Anonymity Enhancing Technologies (AET): Opportunities and Threats

ABSTRACT

Privacy of Web surfers nowadays is frequently compromised by eavesdroppers. The threat applies to surfers’ identities, the World Wide Web (hereafter: the Web) site being browsed, and their association. This article provides a comprehensive review of AET for the Web. First, the article examines the nature of threats to anonymity. Next, theoretical and practical solutions for protecting surfers’ anonymity are presented and their capabilities are extracted. The solutions are then analyzed and mapped with regards to their performance and the degree of anonymity they cater for. The analysis clearly demonstrates the inherent trade-off between performance and anonymity provided by AET.


AUTHORS

Lecturer, Department of Information Systems Engineering, Ben-Gurion University of the Negev
Israel

Yuval Elovici is a lecturer at the department of Information Systems Engineering, Ben-Gurion University. He holds Ph.D degree in Information Systems from the Tel-Aviv University, Israel. and B.Sc. and M.Sc. degrees in Computer and Electrical Engineering from the Ben-Gurion University of the Negev, Israel. His main areas of interest are computer security, internet security, information economics, and parallel and distributed systems.

Lecturer, Department of Information Systems Engineering, Ben-Gurion University of the Negev
Israel

Chanan Glezer is a lecturer at the department of Information Systems Engineering, Ben-Gurion University of the Negev, Israel. He holds a Ph.D. degree in Information Systems from Texas Tech University. His main areas of interest are: electronic-commerce, organizational computing and Internet security. His research has been published in journals such as Communications of the ACM, Journal of Organizational Computing and Electronic Commerce, Journal of Strategic Information Systems, Data and Knowledge Engineering and the Journal of Medical Systems.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com