Provable network activity for protecting users against false accusation

Panagiotis Papadopoulos*, Ilias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos

*Corresponding author for this work

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review


With the proliferation of the World Wide Web, data traces that correspond to users’ network activity can be collected by several Internet actors, including (i) web sites, (ii) smartphone apps, and even (iii) Internet Service Providers. Given that the collection and storage of these data are beyond the control of the end user, these data traces can be easily manipulated, if not, tampered with. The result of such manipulated digital traces can be severe: Innocent users can be shamed or even wrongfully accused of carrying out illegal transactions. To eliminate these potential accusations on innocent users, we introduce Provable Network Activity (PNA): a framework with which the ISPs can give the end users control of their stored traces. The framework guarantees that the information collected for the end users is accurate and will remain accurate for as long as it is stored. Our implementation and preliminary evaluation suggest that PNA is fast, easy to deploy, and introduces zero network latency to the end clients.

Original languageEnglish
Title of host publicationInformation Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Proceedings
Number of pages8
Volume9895 LNCS
ISBN (Print)9783319459301
Publication statusPublished - 2016
Event10th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2016 - Heraklion, Crete, Greece
Duration: 26 Sep 201627 Sep 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9895 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349


Conference10th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2016
CityHeraklion, Crete


Dive into the research topics of 'Provable network activity for protecting users against false accusation'. Together they form a unique fingerprint.

Cite this