Vote to Link: Recovering from Misbehaving Anonymous Users

被引:1
|
作者
Lueks, Wouter [1 ]
Everts, Maarten H. [2 ]
Hoepman, Jaap-Henk [1 ]
机构
[1] Radboud Univ Nijmegen, Inst Comp & Informat Sci, Nijmegen, Netherlands
[2] TNO Netherlands Org Appl Sci Res, The Hague, Netherlands
关键词
Privacy; privacy-enhancing technologies; cryptography; GROUP SIGNATURE SCHEMES; REVOCATION;
D O I
10.1145/2994620.2994634
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation, most of the damage has already been done. To help the service provider to recover from abuse by malicious anonymous users, we propose the vote-to-link system. In the vote-to-link system, moderators (rather than a single trusted third party) can cast votes on a user's action if they deem it to be bad. After enough moderators have voted on the action, the service provider can use these votes to link all the actions by the same user within a limited time frame and thus recover from these actions. All the user's actions in other time frames, however, remain unlinkable. To protect the voting moderators from retaliation, we also propose a (less efficient) variant that allows moderators to vote anonymously. We implemented and evaluated both variants to show that they are practical. In particular, we believe this system is suitable to combat malicious Wikipedia editing.
引用
收藏
页码:111 / 122
页数:12
相关论文
共 50 条
  • [1] Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs
    Tsang, Patrick P.
    Au, Man Ho
    Kapadia, Apu
    Smith, Sean W.
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 72 - +
  • [2] BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
    Tsang, Patrick P.
    Au, Man Ho
    Kapadia, Apu
    Smith, Sean W.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)
  • [3] PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users
    Au, Man Ho
    Tsang, Patrick P.
    Kapadia, Apu
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (04)
  • [4] Removal of Misbehaving Insiders in Anonymous VANETs
    Zhuo, Xuejun
    Hao, Jianguo
    Liu, Duo
    Dai, Yiqi
    MSWIM09; PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS, AND SYSTEMS, 2009, : 106 - 115
  • [5] A Vote Based System to Detect Misbehaving Nodes in MANETs
    Talreja, Rahul
    Jethani, Vimla
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 391 - 394
  • [6] Verifiable Anonymous Vote Submission
    Zuquete, Andre
    Almeida, Filipe
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2159 - 2166
  • [7] Nymble: Blocking Misbehaving Users in Anonymizing Networks
    Tsang, Patrick P.
    Kapadia, Apu
    Cornelius, Cory
    Smith, Sean W.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) : 256 - 269
  • [8] COMPUTER USERS ANONYMOUS
    HARDCASTLE, S
    DATA PROCESSING, 1979, 21 (04): : 24 - 24
  • [9] Impact of misbehaving users and the role of policers in ABR service
    Kolarov, A
    Ramamurthy, G
    Takamichi, T
    Murase, T
    GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 1533 - 1540
  • [10] Assuring QoS in Wireless Mesh Networks with Misbehaving Users
    Szott, Szymon
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 327 - 328