Generating a privacy footprint on the internet
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Privacy diffusion on the web: a longitudinal perspective
Proceedings of the 18th international conference on World wide web
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Proceedings of the ACM SIGCOMM 2010 conference
How unique is your web browser?
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
An analysis of private browsing modes in modern browsers
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
SSLShader: cheap SSL acceleration with commodity processors
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Detecting and defending against third-party tracking on the web
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
LAP: Lightweight Anonymity and Privacy
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
Privacy-preserving social plugins
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Functional privacy or why cookies are better with milk
HotSec'12 Proceedings of the 7th USENIX conference on Hot Topics in Security
Understanding what they do with what they know
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Detecting price and search discrimination on the internet
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
SP '13 Proceedings of the 2013 IEEE Symposium on Security and Privacy
Hang with your buddies to resist intersection attacks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
As personal information increases in value, the incentives for remote services to collect as much of it as possible increase as well. In the current Internet, the default assumption is that all behavior can be correlated using a variety of identifying information, not the least of which is a user's IP address. Tools like Tor, Privoxy, and even NATs, are located at the opposite end of the spectrum and prevent any behavior from being linked. Instead, our goal is to provide users with more control over linkability---which activites of the user can be correlated at the remote services---not necessarily more anonymity. We design a cross-layer architecture that provides users with a pseudonym abstraction. To the user, a pseudonym represents a set of activities that the user is fine with linking, and to the outside world, a pseudonym gives the illusion of a single machine. We provide this abstraction by associating each pseudonym with a unique, random address drawn from the IPv6 address space, which is large enough to provide each device with multiple globally-routable addresses. We have implemented and evaluated a prototype that is able to provide unlinkable pseudonyms within the Chrome web browser in order to demonstrate the feasibility, efficacy, and expressiveness of our approach.