Skip to main content

The Obfuscation Method of User Identification System

  • Conference paper
  • First Online:
Applied Cryptography and Network Security Workshops (ACNS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12809))

Included in the following conference series:

  • 1363 Accesses

Abstract

The research on the identification of network users has been continuous, and methods and algorithms emerge in endlessly. Of course, it solves the problem that it is difficult to identify the identity of network interactive users. Yet, user identification raises questions about user privacy. In the last paper [[, we proposed a user identification method based on Mining Web Usage Profiles from Proxy Logs. For the previous user identification system, we study that which degree the surfing behavior must be obfuscated to prevent identification. Furthermore, we investigate directions in how far a user can hide her identity by obfuscating her web usage pattern through adding or hiding random HTTP connections. In experimental evaluation, we examine the time-period being necessary to obfuscate an identity based on a two-week log file being provided by our industrial partners.

This work funded by the Fundamental Research Funds for the University of Science and Tech-nology Beijing under Grant FRF-TP-19-016A1 and the National Key R&D Plan Program of China (2019QY(Y)0601).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xu, J., Xu, F., Ma, F., Zhou, L., Jiang, S., Rao, Z.: Mining web usage profiles from proxy logs: user identification. In: Conference Dependable and Secure Computing. IEEE (2021)

    Google Scholar 

  2. Morzy, T., Wojciechowski, M., Zakrzewicz, M.: Web users clustering. In: Proceedings of the 15th International Symposium on Computer and Information Sciences, pp. 374–382 (2000)

    Google Scholar 

  3. P. Pirolli, J.P., Rao, R.: Silk from a sow’s ear: extracting usable structures from the web. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 118–125. ACM (1996)

    Google Scholar 

  4. Cooley, R., Mobasher, B., Srivastava, J.: Data preparation for mining world wide web browsing patterns. Knowl. Inf. Syst. 1(1), 5–32 (1999)

    Article  Google Scholar 

  5. Kammenhuber, N., Luxenburger, J., Feldmann, A., Weikum, G.: Web search clickstreams. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 245–250 (2006)

    Google Scholar 

  6. Li, B., Mazur, E., Diao, Y., McGregor, A., Shenoy, P.: A platform for scalable one-pass analytics using mapreduce. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pp. 985–996 (2011)

    Google Scholar 

  7. Yen, T.-F., et al.: Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 199–208. ACM (2013)

    Google Scholar 

  8. Lou, W., Liu, G., Lu, H., Yang, Q.: Cut-and-pick transactions for proxy log mining. In: Jensen, C.S., et al. (eds.) EDBT 2002. LNCS, vol. 2287, pp. 88–105. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45876-X_8

    Chapter  Google Scholar 

  9. Li, N., Zhang, N., Das, S.K.: Relationship privacy preservation in publishing online social networks. In: Proceedings IEEE 3rd International Conference Privacy Security Risk Trust/IEEE 3rd International Conference Social Compute, p 443–450 (2011)

    Google Scholar 

  10. Junggab, S., Donghyun, K., Alam, B., et al.: Privacy enhanced location sharing for mobile online social networks. IEEE Trans. Sustainable Comput., 1 (2018)

    Google Scholar 

  11. Xu, C., Xie, X., Zhu, L., et al.: PPLS: a privacy-preserving location-sharing scheme in mobile online social networks. Sci. China Inf. Sci. 63(3) (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, J., Xu, F., Xu, C. (2021). The Obfuscation Method of User Identification System. In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2021. Lecture Notes in Computer Science(), vol 12809. Springer, Cham. https://doi.org/10.1007/978-3-030-81645-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-81645-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-81644-5

  • Online ISBN: 978-3-030-81645-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics