Degrees of anonymity in today's computing environments: decomposing complex processes for anonymity analysis

  • Authors:
  • Claire Vishik;Giusella Finocchiaro

  • Affiliations:
  • Intel;University of Bologna

  • Venue:
  • Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Frequently, we analyze anonymity based on incomplete data, taking into consideration only one part of an electronic process. New models of usage involve multiple devices with varying levels of support for security (and anonymity) operating on heterogeneous networks and it is increasingly necessary to analyze anonymity in complex processes rather than one static situation. Although anonymity of data has been subject of numerous studies, there is little research yet focusing on the graduation of anonymity in complex electronic processes. This short paper identifies the issue of varying degrees of anonymity as an emerging area of research and outlines basic strategies for analyzing anonymity from the user's point of view, in environments with multiple and diverse interconnected nodes and devices and in complex processes. Rather than focus on the detailed analysis, we use the scenarios in the paper as examples to illustrate the need to decompose today's complex processes in order to assess the variability in levels or security and anonymity and make the necessary conclusions.