File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/2307636.2307664
- Scopus: eid_2-s2.0-84864344693
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Opaak: Using mobile phones to limit anonymous identities online
Title | Opaak: Using mobile phones to limit anonymous identities online |
---|---|
Authors | |
Keywords | anonymous credentials mobile applications privacy spam sybil attacks |
Issue Date | 2012 |
Citation | MobiSys'12 - Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, 2012, p. 295-307 How to Cite? |
Abstract | Trust and anonymity are both desirable properties on the Internet. However, online services and users often have to make the trade off between trust and anonymity due to the lack of usable frameworks for achieving them both. We propose Opaak, a practical anonymous authentication framework. Opaak enables its users to establish identities with different online services while ensuring that these identities cannot be linked with each other or their real identity. In addition, Opaak allows online service providers to control the rate at which users utilize their services while preserving their anonymity. Hence, allowing the service providers to prevent abuse in the form of spam or Sybil attacks, which are prevalent in such online services that offer anonymity. Opaak leverages the mobile phone as a scarce resource combined with anonymous credentials in order to provide these features. We target two kinds of applications for Opaak and identify their requirements in order to achieve both trust and anonymity. We develop efficient protocols for these applications based on anonymous credentials. In addition, we design an architecture that facilitates integration with existing mobile and web applications and allows application developers to transparently utilize our protocols. We implement a prototype on Android and evaluate its performance to demonstrate the practicality of our approach. © 2012 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/346570 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Maganis, Gabriel | - |
dc.contributor.author | Shi, Elaine | - |
dc.contributor.author | Chen, Hao | - |
dc.contributor.author | Song, Dawn | - |
dc.date.accessioned | 2024-09-17T04:11:46Z | - |
dc.date.available | 2024-09-17T04:11:46Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | MobiSys'12 - Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, 2012, p. 295-307 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346570 | - |
dc.description.abstract | Trust and anonymity are both desirable properties on the Internet. However, online services and users often have to make the trade off between trust and anonymity due to the lack of usable frameworks for achieving them both. We propose Opaak, a practical anonymous authentication framework. Opaak enables its users to establish identities with different online services while ensuring that these identities cannot be linked with each other or their real identity. In addition, Opaak allows online service providers to control the rate at which users utilize their services while preserving their anonymity. Hence, allowing the service providers to prevent abuse in the form of spam or Sybil attacks, which are prevalent in such online services that offer anonymity. Opaak leverages the mobile phone as a scarce resource combined with anonymous credentials in order to provide these features. We target two kinds of applications for Opaak and identify their requirements in order to achieve both trust and anonymity. We develop efficient protocols for these applications based on anonymous credentials. In addition, we design an architecture that facilitates integration with existing mobile and web applications and allows application developers to transparently utilize our protocols. We implement a prototype on Android and evaluate its performance to demonstrate the practicality of our approach. © 2012 ACM. | - |
dc.language | eng | - |
dc.relation.ispartof | MobiSys'12 - Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services | - |
dc.subject | anonymous credentials | - |
dc.subject | mobile applications | - |
dc.subject | privacy | - |
dc.subject | spam | - |
dc.subject | sybil attacks | - |
dc.title | Opaak: Using mobile phones to limit anonymous identities online | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/2307636.2307664 | - |
dc.identifier.scopus | eid_2-s2.0-84864344693 | - |
dc.identifier.spage | 295 | - |
dc.identifier.epage | 307 | - |