| Download ( PDF | 161kB) |
Effectivity of Various Data Retention Schemes for Single-Hop Proxy Servers
Herrmann, Dominik und Wendolsky, Rolf (2009) Effectivity of Various Data Retention Schemes for Single-Hop Proxy Servers. In: Extended Abstracts of the Fourth Privacy Enhancing Technologies Convention (PET-CON 2009.1), Technical Report TUD-FI09-04, Technische Universität Dresden, ISSN 1430-211X.Veröffentlichungsdatum dieses Volltextes: 08 Sep 2009 09:12
Konferenz- oder Workshop-Beitrag
DOI zum Zitieren dieses Dokuments: 10.5283/epub.9283
Zusammenfassung
Recently, member states of the European Union have legislated new data retention policies. Anonymisation services and proxy servers undermine such data retention efforts, as they allow users to masquerade their IP addresses. Providers of such services have to implement effective data retention mechanisms allowing for traceability while at the same time preserving users' privacy as far as ...
Recently, member states of the European Union have legislated new data retention policies. Anonymisation services and proxy servers undermine such data retention efforts, as they allow users to masquerade their IP addresses. Providers of such services have to implement effective data retention mechanisms allowing for traceability while at the same time preserving users' privacy as far as possible. In this paper we analyse the effectivity of four data retention schemes for single-hop proxy servers which use information already stored in logs today. We assess their effectivity by applying them to the historic logs of a mid-range proxy server. According to our evaluation it is insufficient to record data on session-level. Users can only be unambiguously identified with high probability if access time and source address of each request are stored together with the destination address. This result indicates that effective data retention based on currently available identifiers comes at a high cost for users' privacy.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Konferenz- oder Workshop-Beitrag (Paper) | ||||
| Datum | 25 April 2009 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Entpflichtete oder im Ruhestand befindliche Professoren > Lehrstuhl für Wirtschaftsinformatik IV - Management der Informationssicherheit (Prof. Dr.-Ing. Hannes Federrath) | ||||
| Verwandte URLs |
| ||||
| Stichwörter / Keywords | Data Retention, Proxy Log | ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 000 Allgemeines, Wissenschaft 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Ja | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-92835 | ||||
| Dokumenten-ID | 9283 |
Downloadstatistik
Downloadstatistik