Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/644527.644536acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Anonymity and accountability in self-organizing electronic communities

Published: 21 November 2002 Publication History

Abstract

In this paper we study the problem of anonymity versus accountability in electronic communities. We argue that full anonymity may present a security risk that is unacceptable in certain applications; therefore, anonymity and accountability are both needed. To resolve the inherent contradiction between anonymity and accountability in a flexible manner, we introduce the concepts of internal and external accountabilities. Intuitively, internal accountability applies to virtual users only, and is governed by the policy of a group (a community). In contrast, external accountability is needed to address issues related to misuse if the activity is to be penalized in real life according to internal rules or external laws. We provide a set of protocols to ensure that users' virtual and real identities cannot be disclosed unnecessarily, and allow users to monitor the data collected about them as well as to terminate their membership (both real and virtual) under certain conditions. We develop a general conceptual model of electronic Editorial Board (e-EB). In our thinking, there are deep connections between anonymity and self-organization. In turn, the concept of self-organizing e-EB (SO-eEB) is introduced here, and a robotic example is provided. Finally, SO-eEB is specialized to Anonymous and Accountable Self-Organizing Communities (A2SOCs), that fully supports internal and external accountability while providing anonymity.

References

[1]
A. Abdul-Rahman and S. Hailes. Relying on trust to find reliable information. http://citeseer.nj.nec.com/348491.html, 2002.]]
[2]
P. F. S. amd D. M. Goldschlag and M. G. Reed. Anonymous connections and onion routing. In Proc. IEEE Symposium on Security and Privacy, Oakland, California, 1997.]]
[3]
K. Bennett, C.Grothoff, T. Horozov, I. Patrascu, and T. Stef. Gnunet --- a truly anonymous networking infrastructure. http://citeseer.nj.nec.com/502472.html.]]
[4]
L. Buttyan and J.Hubaux. Accountable anonymous access to services in mobile communication systems. In Symposium on Reliable Distributed Systems, 1999.]]
[5]
D. L. Chaum. Untraceable electronic mail, return addresses and digital pseudonyms. Communications of ACM, 24(2), 1981.]]
[6]
J. Claessens, B. Preneel, and J. Vandewalle. Anonymity controlled electronic payment systems. In Proc. 20th Symp. on Information Theory in the Benelux, 1999.]]
[7]
I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley. Protecting free expression online with freenet. IEEE Internet Computing, 6(1):40--49, 2002.]]
[8]
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Lecture Notes in Computer Science, volume 2009, 2001.]]
[9]
The freeweb project. http://freeweb.sourceforge.net/.]]
[10]
E. Gabber, P. B. Gibbons, D. M. Kristol, Y. Matias, and A. Mayer. Consistent yet anonymous web access with lpwa. Communications of the ACM, 1999.]]
[11]
I. Goldberg, D. Wagner, and E. Brewer. Privacy-enhancing technologies for the internet. In Proc. of 42nd IEEE Spring COMPCON, 1997.]]
[12]
International standard iso 7498--1984 (e): Information technology -- open systems interconnection -- reference model -- part 1: Basic reference model.]]
[13]
R. Khare and A. Rifkin. Weaving a web of trust. World Wide Web Journal, 2(3):77--112, 1997.]]
[14]
I. Kókai and A. Lörincz. Fast adapting value estimation based hybrid architecture for searching the world-wide web. Applied Soft Computing, 28:1--13, 2002.]]
[15]
D. Kugler and H. Vogt. Off-line payments with auditable tracing. In Financial Cryptography, Lecture Notes in Computer Science. Springer-Verlag, 2002.]]
[16]
A. Lörincz, I. Kókai, and A. Meretei. Intelligent high-performance crawlers used to reveal topic-specific structure of the www. International Journal of Foundations of Computer Science, 13:477--495, 2002.]]
[17]
A. Lörincz, Z. Palotai, and S. Mandusitz. Efficient competition for news on the internet with minimized communication load. Manuscript in preparation, 2002.]]
[18]
P. MacKenzie and J. Sorensen. Anonymous investing: Hiding the identities of stockholders. In Lecture Notes in Computer Science, volume 1648, 1999.]]
[19]
D. Martin and A. Schulman. Deanonymizing users of the safeweb anonymizing service, Nov. 2002. http://citeseer.nj.nec.com/martin02deanonymizing.html.]]
[20]
Napster. http://www.napster.com/about_us.html, 2002.]]
[21]
J. Park, R. Sandhu, and G. J. Ahn. Role-based access control on the web. ACM Transactions on Information and Systems Security, 4(1), 2001.]]
[22]
M. K. Reiter and A. D. Rubin. Crowds: anonymity for web transactions. ACM Transactions on Information and System Security, 1(1):66--92, 1998.]]
[23]
C. Shields and B. N. Levine. A protocol for anonymous communication over the internet. In Proc. of ACM Conference on Computer and Communications Security, 2000.]]
[24]
SourceForge.Net, the open source software development web site. http://www.sourceforge.net.]]
[25]
S. G. Stubblebine and P. F. Syverson. Authentic attributes with fine-grained anonymity protection. In Lecture Notes in Computer Science, volume 1962, 2001.]]
[26]
K. Sycara and D. Zeng. Cooperative intelligent software agents. Technical Report Technical Report # CMU-RI-TR-95-14., Carnegie Mellons University, School of Computer Science, Robotics Institute, 1995. http://www-2.cs.cmu.edu/softagents/papers/pleiades-TR-95-14.pdf.]]
[27]
A. S. Tanenbaum. Computer Networks. Prentice Hall, 3rd edition edition, 1996. pp. 814.]]
[28]
A. S. Tanenbaum and M. van Steen. Distributed Systems: Principles and Paradigms. Prentice Hall, 2002. pp. 803.]]
[29]
M. Venkatraman, B. Yu, and M. P. Singh. Trust and reputation management in a small-world network. http://citeseer.nj.nec.com/296051.html, 2002.]]
[30]
M. Waldman, A. D. Rubin, and L. F. Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium, 2000.]]
[31]
G. Zacharia, A. Moukas, and P. Maes. Collaborative reputation mechanism in electronic marketplaces. In Proc. of the 32nd Hawai International Conference in System Sciences, 1999.]]
[32]
G. Ziegler, C. Farkas, A. Meretei, and A. L őrincz. Privacy preserving accountability in electronic communities. Submitted to WWW2003, Budapest, Hungary, 2002.]]

