File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Opaak: Using mobile phones to limit anonymous identities online

TitleOpaak: Using mobile phones to limit anonymous identities online
Authors
Keywordsanonymous credentials
mobile applications
privacy
spam
sybil attacks
Issue Date2012
Citation
MobiSys'12 - Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, 2012, p. 295-307 How to Cite?
AbstractTrust and anonymity are both desirable properties on the Internet. However, online services and users often have to make the trade off between trust and anonymity due to the lack of usable frameworks for achieving them both. We propose Opaak, a practical anonymous authentication framework. Opaak enables its users to establish identities with different online services while ensuring that these identities cannot be linked with each other or their real identity. In addition, Opaak allows online service providers to control the rate at which users utilize their services while preserving their anonymity. Hence, allowing the service providers to prevent abuse in the form of spam or Sybil attacks, which are prevalent in such online services that offer anonymity. Opaak leverages the mobile phone as a scarce resource combined with anonymous credentials in order to provide these features. We target two kinds of applications for Opaak and identify their requirements in order to achieve both trust and anonymity. We develop efficient protocols for these applications based on anonymous credentials. In addition, we design an architecture that facilitates integration with existing mobile and web applications and allows application developers to transparently utilize our protocols. We implement a prototype on Android and evaluate its performance to demonstrate the practicality of our approach. © 2012 ACM.
Persistent Identifierhttp://hdl.handle.net/10722/346570

 

DC FieldValueLanguage
dc.contributor.authorMaganis, Gabriel-
dc.contributor.authorShi, Elaine-
dc.contributor.authorChen, Hao-
dc.contributor.authorSong, Dawn-
dc.date.accessioned2024-09-17T04:11:46Z-
dc.date.available2024-09-17T04:11:46Z-
dc.date.issued2012-
dc.identifier.citationMobiSys'12 - Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, 2012, p. 295-307-
dc.identifier.urihttp://hdl.handle.net/10722/346570-
dc.description.abstractTrust and anonymity are both desirable properties on the Internet. However, online services and users often have to make the trade off between trust and anonymity due to the lack of usable frameworks for achieving them both. We propose Opaak, a practical anonymous authentication framework. Opaak enables its users to establish identities with different online services while ensuring that these identities cannot be linked with each other or their real identity. In addition, Opaak allows online service providers to control the rate at which users utilize their services while preserving their anonymity. Hence, allowing the service providers to prevent abuse in the form of spam or Sybil attacks, which are prevalent in such online services that offer anonymity. Opaak leverages the mobile phone as a scarce resource combined with anonymous credentials in order to provide these features. We target two kinds of applications for Opaak and identify their requirements in order to achieve both trust and anonymity. We develop efficient protocols for these applications based on anonymous credentials. In addition, we design an architecture that facilitates integration with existing mobile and web applications and allows application developers to transparently utilize our protocols. We implement a prototype on Android and evaluate its performance to demonstrate the practicality of our approach. © 2012 ACM.-
dc.languageeng-
dc.relation.ispartofMobiSys'12 - Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services-
dc.subjectanonymous credentials-
dc.subjectmobile applications-
dc.subjectprivacy-
dc.subjectspam-
dc.subjectsybil attacks-
dc.titleOpaak: Using mobile phones to limit anonymous identities online-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/2307636.2307664-
dc.identifier.scopuseid_2-s2.0-84864344693-
dc.identifier.spage295-
dc.identifier.epage307-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats