On the effectiveness of k-anonymity against traffic analysis and surveillance

Nicholas Hopper, Eugene Y. Vasserman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

The goal of most research on anonymity, including all currently used systems for anonymity, is to achieve anonymity through unlinkability: an adversary should not be able to determine the correspondence between the input and output messages of the system. An alternative anonymity goal is unobservability: an adversary should not be able to determine who sends and who receives messages. We study the effect of k-anonymity, a weak form of unobservability, on two types of attacks against systems that provide only unlinkability.

Original languageEnglish (US)
Title of host publicationProceedings of the 5th ACM Workshop on Privacy in Electronic Society, WPES 2006, Co-located with the 13th ACM Conference on Computer and Communications Security, CCS 2006
Pages9-18
Number of pages10
DOIs
StatePublished - Dec 1 2006
Event5th ACM Workshop on Privacy in Electronic Society, WPES 2006, Co-located with the 13th ACM Conference on Computer and Communications Security, CCS 2006 - Alexandria, VA, United States
Duration: Oct 30 2006Oct 30 2006

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other5th ACM Workshop on Privacy in Electronic Society, WPES 2006, Co-located with the 13th ACM Conference on Computer and Communications Security, CCS 2006
CountryUnited States
CityAlexandria, VA
Period10/30/0610/30/06

Keywords

  • k-anonymity
  • mass surveillance
  • statistical disclosure

Cite this