{"title":"测量发送者匿名性的三维方法","authors":"Neeraj Jaggi, Umesh MarappaReddy, R. Bagai","doi":"10.1109/INFCOMW.2011.5928958","DOIUrl":null,"url":null,"abstract":"We first illustrate using examples that existing measures in literature are not sufficient to fully characterize the anonymity provided by an anonymous system. We then propose a new isolation measure, based upon presence of outliers in a distribution, and show that this measure is critical towards quantifying the overall anonymity provided by the system. We provide justification for three distinct aspects of anonymity, important from the perspectives of a user, a system designer, and an attacker, leading to a three-dimensional approach towards measuring sender anonymity. We further show how two anonymous systems can be compared in terms of the degree of anonymity provided, using the proposed 3-tuple metric and appropriate weights reflecting the attributes desired in the system. Finally, we apply the proposed metric to an existing anonymous system and discuss the insights gained.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A three-dimensional approach towards measuring sender anonymity\",\"authors\":\"Neeraj Jaggi, Umesh MarappaReddy, R. Bagai\",\"doi\":\"10.1109/INFCOMW.2011.5928958\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We first illustrate using examples that existing measures in literature are not sufficient to fully characterize the anonymity provided by an anonymous system. We then propose a new isolation measure, based upon presence of outliers in a distribution, and show that this measure is critical towards quantifying the overall anonymity provided by the system. We provide justification for three distinct aspects of anonymity, important from the perspectives of a user, a system designer, and an attacker, leading to a three-dimensional approach towards measuring sender anonymity. We further show how two anonymous systems can be compared in terms of the degree of anonymity provided, using the proposed 3-tuple metric and appropriate weights reflecting the attributes desired in the system. Finally, we apply the proposed metric to an existing anonymous system and discuss the insights gained.\",\"PeriodicalId\":402219,\"journal\":{\"name\":\"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFCOMW.2011.5928958\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFCOMW.2011.5928958","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A three-dimensional approach towards measuring sender anonymity
We first illustrate using examples that existing measures in literature are not sufficient to fully characterize the anonymity provided by an anonymous system. We then propose a new isolation measure, based upon presence of outliers in a distribution, and show that this measure is critical towards quantifying the overall anonymity provided by the system. We provide justification for three distinct aspects of anonymity, important from the perspectives of a user, a system designer, and an attacker, leading to a three-dimensional approach towards measuring sender anonymity. We further show how two anonymous systems can be compared in terms of the degree of anonymity provided, using the proposed 3-tuple metric and appropriate weights reflecting the attributes desired in the system. Finally, we apply the proposed metric to an existing anonymous system and discuss the insights gained.