TY - GEN
T1 - Provable network activity for protecting users against false accusation
AU - Papadopoulos, Panagiotis
AU - Athanasopoulos, Ilias
AU - Kosta, Eleni
AU - Siganos, George
AU - Keromytis, Angelos D.
AU - Markatos, Evangelos P.
PY - 2016
Y1 - 2016
N2 - With the proliferation of the World Wide Web, data traces that correspond to users’ network activity can be collected by several Internet actors, including (i) web sites, (ii) smartphone apps, and even (iii) Internet Service Providers. Given that the collection and storage of these data are beyond the control of the end user, these data traces can be easily manipulated, if not, tampered with. The result of such manipulated digital traces can be severe: Innocent users can be shamed or even wrongfully accused of carrying out illegal transactions. To eliminate these potential accusations on innocent users, we introduce Provable Network Activity (PNA): a framework with which the ISPs can give the end users control of their stored traces. The framework guarantees that the information collected for the end users is accurate and will remain accurate for as long as it is stored. Our implementation and preliminary evaluation suggest that PNA is fast, easy to deploy, and introduces zero network latency to the end clients.
AB - With the proliferation of the World Wide Web, data traces that correspond to users’ network activity can be collected by several Internet actors, including (i) web sites, (ii) smartphone apps, and even (iii) Internet Service Providers. Given that the collection and storage of these data are beyond the control of the end user, these data traces can be easily manipulated, if not, tampered with. The result of such manipulated digital traces can be severe: Innocent users can be shamed or even wrongfully accused of carrying out illegal transactions. To eliminate these potential accusations on innocent users, we introduce Provable Network Activity (PNA): a framework with which the ISPs can give the end users control of their stored traces. The framework guarantees that the information collected for the end users is accurate and will remain accurate for as long as it is stored. Our implementation and preliminary evaluation suggest that PNA is fast, easy to deploy, and introduces zero network latency to the end clients.
UR - http://www.scopus.com/inward/record.url?scp=84990065759&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84990065759&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-45931-8_17
DO - 10.1007/978-3-319-45931-8_17
M3 - Conference contribution
AN - SCOPUS:84990065759
SN - 9783319459301
VL - 9895 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 254
EP - 261
BT - Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Proceedings
PB - Springer/Verlag
T2 - 10th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2016
Y2 - 26 September 2016 through 27 September 2016
ER -