DocumentCode
565393
Title
Natural Privacy Preservation Protocol for electronic mail
Author
Hartmann, Kim ; Steup, Christoph
Author_Institution
Inst. of Electron., Signal Process. & Commun., Otto-von-Guericke Univ., Magdeburg, Germany
fYear
2012
fDate
5-8 June 2012
Firstpage
1
Lastpage
17
Abstract
Espionage plays a major role in military and paramilitary cyber warfare activities. While cyber espionage is mainly considered as the act of obtaining (confidential) information using illegal, technical methods, we have explored the possibilities of obtaining confidential material with technical methods using legal exploits. Due to routing conventions, messages containing confidential information may be sent through different states and herewith through conflicting communities. The servers that are used in this routing process are subject to the corresponding states legal system. In the case of electronic mail (e-mail), back-ups or copies being made are accessible to the corresponding authorities and/or private institutions. These copies of e-mails may be requested without knowledge of the sender or the sender´s state and can be kept for an uncontrollable period of time. This may also heighten the risk of disclosure for encrypted messages. We have developed a concept based on IPv6 to allow static and dynamic adjustment of the selected routes to maintain the specified or expected level of confidentiality. This concept may be developed further to be used as a privacy enhancing technology. The concept increases the level of control of transmitted data, technically enforces the expected or negotiated level of privacy and confidentiality, allows data tracking and heightens the user´s awareness regarding the differences between postal and electronic mail.
Keywords
IP networks; cryptography; data privacy; electronic mail; routing protocols; IPv6; confidential material; conflicting communities; cyber espionage; data privacy; data tracking; data transmission; e-mail; electronic mail; encrypted messages; expected confidentiality level; legal exploits; natural privacy preservation protocol; paramilitary cyber warfare activities; privacy enhancing technology; routing process; state legal system; technical methods; Electronic mail; Law; Postal services; Privacy; Receivers; Routing; IPv6; IPv6 routing; confidentiality; e-mail routing; privacy;
fLanguage
English
Publisher
ieee
Conference_Titel
Cyber Conflict (CYCON), 2012 4th International Conference on
Conference_Location
Tallinn
Print_ISBN
978-1-4673-1270-7
Type
conf
Filename
6243986
Link To Document