A New Fuzzy-Based Approach for Anonymity Quantification in E-Services

In online services, making anonymous transactions is a crucial need in order to ensure the user's trust towards a particular service. In this context, anonymity quantification is required to provide at which level the e-service respects the user privacy regarding the link between his/her identity and actions. Most of the existing researches are limited to the anonymity quantification in a static way and based, mainly, on the user's set size. In this paper, the authors propose a new multi-agent based approach for anonymity quantification in e-services considering dynamic and mobile environment's characteristics. The authors' quantification is based on the fuzzy logic. It is based not only on the anonymity set size, which is always known in advance, but also on a set of other criteria such as the number of users and the priori and posteriori knowledge about internal and external attackers of an e-service. The carried out experimentations show competitive and better results when compared to other recently proposed anonymity quantification.

[1]  Jun Zheng,et al.  Handbook of Research on Wireless Security , 2008 .

[2]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[3]  Jar-Yuan Pai,et al.  The evaluation of implementing the international organization for standardization (ISO) 9000 quality management system in medical setting: A study from a teaching hospital , 2012 .

[4]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[5]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .

[6]  Fikret Sivrikaya,et al.  A Combinatorial Approach to Measuring Anonymity , 2007, 2007 IEEE Intelligence and Security Informatics.

[7]  George J. Klir,et al.  Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems - Selected Papers by Lotfi A Zadeh , 1996, Advances in Fuzzy Systems - Applications and Theory.

[8]  M.S.M. Noorani,et al.  Mathematical Treatment for Constructing a countermeasure against the one time pad attack on the Baptista Type Cryptosystem , 2011 .

[9]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[10]  S. Sivanandam,et al.  Introduction to Fuzzy Logic using MATLAB , 2006 .

[11]  J. J. Saade,et al.  DEFUZZIFICATION METHODS AND NEW TECHNIQUES FOR FUZZY CONTROLLERS , 2004 .

[12]  Salim Chikhi,et al.  A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System , 2014, Int. J. Inf. Secur. Priv..

[13]  Riccardo Bettati,et al.  Anonymity vs. Information Leakage in Anonymity Systems , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[14]  Siu-Ming Yiu,et al.  Event-Oriented k-Times Revocable-iff-Linked Group Signatures , 2006, ACISP.

[15]  Bart Preneel,et al.  Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.

[16]  Carmela Troncoso,et al.  Revisiting a combinatorial approach toward measuring anonymity , 2008, WPES '08.

[17]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[18]  Claudia Díaz Anonymity Metrics Revisited , 2005, Anonymous Communication and its Applications.

[19]  Giovanni Caire,et al.  JADE Programmer's Guide , 2002 .

[20]  Bill Bailey,et al.  Proactive Security Protection of Critical Infrastructure: A Process Driven Methodology , 2012 .

[21]  Dang Vinh Pham,et al.  Discussing Anonymity Metrics for Mix Based Anonymity Approaches , 2009, iNetSeC.

[22]  Gordon B. Agnew,et al.  Security measures for mobile ad-hoc networks (MANETs) , 2008 .

[23]  Santo Banerjee,et al.  Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption , 2010 .

[24]  Lotfi A. Zadeh,et al.  A note on web intelligence, world knowledge and fuzzy logic , 2004, Data Knowl. Eng..

[25]  Vitaly Shmatikov,et al.  Measuring relationship anonymity in mix networks , 2006, WPES '06.

[26]  Nicholas R. Jennings,et al.  Agent Theories, Architectures, and Languages: A Survey , 1995, ECAI Workshop on Agent Theories, Architectures, and Languages.