Abstract
Within a privacy-enhancing identity management system, among other sources of information, knowledge about current anonymity and about linkability of user’s actions should be available, so that each user is enabled to make educated decisions about performing actions and disclosing PII (personal identifiable information).
In this paper I describe a framework for quantification of anonymity and linkability of a user’s actions for use within a privacy-enhancing identity management system. Therefore, I define a model of user’s PII and actions as well as an attacker model. Based thereon, I describe an approach to quantify anonymity and linkability of actions. Regarding practical applicability, a third party service for linkability quantification is discussed.
Parts of this work have been supported by the Project FIDIS, a Network of Excellence within the EU’s 6th Framework Programme.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks, Special Issue on Electronic Business Systems 37, 205–219 (2001)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2), 84–88 (1981)
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards Measuring Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68. Springer, Heidelberg (2003)
Serjantov, A., Danezis, G.: Towards an Information Theoretic Metric for Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)
Steinbrecher, S., Köpsell, S.: Modelling unlinkability. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 32–47. Springer, Heidelberg (2003)
Díaz, C., Claessens, J., Seys, S., Preneel, B.: Information theory and anonymity. In: Proceedings of the 23rd Symposium on Information Theory in the Benelux, Louvain la Neuve, Belgium, Werkgemeenschap voor Informatie en Communicatietheorie, May 29-31 (2002)
Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security 12(1), 3–36 (2004)
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - A proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001), Version 0.27 at: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.27.pdf
Orwell, G.: Nineteen Eighty-Four. Martin Secker & Warburg (1949)
Clauß, S., Schiffner, S.: Anonymität auf Anwendungsebene. In: Dittmann, J. (ed.) Proceedings of Sicherheit 2006, Bonn, GI. Lecture Notes in Informatics, vol. P-77, pp. 171–182 (2006) (German)
Shannon, C.: A mathematical theory of communication. The Bell System Technical Journal 27, 379–423 (1948)
Micali, S., Rogaway, P.: Secure computation. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 392–404. Springer, Heidelberg (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Clauß, S. (2006). A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System. In: Müller, G. (eds) Emerging Trends in Information and Communication Security. ETRICS 2006. Lecture Notes in Computer Science, vol 3995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11766155_14
Download citation
DOI: https://doi.org/10.1007/11766155_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34640-1
Online ISBN: 978-3-540-34642-5
eBook Packages: Computer ScienceComputer Science (R0)