Skip to main content
Top

2016 | OriginalPaper | Chapter

Anonymity in an Electronic Society: A Survey

Authors : Mauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini

Published in: Cyber Deception

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the wake of surveillance scandals in recent years, as well of the continuous deployment of more sophisticated censorship mechanisms, concerns over anonymity and privacy on the Internet are ever growing. In the last decades, researchers have designed and proposed several algorithms and solutions that allow interested parties to maintain anonymity online, even against powerful opponents. In this chapter, we present a survey of the classical anonymity schemes that proved to be most successful, describing how they work and their main shortcomings. Finally, we discuss new directions in Anonymous Communication Networks (ACN) taking advantage of today’s services, like On-Line Social Networks (OSN). OSN offer a vast pool of participants, allowing to effectively disguise traffic in the high volume of daily communications, thus offering high levels of anonymity and good resistance to analysis techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
9.
go back to reference C.A. Ardagna, M. Conti, M. Leone, and J. Stefa. An anonymous end-to-end communication protocol for mobile cloud environments. Services Computing, IEEE Transactions on, 7(3): 373–386, 2014.CrossRef C.A. Ardagna, M. Conti, M. Leone, and J. Stefa. An anonymous end-to-end communication protocol for mobile cloud environments. Services Computing, IEEE Transactions on, 7(3): 373–386, 2014.CrossRef
10.
go back to reference Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, and Angelos Stavrou. Providing users’ anonymity in mobile hybrid networks. ACM Trans. Internet Technol., 12(3):7:1–7:33, 2013. Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, and Angelos Stavrou. Providing users’ anonymity in mobile hybrid networks. ACM Trans. Internet Technol., 12(3):7:1–7:33, 2013.
11.
go back to reference Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, and Christopher Kruegel. Abusing social networks for automated user profiling. In Recent Advances in Intrusion Detection, volume 6307 of Lecture Notes in Computer Science, pages 422–441. 2010. Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, and Christopher Kruegel. Abusing social networks for automated user profiling. In Recent Advances in Intrusion Detection, volume 6307 of Lecture Notes in Computer Science, pages 422–441. 2010.
12.
go back to reference Ero Balsa, Carmela Troncoso, and Claudia Diaz. A metric to evaluate interaction obfuscation in online social networks. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 20(06):877–892, 2012.MathSciNetCrossRef Ero Balsa, Carmela Troncoso, and Claudia Diaz. A metric to evaluate interaction obfuscation in online social networks. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 20(06):877–892, 2012.MathSciNetCrossRef
13.
go back to reference F. Beato, M. Conti, and B. Preneel. Friend in the Middle (FiM): tackling de-anonymization in social networks. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 279–284, 2013. F. Beato, M. Conti, and B. Preneel. Friend in the Middle (FiM): tackling de-anonymization in social networks. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 279–284, 2013.
14.
go back to reference F. Beato, M. Conti, B. Preneel, and D. Vettore. Virtualfriendship: Hiding interactions on online social networks. In Communications and Network Security (CNS), 2014 IEEE Conference on, pages 328–336, 2014. F. Beato, M. Conti, B. Preneel, and D. Vettore. Virtualfriendship: Hiding interactions on online social networks. In Communications and Network Security (CNS), 2014 IEEE Conference on, pages 328–336, 2014.
15.
go back to reference Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW ’09, pages 551–560, 2009. Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW ’09, pages 551–560, 2009.
16.
go back to reference Joseph Bonneau, Jonathan Anderson, Ross Anderson, and Frank Stajano. Eight friends are enough: Social graph approximation via public listings. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS ’09, pages 13–18, New York, NY, USA, 2009. ACM. Joseph Bonneau, Jonathan Anderson, Ross Anderson, and Frank Stajano. Eight friends are enough: Social graph approximation via public listings. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS ’09, pages 13–18, New York, NY, USA, 2009. ACM.
17.
go back to reference Andrea Burattin, Giuseppe Cascavilla, and Mauro Conti. Socialspy: Browsing (supposedly) hidden information in online social networks. In Risks and Security of Internet and Systems, Lecture Notes in Computer Science, pages 83–99. 2015. Andrea Burattin, Giuseppe Cascavilla, and Mauro Conti. Socialspy: Browsing (supposedly) hidden information in online social networks. In Risks and Security of Internet and Systems, Lecture Notes in Computer Science, pages 83–99. 2015.
