skip to main content
10.1145/3600160.3605075acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era

Published:29 August 2023Publication History

ABSTRACT

This paper presents a privacy-enhancing identity management platform designed to address the challenges associated with online identity verification and privacy protection. INCOGNITO offers a comprehensive solution by leveraging concepts such as Qualified Anonymity and cryptographic credentials, along with technologies including blockchain, Tor Network, and software stacks like Idemix. By employing these mechanisms, INCOGNITO aims to enable users to securely acquire and manage their identity attributes, while preserving their privacy and ensuring compliance with both regulatory bodies and Service Providers’ requirements. The platform facilitates the issuance and verification of cryptographic credentials, granting users access to online services based on fine-grained subsets of their identity attributes. Furthermore, the effectiveness and feasibility of the platform are demonstrated through two pilot projects focused on online multimedia content sharing and identifying bots or fake users in online social networks. These pilots showcase the practical applicability of INCOGNITO in solving identity-related challenges while safeguarding user privacy and security.

References

  1. [1] X. Zhang, M. M. Yadollahi, S. Dadkhah, H. Isah, D.-P. Le, A. A. Ghorbani, Data breach: analysis, countermeasures and challenges, International Journal of Information and Computer Security 19 (3-4) (2022) 402–442.Google ScholarGoogle Scholar
  2. [2] D. Chen, M. M. Chowdhury, S. Latif, Data breaches in corporate setting, in: 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), IEEE, 2021, pp. 01–06.Google ScholarGoogle Scholar
  3. [3] L. I. Labrecque, E. Markos, K. Swani, P. Peña, When data security goes wrong: Examining the impact of stress, social contract violation, and data type on consumer coping responses following a data breach, Journal of Business Research 135 (2021) 559–571.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Z. Alkhalil, C. Hewage, L. Nawaf, I. Khan, Phishing attacks: A recent comprehensive study and a new anatomy, Frontiers in Computer Science 3 (2021) 563060.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] A. Karale, The challenges of iot addressing security, ethics, privacy, and laws, Internet of Things 15 (2021) 100420.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Z. Wu, G. Li, S. Shen, X. Lian, E. Chen, G. Xu, Constructing dummy query sequences to protect location privacy and query privacy in location-based services, World Wide Web 24 (2021) 25–49.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] L. Hanzlik, D. Slamanig, With a little help from my friends: Constructing practical anonymous credentials, in: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, pp. 2004–2023.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] M. P. Machulak, E. L. Maler, D. Catalano, A. Van Moorsel, User-managed access to web resources, in: Proceedings of the 6th ACM workshop on Digital identity management, 2010, pp. 35–44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] M. Pilkington, Blockchain technology: principles and applications, in: Research handbook on digital transformations, Edward Elgar Publishing, 2016, pp. 225–253.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] H. Li, L. Yu, W. He, The impact of gdpr on global technology development (2019).Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] V. C. Hu, D. R. Kuhn, D. F. Ferraiolo, J. Voas, Attribute-based access control, Computer 48 (2) (2015) 85–88.Google ScholarGoogle Scholar

Index Terms

  1. Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
            August 2023
            1440 pages
            ISBN:9798400707728
            DOI:10.1145/3600160

            Copyright © 2023 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 29 August 2023

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate228of451submissions,51%
          • Article Metrics

            • Downloads (Last 12 months)38
            • Downloads (Last 6 weeks)5

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format