Abstract
Privacy is a major issue today as more and more users are connecting and participating in the Internet. This paper discusses privacy issues associated with web metering schemes and explores the dilemma of convincing interested parties of the merits of web metering results with sufficient detail, and still preserving users’ privacy. We propose a web metering scheme utilising user-centric hardware to provide web metering evidence in an enhanced privacy-preserving manner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
at National Center for Digital Certification (NCDC): Research & Development. www.ncdc.gov.sa.
References
Google analytics blog. Official weblog offering news, tips and resources related to google’s web traffic analytics service. analytics.blogspot.com
Atterer, R., Wnuk, M., Schmidt, A.: Knowing the user’s every move: user activity tracking for website usability evaluation and implicit interaction. In: WWW 2006: Proceedings of the 15th International Conference on World Wide Web, pp. 203–212. ACM, New York (2006)
Barwick, S.G., Jackson, W.-A., Martin, K.M.: A general approach to robust web metering. Des. Codes Crypt. 36(1), 5–27 (2005)
Bergadano, F., De Mauro, P.: Third party certification of HTTP service access statistics (Position Paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 95–99. Springer, Heidelberg (1999)
Blundo, C., Bonis, A.D., Masucci, B.: Bounds and constructions for metering schemes. Commun. Inf. Syst. 2, 1–28 (2002)
Blundo, C., Martn, S., Masucci, B., Padr, C.: A linear algebraic approach to metering schemes. Cryptology ePrint Archive, Report 2001/087 (2001)
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM, New York (2004)
Camenisch, J.L., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61–76. Springer, Heidelberg (2002)
Chen, L., Mao, W.: An auditable metering scheme for web advertisement applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 475–485. Springer, Heidelberg (2001)
Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing traitors. IEEE Trans. Inf. Theory 46(3), 893–910 (2000)
Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J., Schunter, M., Stampley, D.A., Wenning, R.: The platform for privacy preferences. W3C Recommendation, November 2006
Dent, A.W., Mitchell, C.J.: User’s Guide to Cryptography and Standards. Artech House Computer Security. Artech House Inc., Norwood (2004)
Dolev, D., Yao, A.C.: On the security of public key protocols. Technical report, Stanford, CA, USA (1981)
Franklin, M.K., Malkhi, D.: Auditable metering with lightweight security. J. Comput. Secur. 6(4), 237–256 (1998)
Harn, H., Lin, L.: A non-repudiation metering scheme. IEEE Commun. Lett. 37(5), 486–487 (2001)
International Organization for Standardization: ISO 11889–1:2009. Information technology - Trusted Platform Module - Part 1: Overview, May 2009
International Organization for Standardization: ISO 7498–2:1989. Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture (1989)
Jakobsson, M., MacKenzie, P.D., Stern, J.P.: Secure and lightweight advertising on the web. Comput. Netw. 31(11–16), 1101–1109 (1999)
Laih, C.-S., Fu, C.-J., Kuo, W.-C.: Design a secure and practical metering scheme. In: International Conference on Internet Computing, pp. 443–447 (2006)
Naor, M., Pinkas, B.: Secure and efficient metering. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 576–590. Springer, Heidelberg (1998)
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Roesner, F., Kohno, T., Wetherall, D.: Detecting and defending against third-party tracking on the web. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI 2012, p. 12. USENIX Association, Berkeley (2012)
Schnorr, C.-P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Wang, R.-C., Juang, W.-S., Lei, C.-L.: A web metering scheme for fair advertisement transactions. Int. J. Secure. Appl. 2(4), 453–456 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Alarifi, F., Fernández, M. (2015). Towards Privacy-Preserving Web Metering via User-Centric Hardware. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 153. Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-23802-9_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23801-2
Online ISBN: 978-3-319-23802-9
eBook Packages: Computer ScienceComputer Science (R0)