Uncontrollable Privacy - The right that every attacker desires

The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs). Among the Internet users, there are attackers who desire more than anything else to enjoy privacy during their malicious actions, and a PET is what they were looking for. Thus, although a PET should offer privacy to the internet users, proper techniques should also be employed in order to help the victims during the investigation procedure and unveil the identification of the attackers. The paper summarizes the current design issues of PETs and introduces additional issues in order to offer forensic investigation services. To the best of our knowledge this is the first attempt which it proves (the obvious) that the existing PETs do not meet accountability requirements. By knowing explicitly the reasons the PETs are inefficient offering accountability, it is the most appropriate way to make PETs offering higher level of accountability without decreasing the level of the privacy offered.

[1]  Brian Neil Levine,et al.  A protocol for anonymous communication over the Internet , 2000, CCS.

[2]  Ari Juels,et al.  Parallel mixing , 2004, CCS '04.

[3]  Bernhard Plattner,et al.  Practical Anonymity for the Masses with MorphMix , 2004, Financial Cryptography.

[4]  Stefanos Gritzalis,et al.  Privacy Enhancing Technologies: A Review , 2003, EGOV.

[5]  Stefanos Gritzalis,et al.  Enhancing Web privacy and anonymity in the digital era , 2004, Inf. Manag. Comput. Secur..

[6]  S. Gritzalis,et al.  RPINA- Network Forensics Protocol Embedding Privacy Enhancing Technologies , 2006, 2006 International Symposium on Communications and Information Technologies.

[7]  Nicholas Hopper,et al.  Selectively Traceable Anonymity , 2006, Privacy Enhancing Technologies.

[8]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[9]  Philippe Golle,et al.  Reputable Mix Networks , 2004, Privacy Enhancing Technologies.

[10]  U Moeller,et al.  Mixmaster Protocol Version 2 , 2004 .

[11]  A. Pfitzmann,et al.  Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .

[12]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[13]  Dimitris Geneiatakis,et al.  PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies , 2006, Communications and Multimedia Security.