Privacy preservation services: Challenges and solutions

Dijiang Huang, Vinayak Kandiah, Mayank Verma

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The current Internet architecture was designed at a time when many of the current network applications did not even exist. As a result, it has become increasingly difficult to deploy new and secure services on the Internet. Hence, a new Internet architecture is required to address the security and usability issues that affect the current Internet. In this paper, we examine the current Internet architecture from various security and user perspectives using two privacy services and propose some architectural guidelines and principles for the future Internet Architecture. The two aforementioned privacy services that we chose are: i) anonymous communication services and ii) identity management systems. We examine the challenges in implementing anonymous communication services, and identity management systems and identify the problems with existing solutions for these challenges. Based on the problems identified in the current Internet architecture, we propose a virtualization-motivated set of architectural principles and design rules for the future Internet.

Original languageEnglish (US)
Title of host publicationProceedings of the 23rd Annual ACM Symposium on Applied Computing, SAC'08
Pages2110-2115
Number of pages6
DOIs
StatePublished - Dec 1 2008
Event23rd Annual ACM Symposium on Applied Computing, SAC'08 - Fortaleza, Ceara, Brazil
Duration: Mar 16 2008Mar 20 2008

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Other

Other23rd Annual ACM Symposium on Applied Computing, SAC'08
Country/TerritoryBrazil
CityFortaleza, Ceara
Period3/16/083/20/08

Keywords

  • Anonymous communication
  • Identity management
  • Privacy
  • Security
  • Visualization

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Privacy preservation services: Challenges and solutions'. Together they form a unique fingerprint.

Cite this