Protecting privacy with protocol stack virtualization

Janne Lindqvist, Juha-Matti Tapio
2008 Proceedings of the 7th ACM workshop on Privacy in the electronic society - WPES '08  
Previously proposed host-based privacy protection mechanisms use pseudorandom or disposable identifiers on some or all layers of the protocol stack. These approaches either require changes to all hosts participating in the communication or do not provide privacy for the whole protocol stack or the system. Building on previous work, we propose a relatively simple approach: protocol stack virtualization. The key idea is to provide isolation for traffic sent to the network. The granularity of the
more » ... solation can be, for example, flow or process based. With process based granularity, every application uses a distinct identifier space on all layers of the protocol stack. This approach does not need any infrastructure support from the network and requires only minor changes to the single host that implements the privacy protection mechanism. To show that no changes to typical applications are required, we implemented the protocol stack virtualization as a user space daemon and tested it with various legacy applications.
doi:10.1145/1456403.1456416 dblp:conf/wpes/LindqvistT08 fatcat:m5jtubrjubfxndv7rvfdlr236i