18.
go back to reference Jernigan. C. and B. F. T. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday Journal, 2009. Jernigan. C. and B. F. T. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday Journal, 2009.
19.
go back to reference G. Cascavilla, M. Conti,, D. Schwartz, and I. Yahav. Revealing censored information through comments and commenters in online social networks. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, 2015. G. Cascavilla, M. Conti,, D. Schwartz, and I. Yahav. Revealing censored information through comments and commenters in online social networks. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, 2015.
20.
go back to reference David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84–90, 1981.CrossRef David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84–90, 1981.CrossRef
21.
go back to reference Ian Clarke, Scott G. Miller, Theodore W. Hong, Oskar Sandberg, and Brandon Wiley. Protecting free expression online with Freenet. In IEEE Internet Computing, volume 6, pages 40–49, 2002. Ian Clarke, Scott G. Miller, Theodore W. Hong, Oskar Sandberg, and Brandon Wiley. Protecting free expression online with Freenet. In IEEE Internet Computing, volume 6, pages 40–49, 2002.
22.
go back to reference Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pages 46–66, 2001. Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pages 46–66, 2001.
23.
go back to reference Bernd Conrad and Fatemeh Shirazi. A survey on Tor and I2P. In Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP 2014), 2014. Bernd Conrad and Fatemeh Shirazi. A survey on Tor and I2P. In Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP 2014), 2014.
24.
go back to reference M. Conti, R. Poovendran, and M. Secchiero. Fakebook: Detecting fake profiles in on-line social networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on, pages 1071–1078, 2012. M. Conti, R. Poovendran, and M. Secchiero. Fakebook: Detecting fake profiles in on-line social networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on, pages 1071–1078, 2012.
25.
go back to reference Mauro Conti, Arbnor Hasani, and Bruno Crispo. Virtual private social networks. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY ’11, pages 39–50, 2011. Mauro Conti, Arbnor Hasani, and Bruno Crispo. Virtual private social networks. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY ’11, pages 39–50, 2011.
26.
go back to reference Mauro Conti, Arbnor Hasani, and Bruno Crispo. Virtual private social networks and a facebook implementation. ACM Trans. Web, 7(3):14:1–14:31, 2013. Mauro Conti, Arbnor Hasani, and Bruno Crispo. Virtual private social networks and a facebook implementation. ACM Trans. Web, 7(3):14:1–14:31, 2013.
27.
go back to reference George Danezis. The traffic analysis of continuous-time mixes. In Privacy Enhancing Technologies, Lecture Notes in Computer Science, pages 35–50. 2005. George Danezis. The traffic analysis of continuous-time mixes. In Privacy Enhancing Technologies, Lecture Notes in Computer Science, pages 35–50. 2005.
28.
go back to reference George Danezis, Claudia Diaz, Carmela Troncoso, and Ben Laurie. Drac: An architecture for anonymous low-volume communications. In Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS’10, pages 202–219, 2010. George Danezis, Claudia Diaz, Carmela Troncoso, and Ben Laurie. Drac: An architecture for anonymous low-volume communications. In Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS’10, pages 202–219, 2010.
29.
go back to reference Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM’04, pages 21–21, 2004. Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM’04, pages 21–21, 2004.
30.
go back to reference John R. Douceur. The sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS ’01, pages 251–260, 2002. John R. Douceur. The sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS ’01, pages 251–260, 2002.
31.
go back to reference Christoph Egger, Johannes Schlumberger, Christopher Kruegel, and Giovanni Vigna. Practical attacks against the i2p network. In Research in Attacks, Intrusions, and Defenses, Lecture Notes in Computer Science, pages 432–451. 2013. Christoph Egger, Johannes Schlumberger, Christopher Kruegel, and Giovanni Vigna. Practical attacks against the i2p network. In Research in Attacks, Intrusions, and Defenses, Lecture Notes in Computer Science, pages 432–451. 2013.
32.
go back to reference Nathan S. Evans, Roger Dingledine, and Christian Grothoff. A practical congestion attack on Tor using long paths. In Proceedings of the 18th Conference on USENIX Security Symposium, SSYM’09, pages 33–50, 2009. Nathan S. Evans, Roger Dingledine, and Christian Grothoff. A practical congestion attack on Tor using long paths. In Proceedings of the 18th Conference on USENIX Security Symposium, SSYM’09, pages 33–50, 2009.
33.
