作者: Weisong Shi , Loren Schwiebert , Yong Xi
DOI:
关键词:
摘要: With the wide spread of computer systems and networks, privacy has become an issue that increasingly attracts attention. In wireless sensor location event source may be subject to unintentional disclosure through traffic analysis by attacker. vehicular authentication leaves a trail tie driver sequence time space coordinates. cloud-based navigation system, information sensitive itinerary is disclosed. Those scenarios have shown protection far-reaching problem could span many different aspects computer/network especially on diversified landscape such systems. To address protection, we propose look at from three aspects. First, represents one class problems. This because in general, encryption can applied protect being transmitted but pattern transmission harder hide due other constraints. To defeat analysis, it necessary identify those constraints decide trade-off between them protection. We threat within network directly related with routing protocol. Thus completely remove pattern, use random walk threat. Second, generally required establish identities interacting parties electronical communication. But unnecessarily reveals private when network. introduce tunable anonymity, both asymmetric symmetric primitives, into process so provides $k$-anonymity. further extend scenario mobile scenarios. At last, often perceived shared order obtain certain services. For example, destination sent for looking up shortest path them. show possible apply retrieval service provider knows whom provided accounting purposes, not details service. In represent some basic issues arising using Our approaches, while innovative discussed hand, are general enough similar