Protecting User Privacy in Remotely Managed Applications

作者: Prashanth Mohan

DOI:

关键词:

摘要: This thesis presents an end-to-end system architecture for online services to provide it's users with a rprivacy guaranteer. The privacy guarantee as described in this relates the technological enforcement of user's policies by these applications that are otherwise untrusted user.Applications on Internet complex they integrate different types functionalities into consistent interface user. categorizes three generic components n learning module operates data from multiple gather higher level trends and aggregates, storage transformation provides core functionality presentation finally client-side component interacts cloud-side is responsible sourcing input user presenting them device secure fashion.This looks at risks introduced each describes rtrusted systemr can be used prove specified enforced. consists independently developed solutions Gupt, Rubicon, Bubbles MobAds. These work tandem other perspective.While EULAs have largely been enforced realm legal proceedings, prototype implementation demonstrates it both feasible practical enforce within system.

参考文章(105)
Craig Gentry, Shai Halevi, Implementing Gentry's fully-homomorphic encryption scheme international cryptology conference. pp. 129- 148 ,(2011) , 10.1007/978-3-642-20465-4_9
Krste Asanović, Mohit Tiwari, Dawn Song, Elaine Shi, Prashanth Mohan, Hilfi Alkaff, Andrew Osheroff, Eric Love, Context-centric security usenix conference on hot topics in security. pp. 9- 9 ,(2012)
Petros Maniatis, Byung-Gon Chun, Jayanthkumar Kannan, Secure data preservers forweb services usenix conference on web application development. pp. 3- 3 ,(2011)
Adrian Holovaty, Jacob Kaplan-Moss, The Django Template System The Definitive Guide to Django. pp. 31- 58 ,(2008) , 10.1007/978-1-4302-0331-5_4
Vitaly Shmatikov, Ann Kilzer, Srinath T. V. Setty, Indrajit Roy, Emmett Witchel, Airavat: security and privacy for MapReduce networked systems design and implementation. pp. 20- 20 ,(2010) , 10.5555/1855711.1855731
Martin C. Brown, Cherie Plumlee, Beos Porting UNIX Applications ,(1998)
Andrei Serjantov, George Danezis, Towards an information theoretic metric for anonymity privacy enhancing technologies. pp. 41- 53 ,(2002) , 10.1007/3-540-36467-6_4
Matthew Johnson, Frank Stajano, Implementing a multi-hat PDA international workshop on security. pp. 295- 307 ,(2005) , 10.1007/978-3-540-77156-2_37
Julian Seifert, Alexander De Luca, Bettina Conradi, Heinrich Hussmann, TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones Lecture Notes in Computer Science. pp. 130- 137 ,(2010) , 10.1007/978-3-642-12654-3_8
Ari Juels, Targeted Advertising ... And Privacy Too the cryptographers track at the rsa conference. pp. 408- 424 ,(2001) , 10.1007/3-540-45353-9_30