DocumentCode
2184571
Title
RPINA- Network Forensics Protocol Embedding Privacy Enhancing Technologies
Author
Antoniou, Giannakis ; Gritzalis, Stefanos
Author_Institution
Fac. of Inf. Technol., Monash Univ., Clayton, Vic.
fYear
2006
fDate
Oct. 18 2006-Sept. 20 2006
Firstpage
297
Lastpage
302
Abstract
Although privacy is considered to be the ultimate right for every user to enjoy intercommunications with security and anonymity, the provision for such a service could easily be adapted as a hiding cover by malicious users. Privacy enhancing technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered and revealed when necessary. This paper proposes a network forensics protocol called RPINA (respect private information, not abuser) which may operate over PETs, without violating the privacy of innocent users, but only the privacy of abusers. This approach introduces a new dimension in the relation between these two opposite-goal technologies, which enhances their viability in the global network environment
Keywords
data privacy; protocols; telecommunication security; RPINA; malicious activity evidence; network forensics protocol; privacy enhancing technologies; respect private information not abuser; Communication system security; Electronic mail; Forensics; Information technology; Laboratories; Network servers; Positron emission tomography; Privacy; Protection; Protocols;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Information Technologies, 2006. ISCIT '06. International Symposium on
Conference_Location
Bangkok
Print_ISBN
0-7803-9741-X
Electronic_ISBN
0-7803-9741-X
Type
conf
DOI
10.1109/ISCIT.2006.340051
Filename
4141562
Link To Document