Privacy and forensics investigation process: The ERPINA protocol

  • Authors:
  • Giannakis Antoniou;Leon Sterling;Stefanos Gritzalis;Parampalli Udaya

  • Affiliations:
  • Department of Computer Science and Software Engineering, The University of Melbourne, 111 Barry Street, Carlton, Victoria 3053, Australia;Department of Computer Science and Software Engineering, The University of Melbourne, 111 Barry Street, Carlton, Victoria 3053, Australia;Department of Information and Communication Systems Engineering, University of the Aegean, Samos, 83200 Greece;Department of Computer Science and Software Engineering, The University of Melbourne, 111 Barry Street, Carlton, Victoria 3053, Australia

  • Venue:
  • Computer Standards & Interfaces
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allows an honest user communicating anonymously with a Server through a PET, while the identity of a dishonest user is revealed. Prior research failed to distinguish objectively between an honest user and an attacker; and a reliable and objective distinguishing technique is lacking. The ERPINA protocol addresses the reliability issue efficiently by defining from the beginning of the communication what is considered as malicious and what is not.