首页 | 本学科首页   官方微博 | 高级检索  
     


Shadow attacks on users’ anonymity in pervasive computing environments
Authors:Daniele    Linda   Claudio   
Affiliation:aDICo - Università degli Studi di Milano, via Comelico 39, I-20135 Milan, Italy
Abstract:Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment.
Keywords:Privacy   Anonymity   Formal models of privacy threats   Context-awareness
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号