Towards Privacy Awareness in Future Internet Technologies

With the increased use of the Internet to share confidential information with other users around the world, the demands to protect this information are also increasing. This is why, today, privacy has found its important place in users’ lives. However, Internet users have different interpretations of the meaning of privacy. This fact makes it difficult to find the best way to address the privacy issue. In addition, most of the current standard protocols in use over the Internet do not support the level of privacy that most users expect. The purpose of this chapter is to discuss the best balance between users’ expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.

[1]  Anna E. Shimanek Do You Want Milk with Those Cookies? Complying with the Safe Harbor Privacy Principles , 2001 .

[2]  William Allen Simpson,et al.  PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.

[3]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[4]  Cullen Jennings,et al.  Network Address Translation (NAT) Behavioral Requirements for Unicast UDP , 2007, RFC.

[5]  Li Xiao,et al.  A Survey of Multihoming Technology in Stub Networks: Current Research and Open Issues , 2007, IEEE Network.

[6]  Craig A. Finseth,et al.  An Access Control Protocol, Sometimes Called TACACS , 1993, RFC.

[7]  Sam Hartman,et al.  Analysis of OSPF Security According to the Keying and Authentication for Routing Protocols (KARP) Design Guide , 2013, RFC.

[8]  Lou Berger,et al.  Generalized Multi-Protocol Label Switching (GMPLS) Signaling Functional Description , 2003, RFC.

[9]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues , 2000, NDSS.

[10]  Pekka Nikander,et al.  An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers (ORCHID) , 2007, RFC.

[11]  Brian Wellington,et al.  Secret Key Transaction Authentication for DNS (TSIG) , 2000, RFC.

[12]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[13]  J. Hirshleifer Privacy: Its Origin, Function, and Future , 1980, The Journal of Legal Studies.

[14]  Jeffrey D. Case,et al.  Simple Network Management Protocol (SNMP) , 1990, RFC.

[15]  Guofei Gu,et al.  Attacking software-defined networks: a first feasibility study , 2013, HotSDN '13.

[16]  Dag Arne Osvik,et al.  MD5 considered harmful today, creating a rogue CA certificate , 2008 .

[17]  Pekka Nikander,et al.  Host Identity Protocol , 2005 .

[18]  Lily Chen,et al.  Internet Engineering Task Force (ietf) Updated Security Considerations for the Md5 Message-digest and the Hmac-md5 Algorithms , 2011 .

[19]  Eric C. Rosen,et al.  Multiprotocol Label Switching Architecture , 2001, RFC.

[20]  Alan DeKok,et al.  Remote Authentication Dial In User Service (RADIUS) Protocol Extensions , 2013, RFC.

[21]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[22]  Mirina Grosz,et al.  World Wide Web Consortium , 2010 .

[23]  Fra Handbook on European Data Protection Law , 2018 .

[24]  Christoph Meinel,et al.  A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration , 2013, 2013 IEEE 12th International Symposium on Network Computing and Applications.