Anonymity Enhancing Technologies (AET): Opportunities and Threats
ABSTRACT
Privacy of Web surfers nowadays is frequently compromised by eavesdroppers. The threat applies to surfers’ identities, the World Wide Web (hereafter: the Web) site being browsed, and their association. This article provides a comprehensive review of AET for the Web. First, the article examines the nature of threats to anonymity. Next, theoretical and practical solutions for protecting surfers’ anonymity are presented and their capabilities are extracted. The solutions are then analyzed and mapped with regards to their performance and the degree of anonymity they cater for. The analysis clearly demonstrates the inherent trade-off between performance and anonymity provided by AET.
AUTHORS
Lecturer, Department of Information Systems Engineering, Ben-Gurion University of the Negev
Israel
Yuval Elovici is a lecturer at the department of Information Systems Engineering, Ben-Gurion University. He holds Ph.D degree in Information Systems from the Tel-Aviv University, Israel. and B.Sc. and M.Sc. degrees in Computer and Electrical Engineering from the Ben-Gurion University of the Negev, Israel. His main areas of interest are computer security, internet security, information economics, and parallel and distributed systems.
Lecturer, Department of Information Systems Engineering, Ben-Gurion University of the Negev
Israel
Chanan Glezer is a lecturer at the department of Information Systems Engineering, Ben-Gurion University of the Negev, Israel. He holds a Ph.D. degree in Information Systems from Texas Tech University. His main areas of interest are: electronic-commerce, organizational computing and Internet security. His research has been published in journals such as Communications of the ACM, Journal of Organizational Computing and Electronic Commerce, Journal of Strategic Information Systems, Data and Knowledge Engineering and the Journal of Medical Systems.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive