252 Hits in 3.5 sec

Pisces: Anonymous Communication Using Social Networks [article]

Prateek Mittal, Matthew Wright, Nikita Borisov
2012 arXiv   pre-print
In this paper, we propose Pisces, a decentralized protocol for anonymous communications that leverages users' social links to build circuits for onion routing.  ...  In Pisces, we discover peers by using random walks in the social network graph with a bias away from highly connected nodes to prevent a few nodes from dominating the circuit creation process.  ...  Finally, using real world social network topologies, we show that Pisces provides significantly higher anonymity than existing approaches.  ... 
arXiv:1208.6326v1 fatcat:p3vugpynjbc5resjeixc6vhpbe

The transatlantic introduction of weakfish Cynoscion regalis (Bloch & Schneider, 1801) (Sciaenidae, Pisces) into Europe

Pedro Morais, Maria Teodósio
2016 BioInvasions Records  
Moreover, they are not used in European aquaculture facilities, nor in the aquarium trade.  ...  We also thank three anonymous reviewers, CW Martin and JM Hanson for their suggestions on how to improve the initial versions of this paper.  ...  Acknowledgements We thank A Fernandes and J Estica for giving us the first specimen of weakfish collected in the Guadiana estuary and J Babaluk for proof-reading the paper.  ... 
doi:10.3391/bir.2016.5.4.11 fatcat:vgxxirsxyrbvhaesnmcz6fkcm4

SGor: Trust graph based onion routing

Peng Zhou, Xiapu Luo, Ang Chen, Rocky K.C. Chang
2013 Computer Networks  
We evaluate SGor with simulation-based experiments using several real-world social trust datasets.  ...  The experimental results confirm that SGor can mitigate key limitations in the use of trust for protecting anonymity but introduces only a few overheads.  ...  For example, if we derive a trust graph from an online social network and apply it to SGor, the members of this online social network can use SGor to protect their anonymity when they visit Internet services  ... 
doi:10.1016/j.comnet.2013.08.005 fatcat:xg4skkurqbaw5iphds5ebnkw2i


Yushan Liu, Shouling Ji, Prateek Mittal
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We experimentally demonstrate the applicability of adaptive random walks on a number of social network based security and privacy systems, including Sybil defenses, anonymous communication and link privacy  ...  Currently, the design of such social security mechanisms is limited to the classical paradigm of using fixed-length random walks for all nodes on a social graph.  ...  The Pisces protocol [34] is a low-latency anonymity system that leverages social links.  ... 
doi:10.1145/2976749.2978319 dblp:conf/ccs/LiuJM16 fatcat:gumslqzrxzalpgq7mfp4cadbju

On Privacy and Anonymity in Freenet System

Tianbo Lu, Zhimin Lin, Lingling Zhao, Yang Li
2016 International Journal of Security and Its Applications  
So it's widely used in different fields.  ...  As a typical representative of anonymous network applications, Freenet system has so many advantages in sharing, privacy, anonymity as well as uploading and downloading convenience that it adequately realizes  ...  Natural Science Found ation of China under Grant No.61170273; 2010 Information Security Program of China N ational Development and Reform Commission with the title "Testing Usability and Securi ty of Network  ... 
doi:10.14257/ijsia.2016.10.5.04 fatcat:k6uwi5x52jho3otlc6bowdnmum

LinkMirage: How to Anonymize Links in Dynamic Social Systems [article]

Changhchang Liu, Prateek Mittal
2016 arXiv   pre-print
First, we propose LinkMirage, a community detection based algorithm for anonymizing links in social network topologies; LinkMirage preserves community structures in the social topology while anonymizing  ...  Social network based trust relationships present a critical foundation for designing trustworthy systems, such as Sybil defenses, secure routing, and anonymous/censorshipresilient communications.  ...  For instance, Tor operators [11] (or other anonymous communication network such as Pisces in [30] ) can leverage the perturbed social relationships to set up the anonymous circuit; 2) Local access to  ... 
arXiv:1501.01361v2 fatcat:dgztft5hjnh6lds4hkwq5m3sma

To Be or Not to Be: Social Justice in Networked Learning

2019 Education Sciences  
This article aims to expand the current understandings of social justice in networked learning practices by challenging the ways in which online subjectivities are conceptualised in communal settings.  ...  justice are to be made in networked learning.  ...  In this sense, social absence is not an attempt to refashion anonymity with a new outlook.  ... 
doi:10.3390/educsci9040261 fatcat:2je2oy4mezbdtf6zirxhos3cbu

