Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

CrowdSurf: Empowering Transparency in the Web

Published: 30 September 2015 Publication History

Abstract

Individuals lack proper means to supervise the services they contact and the information they exchange when surfing the web. This security task has become challenging due to the complexity of the modern web, of the data delivering technology, and even to the adoption of encryption, which, while improving privacy, makes in-network services ineffective. The implications are serious, from a person contacting undesired services or unwillingly exposing private information, to a company being unable to control the flow of its information to the outside world. To empower transparency and the capability of taking informed choices in the web, we propose CROWDSURF, a system for comprehensive and collaborative auditing of data exchanged with Internet services. Similarly to crowdsourced efforts, we enable users to contribute in building awareness, supported by the semi-automatic analysis of data offered by a cloud-based system. The result is the creation of "suggestions" that individuals can transform in enforceable "rules" to customize their web browsing policy. CROWDSURF provides the core infrastructure to let individuals and enterprises regain visibility and control on their web activity. Preliminary results obtained executing a prototype implementation demonstrate the feasibility and potential of CROWDSURF.

References

[1]
D. Naylor, A. Finamore, I. Leontiadis, Y. Grunenberger, M. Mellia, K. Papagiannaki, and P. Steenkiste, "The Cost of the "S" in HTTPS," in ACM CoNEXT, 2014.
[2]
G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, "The Web Never Forgets: Persistent Tracking Mechanisms in the Wild," in ACM SIGSAC, 2014.
[3]
B. Krishnamurthy, K. Naryshkin, and C. E. Wills, "Privacy leakage vs. Protection measures: the growing disconnect," in W2SP, 2011.
[4]
T.-F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, "Host Fingerprinting and Tracking on the Web: Privacy and Security Implications," in NDSS, 2012.
[5]
H. Metwalley, S. Traverso, M. Mellia, S. Miskovic, and M. Baldi, "The online tracking horde: a view from passive measurements," in TMA, 2015.
[6]
L. Popa, A. Ghodsi, and I. Stoica, "HTTP As the Narrow Waist of the Future Internet," in ACM HotNets, 2010.
[7]
C. Riederer, V. Erramilli, A. Chaintreau, B. Krishnamurthy, and P. Rodriguez, "For Sale : Your Data: By : You," in ACM HotNets, 2011.
[8]
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Comput. Surv., vol. 42, pp. 14:1--14:53, June 2010.
[9]
H. Metwalley, S. Traverso, M. Mellia, S. Miskovic, and M. Baldi, "CrowdSurf: Empowering Informed Choices in the Web," ArXiv e-prints, Feb. 2015.
[10]
Hackers steal vast eBay user database, including passwords, http://www.bdlive.co.za/world/americas/2014/05/23/hackers-steal-vast-ebay-user-database-including-passwords.
[11]
H. Metwalley, S. Traverso, and M. Marco, "Unsupervised detection of web trackers," in IEEE GLOBECOM, 2015.
[12]
D. J. Newman, "The double dixie cup problem," American Mathematical Monthly, 1960.
[13]
S. Zimmeck and S. M. Bellovin, "Privee: an architecture for automatically analyzing web privacy policies," in Proceedings of the 23rd USENIX conference on Security Symposium, pp. 1--16, USENIX Association, 2014.
[14]
Google, Microsoft, and Amazon are paying to get around Adblock Plus, http://www.theverge.com/2015/2/2/7963577/google-ads-get-through-adblock.

Cited By

View all
  • (2016)Using Passive Measurements to Demystify Online TrackersComputer10.1109/MC.2016.7449:3(50-55)Online publication date: 1-Mar-2016
  • (2015)Identifying Personal Information in Internet TrafficProceedings of the 2015 ACM on Conference on Online Social Networks10.1145/2817946.2817947(59-70)Online publication date: 2-Nov-2015

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 45, Issue 5
October 2015
41 pages
ISSN:0146-4833
DOI:10.1145/2831347
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 September 2015
Published in SIGCOMM-CCR Volume 45, Issue 5

Check for updates

Author Tags

  1. crowdsourced systems
  2. privacy
  3. web browsing

Qualifiers

  • Research-article

Funding Sources

  • Narus Fellow Research Program

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Using Passive Measurements to Demystify Online TrackersComputer10.1109/MC.2016.7449:3(50-55)Online publication date: 1-Mar-2016
  • (2015)Identifying Personal Information in Internet TrafficProceedings of the 2015 ACM on Conference on Online Social Networks10.1145/2817946.2817947(59-70)Online publication date: 2-Nov-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media