53,442 Hits in 4.7 sec

Towards an Information Theoretic Metric for Anonymity [chapter]

Andrei Serjantov, George Danezis
2003 Lecture Notes in Computer Science  
We then propose an alternative information theoretic measure of anonymity which takes into account the probabilities of users sending and receiving the messages and show how to calculate it for a message  ...  In this paper we look closely at the popular metric of anonymity, the anonymity set, and point out a number of problems associated with it.  ...  We have also proposed an information-theoretic metric based on the idea of anonymity probability distributions.  ... 
doi:10.1007/3-540-36467-6_4 fatcat:6gsoqqyggbdhfjxooa2k34gecy

Information theoretic-based privacy risk evaluation for data anonymization

Anis Bkakria, Frédéric Cuppens, Nora Cuppens, Aimilia Tasidou
2022 Journal of Surveillance, Security and Safety  
We compare the proposed metric with existing information theoretic metrics and their ability to assess risk for various cases of dataset characteristics.  ...  Methods: In this paper, a new information theoretic-based privacy metric (ITPR) for assessing both the re-identification risk and sensitive information inference risk of datasets is proposed.  ...  Information theoretic risk metrics provide the ability to be applied to different anonymity systems [19] .  ... 
doi:10.20517/jsss.2020.20 fatcat:lbcxq5ktcjaobmrvojhcwp5otq

Discussing Anonymity Metrics for Mix Based Anonymity Approaches [chapter]

Dang Vinh Pham, Joss Wright
2009 IFIP Advances in Information and Communication Technology  
It is therefore important to find an appropriate measure for the anonymity provided by these approaches.  ...  Today the Chaumian Mix idea is not only an academic approach for anonymous communication, it is also a practical system with many variants used in real-world scenarios.  ...  Extensions of Information Theoretic Metrics There have been a number of attempts to extend the applicability of the basic information theoretic entropy-based metrics of anonymity.  ... 
doi:10.1007/978-3-642-05437-2_14 fatcat:qflvpjls3fcftonuvcdyztkphi

Optimizing the design parameters of threshold pool mixes for anonymity and delay

David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forné, Claudia Diaz
2014 Computer Networks  
Our extensive theoretical analysis finds the optimal mix parametrization and characterizes the optimal trade-off between the contrasting aspects of anonymity and delay, for two information-theoretic measures  ...  Experimental results show that mix optimization may lead to substantial delay reductions for a desirable level of anonymity.  ...  Acknowledgments We would like to thank the anonymous referees for their extremely valuable comments. This work was partly supported by the Spanish Government through projects  ... 
doi:10.1016/j.comnet.2014.04.007 fatcat:7fgnqqdionbwlljefng75hcrha

Quantifying and Measuring Anonymity [chapter]

Steven J. Murdoch
2014 Lecture Notes in Computer Science  
Rubin (1997) THE DISADVANTAGES OF FREE MIX ROUTES AND HOW TO OVERCOME THEM Oliver Berthold, Andreas Pfitzmann, Ronny Standtke (2001) TOWARDS AN INFORMATION THEORETIC METRIC FOR ANONYMITY Andrei Serjantov  ...  , Marit Hansen (first published 2000, last updated 2010) CROWDS: ANONYMITY FOR WEB TRANSACTIONS Michael K.  ... 
doi:10.1007/978-3-642-54568-9_1 fatcat:wysuej74jrctbpoayufcguhjwy

The Role of Information Theory in the Field of Big Data Privacy

Mariam Haroutunian, Institute for Informatics and Automation Problems of NAS RA, Karen Mastoyan, Gavar State University
2021 Mathematical Problems of Computer Science  
The first approach towards privacy assurance was the anonymity method. However, recent research indicated that simply anonymized data sets can be easily attacked.  ...  In the current article an overview of state-of-the-art methods from Information Theory to ensure privacy are provided.  ...  An information -theoretic metric based on the idea of anonymity probability distributions is introduced.  ... 
doi:10.51408/1963-0071 fatcat:yzx5delxvbgjfd2zrw7pee44iy

Toward an analytical approach to anonymous wireless networking

Parv Venkitasubramaniam, Ting He, Lang Tong, Stephen Wicker
2008 IEEE Communications Magazine  
AN INFORMATION THEORETIC MEASURE OF ANONYMITY The first step toward an analytical model for this problem is to define a quantifiable measure of anonymity.  ...  In particular, an analytical measure for route anonymity is proposed using information theoretic equivocation.  ... 
doi:10.1109/mcom.2008.4473096 fatcat:yxt7cqc6m5gejeurwh57q4zjjq