VirtualFriendship: Hiding interactions on Online Social Networks

Filipe Beato, Mauro Conti, Bart Preneel, Dario Vettore
2014 2014 IEEE Conference on Communications and Network Security  
The enormous popularity of Online Social Networks (OSNs) dramatically changed the way people communicate and interact with each other.  ...  In fact, OSN providers can directly access a big amount of information about users and infer further information when using data mining techniques (e.g., about the on line interactions among two users)  ...  Usually, anonymous networks, such as Tor [19] , are used as the solution to hide identity of the communication and achieve anonymity.  ... 
doi:10.1109/cns.2014.6997501 dblp:conf/cns/BeatoCPV14 fatcat:t7c3bnu2hbaexobjwnqtxgbfki

Privacy Information Security Classification for Internet of Things Based on Internet Data

Xiaofeng Lu, Zhaowei Qu, Qi Li, Pan Hui
2015 International Journal of Distributed Sensor Networks  
This paper focuses on studying the attributes of the privacy and proposes privacy information security classification (PISC) model.  ...  The privacy is classified into four security classifications by PISC, and each classification has its security goal, respectively.  ...  Related Work Facebook is the largest social network website, where people can share their photos and personal information. In Facebook, a photo can be set in different privacy levels [15] .  ... 
doi:10.1155/2015/932941 fatcat:ihrpzfcd5fdgbpsdzpzswccvpi

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin
2017 Proceedings on Privacy Enhancing Technologies  
A number of systems implement social-based communication to resist Sybil attacks. For instance Drac [44] and Pisces [108] use social-networks to support routing of messages.  ...  Systems may use the underlying social trust structure to build overlay privacy-friendly social network services, as surveyed by Paul et al. [120] .  ... 
doi:10.1515/popets-2017-0056 dblp:journals/popets/TroncosoIDH17 fatcat:uole5gkxeravhful25scijakpa

Big Data and Knowledge Extraction for Cyber-Physical Systems

Xiuzhen Cheng, Yunchuan Sun, Antonio Jara, Houbing Song, Yingjie Tian
2015 International Journal of Distributed Sensor Networks  
It is also an honor for us to serve as the Guest Editors of this issue. Xiuzhen Cheng Yunchuan Sun Antonio Jara Houbing Song Yingjie Tian  ...  We are indebted to the journal editors and all anonymous reviewers for their hard work that helps the authors further enhance the quality of the manuscripts.  ...  as vehicles are required to adjust their communication ranges according to the network density in order to avert the interference among them.  ... 
doi:10.1155/2015/231527 fatcat:qsobptejnfbrteagyzr2xkebea

Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management

Esther Palomar, Álvaro Galán, Almudena Alcaide, Lorena González-Manzano
2016 IET Information Security  
Online social network (OSN) users are exhibiting an increased privacyprotective behaviour specially since multimedia sharing has emerged as a popular activity over most OSN sites.  ...  User attributes are then used as predicate values.  ...  Furthermore, system called Gossple in [17] associates every OSN user with a set of anonymous acquaintances who share common interests, whereas Pisces presented in [18] anonymizes communications, most  ... 
doi:10.1049/iet-ifs.2014.0466 fatcat:y7sbuolyrjgd5gedti5sgtkqxm

Data Sharing in DHT Based P2P Systems [chapter]

Claudia Roncancio, María del Pilar Villamil, Cyril Labbé, Patricia Serrano-Alvarado
2009 Lecture Notes in Computer Science  
P2P systems are the chosen platform for new style of applications where distributed data can be shared massively e.g., social networks [62], geo-collaboration systems [42], professional communities (medical  ...  Introduction Peer-to-peer (P2P) systems take advantage of advances in networking and communication for providing environments where heterogeneous peers with high autonomy compose a system with a fully  ...  They use a self-organizing overlay network on top of the physical network.  ... 
doi:10.1007/978-3-642-03722-1_13 fatcat:xpziojr4wvd3dkev5jj4a4id4a

Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

Yaoqi Jia, Guangdong Bai, Prateek Saxena, Zhenkai Liang
2016 Proceedings on Privacy Enhancing Technologies  
Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users.  ...  To alleviate this, we propose an anonymous peer-assisted CDN (APAC), which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request) and responder anonymity  ...  R-252-000-560-112 and the National Science Foundation of US under Grant No. CNS-1318872. All opinions expressed in this work are solely those of the authors.  ... 
doi:10.1515/popets-2016-0041 dblp:journals/popets/JiaBSL16 fatcat:7npzlglfw5dylecsb5w6nke3ia

Big Data and Individual Privacy in the Age of the Internet of Things

Mackenzie Adams
2017 Technology Innovation Management Review  
Out of the cave, the tribal teepee, the pueblo, the community fortress, man emerged to build himself a house of his own with a shelter in it for himself and his diversions. Every age has seen it so.  ...  Given the wide use of social media and networking sites, it was inevitable that a large data breach would occur.  ...  Big data may expose a person's behavioural patterns (websites visited, pages clicked, etc.) on their social networking site.  ... 
doi:10.22215/timreview1067 fatcat:rwzuftbvafc6pjppvhjt56b6gu
« Previous Showing results 1 — 15 out of 252 results