Wednesday, January 22, 2020

Essay --

Gary Paolini CS333 Final Project 12/01/13 Privacy Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs By (Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy and Tadayoshi Kohno) Introduction We tackle the problem of building privacy-preserving device-tracking systems—or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. This system is for the privacy of internet user and finding the location of the mobile device should it become lost or stolen. The main goals of such systems are seemingly contradictory: to hide the device’s legitimately-visited locations from third-party services and other parties (location privacy) while simultaneously using those same services to help recover the device’s location(s) after it goes missing (device-tracking). We propose a system, named Adeona, that nevertheless meets both goals. It provides strong guarantees of location privacy while preserving the ability to efficiently track missing devices. The system Adeona allows the user to have browsing privacy and also the ability to track a missing device. We build a version of Adeona that uses OpenDHT as the third party service, resulting in an immediately deployable system that does not rely on any single trusted third party. The system uses Open DHT which is a third party service which gives a immediately deployable system We describe numerous extensions for the basic design that increase Adeona’s suitability for particular deployment environments. With numerous extensions for the design to increase deployment environments †¢ Provide a 1-2 page summary for each of the papers. †¢ What is the ... ...y and privacy, but one can do so in practice for real systems. We implemented Adeona, a full privacy-preserving tracking system based on OpenDHT that allows for immediate, community-orientated deployment. Its core module, the cryptographic engine that renders location updates anonymous and unlinkable, can be easily used in further deployment settings. To evaluate Adeona, we ran a field trial to gain experience with a deployment on real user’s systems. Our conclusion is that our approach is sound and an immediately viable alternative to tracking systems that offer less (or no) privacy guarantees. Lastly, we also presented numerous extensions to Adeona that address a range of issues: disparate deployment settings, increased functionality, and improved security. The techniques involved, particularly our tamper-evident FSPRG, are likely of independent interest.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.