A three-dimensional approach towards measuring sender anonymity

Neeraj Jaggi, Umesh MarappaReddy, Rajiv Bagai
2011 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)  
We provide justification for three distinct aspects of anonymity, important from the perspectives of a user, a system designer, and an attacker, leading to a three-dimensional approach towards measuring  ...  Finally, we apply the proposed metric to an existing anonymous system and discuss the insights gained.  ...  Information theoretic measures towards quantifying the degree of anonymity are discussed in [13] , [10] .  ... 
doi:10.1109/infcomw.2011.5928958 fatcat:i6if23en5rb3dahnkizrzrnowe

On the Measurement of Privacy as an Attacker's Estimation Error [article]

David Rebollo-Monedero, Javier Parra-Arnau, Claudia Diaz, Jordi Forné
2012 arXiv   pre-print
In this work we propose a theoretical framework for privacy-preserving systems, endowed with a general definition of privacy in terms of the estimation error incurred by an attacker who aims to disclose  ...  designers in selecting the most appropriate metric for a given application.  ...  Information theoretic anonymity metrics were independently proposed in two papers.  ... 
arXiv:1111.3567v3 fatcat:qc3ekjq32rggnexr6yhr6mff5i

Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version) [article]

Clément Massart, François-Xavier Standaert
2019 IACR Cryptology ePrint Archive  
It allows us to revisit (continuous) re-identification attacks with a combination of information theoretic and security metrics.  ...  They finally leverage recent results on the security evaluations/certification of cryptographic implementations to connect information theoretic and security metrics, and to formally bound the risk of  ...  François-Xavier Standaert is a Senior Research Associate of the Belgian Fund for Scientific Research (FNRS-F.R.S.).  ... 
dblp:journals/iacr/MassartS19 fatcat:uptyskemy5bqnpuzktgqe3bknu

A comparative analysis of holistic marine management regimes and ecosystem approach in marine spatial planning in developed countries

Nicolas J.I. Rodriguez
2017 Ocean and Coastal Management  
Still marine ecosystem-based management is an important step forward for sustainable ocean governance.  ...  Implementation challenges are related to lack of functional metrics, weak spatial measures, weak integration and lack of adaptive management.  ...  ) for comments and consultation in preparation of an early draft of this article.  ... 
doi:10.1016/j.ocecoaman.2016.12.023 fatcat:3rbnwg3asvdnfo5xfhnhn2urvm

Revisiting a combinatorial approach toward measuring anonymity

Benedikt Gierlichs, Carmela Troncoso, Claudia Diaz, Bart Preneel, Ingrid Verbauwhede
2008 Proceedings of the 7th ACM workshop on Privacy in the electronic society - WPES '08  
Further, we describe an algorithm to compute the redefined metric.  ...  Recently, Edman et al. proposed the system's anonymity level [10], a combinatorial approach to measure the amount of additional information needed to reveal the communication pattern in a mix-based anonymous  ...  The information in this document reflects only the authors' views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ... 
doi:10.1145/1456403.1456422 dblp:conf/wpes/GierlichsTDPV08 fatcat:s6dhtf47pffxtijikp3lxysqoa

On the measurement of privacy as an attacker's estimation error

David Rebollo-Monedero, Javier Parra-Arnau, Claudia Diaz, Jordi Forné
2012 International Journal of Information Security  
In this work we propose a theoretical framework for privacypreserving systems, endowed with a general definition of privacy in terms of the estimation error incurred by an attacker who aims to disclose  ...  designers in selecting the most appropriate metric for a given application.  ...  Information theoretic anonymity metrics were independently proposed in two papers.  ... 
doi:10.1007/s10207-012-0182-5 fatcat:4fax4d45ivbkpeajvyx3laavcm

A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP

Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis
2013 2013 International Conference on Availability, Reliability and Security  
This paper provides an entropy-driven, privacypreserving, and practical framework for detecting resource consumption attacks in VoIP ecosystems.  ...  Network audit trails, especially those composed of application layer data, can be a valuable source of information regarding the investigation of attack incidents.  ...  ANONYMOUS IDENTIFICATION OF ABNORMAL TRAFFIC A. Metrics Definition We define the following metrics used by the proposed tracing scheme.  ... 
doi:10.1109/ares.2013.30 dblp:conf/IEEEares/TsiatsikasGKK13 fatcat:eowh2vp7hrg35hxrytuq6m4e4y

The Interaction Effect of Type of Message X YouTuber's Media Metrics on Customers' Responses and the Moderation of Conformity Intention

Melby Karina Zuniga Huertas, Tarcisio Duarte Coelho
2019 Future Internet  
The results of an experiment showed that high YouTubers' media metrics have more effect for 1SMs and less effect for 2SMs.  ...  This study makes a theoretical contribution to research into online content and information use, providing explanations of how media metrics of a vlog influence the effect of two types of messages.  ...  Acknowledgments: The authors would like to thank José Mauro da Costa Hernandez for his suggestions on the statistical analysis. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi11060135 fatcat:t3fgwkuhxzbcdexubawqh6p3ga
« Previous Showing results 1 — 15 out of 53,442 results