anonymity; Formal models of privacy threats; Context-awareness;
D O I
10.1016/j.pmcj.2008.04.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:819 / 835
页数:17
相关论文
共 21 条
[1]  
Aalto Lauri., 2004, INT C MOBILE SYSTEMS, P49, DOI DOI 10.1145/990064.990073
[2]  
[Anonymous], 2007, P IEEE INT C MOB DAT, DOI DOI 10.1109/MDM.2007.19
[3]  
[Anonymous], 2006, MERGERS ACQUISITIONS
[4]  
[Anonymous], 2005, P 6 MDM 05
[5]  
Arikawa Masatoshi., 2007, IEEE PERVAS COMPUT, V6, P21
[6]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[7]  
Bettini C, 2005, LECT NOTES COMPUT SC, V3674, P185
[8]  
Bettini C., 2007, HDB DATABASE SECURIT, P509
[9]   Anonymity and diversity in LBS: a preliminary investigation [J].
Bettini, Claudio ;
Jajodia, Sushil ;
Pareschi, Linda .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, :577-+
[10]  
Campbell R, 2003, LECT NOTES COMPUT SC, V2609, P1