Cited By

View all
  • (2023)AUC: Accountable Universal Composability2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179384(1148-1167)Online publication date: May-2023
  • (2022)A Blockchain-Based Framework to Enhance Anonymous Services with Accountability GuaranteesFuture Internet10.3390/fi1408024314:8(243)Online publication date: 21-Aug-2022
  • (2021)The DibiChain Protocol: Privacy-Preserving Discovery and Exchange of Supply Chain InformationAdvances in Model and Data Engineering in the Digitalization Era10.1007/978-3-030-87657-9_18(231-247)Online publication date: 7-Oct-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
November 2002
115 pages
ISBN:1581136331
DOI:10.1145/644527
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 November 2002

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. accountability
  2. anonymity
  3. authentication
  4. privacy
  5. self-organizing community

Qualifiers

  • Article

Conference

CCS02
Sponsor:

Acceptance Rates

Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)AUC: Accountable Universal Composability2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179384(1148-1167)Online publication date: May-2023
  • (2022)A Blockchain-Based Framework to Enhance Anonymous Services with Accountability GuaranteesFuture Internet10.3390/fi1408024314:8(243)Online publication date: 21-Aug-2022
  • (2021)The DibiChain Protocol: Privacy-Preserving Discovery and Exchange of Supply Chain InformationAdvances in Model and Data Engineering in the Digitalization Era10.1007/978-3-030-87657-9_18(231-247)Online publication date: 7-Oct-2021
  • (2019)The role of a location-based city exploration game in digital placemakingBehaviour & Information Technology10.1080/0144929X.2019.169789939:6(624-647)Online publication date: 11-Dec-2019
  • (2016)Tutorial chat: a case study of synchronous communication in a learning environmentALT-J10.1080/0968776060066859414:2(169-181)Online publication date: 14-Dec-2016
  • (2013)Application-layer design patterns for accountable-anonymous online identitiesTelecommunications Policy10.1016/j.telpol.2013.04.00137:9(748-756)Online publication date: 1-Oct-2013
  • (2013) The effects of perceived anonymity and anonymity states on conformity and groupthink in online communities: A W ikipedia study Journal of the American Society for Information Science and Technology10.1002/asi.2279564:5(1001-1015)Online publication date: 8-Mar-2013
  • (2011)Anonymous reputation based reservations in e-commerce (amnesic)Proceedings of the 13th International Conference on Electronic Commerce10.1145/2378104.2378121(1-10)Online publication date: 3-Aug-2011
  • (2009)The Conditions of PermeabilityProceedings of the 2009 International Conference on CyberWorlds10.1109/CW.2009.55(357-363)Online publication date: 7-Sep-2009
  • (2009)An Anonymity Revocation Technology for Anonymous CommunicationInformation Systems Development10.1007/b137171_34(329-337)Online publication date: 3-Aug-2009
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media