go back to reference Michael Herrmann and Christian Grothoff. Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using i2p. In Privacy Enhancing Technologies, pages 155–174. Springer Berlin Heidelberg, 2011. Michael Herrmann and Christian Grothoff. Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using i2p. In Privacy Enhancing Technologies, pages 155–174. Springer Berlin Heidelberg, 2011.
34.
go back to reference Lei Jin, Hassan Takabi, and James B.D. Joshi. Towards active detection of identity clone attacks on online social networks. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY ’11, pages 27–38, 2011. Lei Jin, Hassan Takabi, and James B.D. Joshi. Towards active detection of identity clone attacks on online social networks. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY ’11, pages 27–38, 2011.
35.
go back to reference Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users get routed: traffic correlation on Tor by realistic adversaries. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS ’13, pages 337–348, 2013. Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users get routed: traffic correlation on Tor by realistic adversaries. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS ’13, pages 337–348, 2013.
36.
go back to reference Dogan Kedogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity in open environments. In Revised Papers from the 5th International Workshop on Information Hiding, IH ’02, pages 53–69, 2003. Dogan Kedogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity in open environments. In Revised Papers from the 5th International Workshop on Information Hiding, IH ’02, pages 53–69, 2003.
37.
go back to reference G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295–300, 2011. G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295–300, 2011.
38.
go back to reference BrianN. Levine, MichaelK. Reiter, Chenxi Wang, and Matthew Wright. Timing attacks in low-latency mix systems. In Financial Cryptography, Lecture Notes in Computer Science, pages 251–265. 2004. BrianN. Levine, MichaelK. Reiter, Chenxi Wang, and Matthew Wright. Timing attacks in low-latency mix systems. In Financial Cryptography, Lecture Notes in Computer Science, pages 251–265. 2004.
39.
go back to reference P. Mittal, M. Wright, and N. Borisov. Pisces: Anonymous communication using social networks. NDSS, 2013. P. Mittal, M. Wright, and N. Borisov. Pisces: Anonymous communication using social networks. NDSS, 2013.
40.
go back to reference A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Security and Privacy, 2009 30th IEEE Symposium on, pages 173–187, 2009. A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Security and Privacy, 2009 30th IEEE Symposium on, pages 173–187, 2009.
42.
go back to reference Christopher Riederer, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, and Pablo Rodriguez. For sale: Your data: By: You. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets-X, pages 13:1–13:6, 2011. Christopher Riederer, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, and Pablo Rodriguez. For sale: Your data: By: You. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets-X, pages 13:1–13:6, 2011.
43.
go back to reference Stefanie Roos, Benjamin Schiller, Stefan Hacker, and Thorsten Strufe. Measuring freenet in the wild: Censorship-resilience under observation. In Privacy Enhancing Technologies, Lecture Notes in Computer Science, pages 263–282. 2014. Stefanie Roos, Benjamin Schiller, Stefan Hacker, and Thorsten Strufe. Measuring freenet in the wild: Censorship-resilience under observation. In Privacy Enhancing Technologies, Lecture Notes in Computer Science, pages 263–282. 2014.
45.
go back to reference Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P.N. Puttaswamy, and Ben Y. Zhao. User interactions in social networks and their implications. In Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys ’09, pages 205–218, 2009. Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P.N. Puttaswamy, and Ben Y. Zhao. User interactions in social networks and their implications. In Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys ’09, pages 205–218, 2009.
46.
go back to reference Bassam Zantout and Ramzi Haraty. I2p data communication system. In Proceedings of The Tenth International Conference on Networks, ICN 2011. Bassam Zantout and Ramzi Haraty. I2p data communication system. In Proceedings of The Tenth International Conference on Networks, ICN 2011.
47.
go back to reference Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of the 4th International Conference on Privacy Enhancing Technologies, PET’04, pages 207–225, 2005. Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of the 4th International Conference on Privacy Enhancing Technologies, PET’04, pages 207–225, 2005.
Metadata
Title
Anonymity in an Electronic Society: A Survey
Authors
Mauro Conti
Fabio De Gaspari
Luigi Vincenzo Mancini
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-32699-3_12

Premium Partner