• Keine Ergebnisse gefunden

Anonymization for web, fixed line, and mobile applications

N/A
N/A
Protected

Academic year: 2022

Aktie "Anonymization for web, fixed line, and mobile applications"

Copied!
16
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Anonymization for web, fixed line, and mobile applications

Prof. Dr. Hannes Federrath

University of Regensburg · Information Systems · Management of Information security

(2)

Anonymization for web, fixed line, and mobile applications

• Basic concepts

– Who is the observer?

– Protection ideas

• Fixed line

– Unobservability and anonymity of communication relations

• Mobile communications

– Protection of communication relations – Unobservability of locations

• Internet/Web

• Conclusions

(3)

Who is the observer?

• Protection goals — confidentiality

– Protection of the identity of a user while using a service

Anonymity in counseling services

– Protection of the communication relations of users

Users may know identity of each other

• Outsiders

– … tapping the «line»

– … doing traffic analysis

• Insiders

– Network operator (or corrupt staff) reading e.g. billing data – Governmental organizations asking for log files

Anonymity is a prerequisite for identity management.

(4)

Protection ideas (selection)

• Against outsider attacks

– Encryption — does not protect from traffic analysis – Use a mediator:

PROXY

Users need to trust the proxy

proxy knows all communication relations

Browser

FROM myPC

GET Server.com/page.html FROM Proxy

GET Server.com/page.html

Server

Proxy

adversary

(5)

Protection ideas (selection)

• Against insider attacks – Goal:

Users need not trust the operator of anonymizing service – Idea:

Use more than one mediator from different operators

At least one operator must be trustworthy – Examples:

Broadcast

Blind message service

DC network

MIX network

(6)

DC network (Chaum, 1988)

Everybody

1. Flip a coin with each other 2. Calculate xor of the two bits 3. If paid xor a 1 (negate the

result of step 2) 4. Tell your result

Together

1. Calculate xor of the three (local) results

2. If global result is Zero an external person has paid

1 1

0

0 1

1 1

1

0 0

(7)

MIX 1 MIX 2

Mixes (David Chaum, 1981)

• Basic idea:

– Sample messages in a batch, change their coding and forward them all at the same point oftime but in a different order. All messages have the same length.

– Use more than one Mix, operated by different operators.

– At least one Mix should not be corrupt.

• Then:

– Perfect unlinkability of sender and recipient.

(8)

Fixed line

• Idea

– Based on MIX networks – Pfitzmann et. al. 1989

– All users served by a switching center communicate via a MIX cascade in front of the switch

Trunk network

users MIX switch

cascade

(9)

ImpAdr

send routing information {VLR, P}

{LAI, ImpAdr}

P

HLR

{VLR, P}

P:

VLR

{LAI, ImpAdr}

MIX

cascade

MIX cascade

Mobile communications

• Protection of

locations (network operator cannot track users)

• Need additional MIX cascades

• Small changes in protocols

(10)

Internet/Web

• Technical background

– MIX based unobservable transport system – Should withstand strong (big brother) attacks

• Information service (impossible to operate a perfect Anon system) – Current level of protection (Anonymity level)

– Trade-off between performance and protection should be decided by the user

• Open source project

– Client software: Java (platform independent) – Server software: C/C++ (Win/NT, Linux/Unix)

• Technical and jurisdictional knowledge to serve legal issues

(11)

Internet/Web

• JAP acts as a local

proxy on the local machine

(12)

• For free at

www.anon-online.de

• First test version has been launched in October 2000

• Full service has been running since February 2001

• Could be extended to a

identity management system for the Internet

Internet/Web

(13)

Häufigkeitsgruppen (1=sproradic, 2=normal, 3=heavy)

3,00 2,00

1,00

Anzahl

600

500

400

300

200

100

0

paygroup (0=nichts;

wollen nichts zahlen

€ 2,5 - € 5

€ 5 - € 15

Public survey

• Willingness to pay for anonymity – ≈ 40% absolutely not

– ≈ 50% monthly service fee of about € 2,5 … € 5 – ≈ 10% more than € 5 per month

• Sample size:

– 1800 users of the JAP anonymizer

• Spiekermann 2003

(14)

Public survey

• Reasons for using an anonymizing service – ≈ 31% Free speech

– ≈ 54% protect from secret services – ≈ 85% protect from profiling

– ≈ 64% protect against observation by my ISP

• Do you use it for private or business?

– ≈ 2% private only

– ≈ 59% mainly for private things – ≈ 30% mainly for business things – ≈ 9% business only

• Why do you use the JAP system?

– ≈ 76% free of charge

– ≈ 56% secure against the operator – ≈ 51% easy to use

Nutzung von JAP

privat 2%

eher privat 59%

eher geschäftlich

30%

geschäftlich 9%

(15)

Conclusions

• Economical

– There is a market for identity protection.

– Users are willing to pay for it.

• Technical

– Anonymity on the network is necessary as a basic technology for providing true identity management.

– Prototypes exist at least for Internet/Web

Prof. Dr. Hannes Federrath

Lehrstuhl Management der Informationssicherheit Universität Regensburg

D-93040 Regensburg

E-Mail: hannes.federrath@wiwi.uni-regensburg.de WWW: http://www-sec.uni-regensburg.de

Telefon +49-941-943-2870 Telefax +49-941-943-2888

(16)

Management of information security

Information security management tries to protect the processes of organizations using information technology from intended attacks and accidental events.

• Our research topics

– IT Security in distributed systems and multilateral security – Privacy enhancing technologies

– Security on the Internet

– Digital Rights Management Systems – Security in electronic markets

– Security in mobile communication systems

• More information

– http://www-sec.uni-regensburg.de

Referenzen

ÄHNLICHE DOKUMENTE

Where the favorable tariff treatment only applies to certain products in a tariff position, you will have to declare the goods under the newly created

Keywords: web search results diversification, scalability and efficiency in web search, letor, feature selection, privacy prediction, social network analysis, social media

Aufgrund der zuvor erläuterten Entwicklungen und des daraus entstehenden Bedarfs wird im Rahmen dieser Arbeit der Frage nachgegangen, ob sich ein SIEM Ansatz zur Erkennung von

In dem Modul Python for Data Science eignen Sie sich eine Programmiersprache an, die nicht nur sehr schnell und einfach zu erlernen, sondern auch eine der popu- lärsten Sprachen

7 It should be noted that the research focus of the Applied Informatics group has changed towards robotics in recent years, and a considerable amount of research deals with

Applicants who have received external funds can apply for funding from the committee to cover any shortfall between the external funding allocated and the actual expenditures

– Extraktionsregel wird mit vorliegendem Satz abgeglichen – Bei Erfolg wird die relevante Information identifiziert. •

(2) Das Studienprogramm ist ein Angebot der Hochschule Wismar – University of Applied Sciences: Technology, Business and Design und wird organisatorisch von der Wismar