Published in

2006 International Symposium on Communications and Information Technologies

DOI: 10.1109/iscit.2006.340051

Links

Tools

Export citation

Search in Google Scholar

RPINA- Network Forensics Protocol Embedding Privacy Enhancing Technologies

Journal article published in 2006 by Giannakis Antoniou, Stefanos Gritzalis
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Although privacy is considered to be the ultimate right for every user to enjoy intercommunications with security and anonymity, the provision for such a service could easily be adapted as a hiding cover by malicious users. Privacy enhancing technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered and revealed when necessary. This paper proposes a network forensics protocol called RPINA (respect private information, not abuser) which may operate over PETs, without violating the privacy of innocent users, but only the privacy of abusers. This approach introduces a new dimension in the relation between these two opposite-goal technologies, which enhances their viability in the global network environment