Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography
Title | Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Will, M. A., Ko, R. K. L., Schlickmann, S. J. |
Conference Name | 2017 IEEE Trustcom/BigDataSE/ICESS |
Keywords | anonymous data sharing, anonymous routing, Ciphers, circuit creation, computer network security, data sharing, destination anonymity, Elliptic curve cryptography, encrypted search capabilities, Encryption, information leakage, Internet, Internet traffic, law enforcement, Light-weight, Metrics, Peer-to-peer computing, Protocols, pubcrawl, public key cryptography, Resiliency, Scalability, Secure Processing, source anonymity, streaming design, telecommunication network routing, telecommunication traffic |
Abstract | Promoting data sharing between organisations is challenging, without the added concerns over having actions traced. Even with encrypted search capabilities, the entities digital location and downloaded information can be traced, leaking information to the hosting organisation. This is a problem for law enforcement and government agencies, where any information leakage is not acceptable, especially for investigations. Anonymous routing is a technique to stop a host learning which agency is accessing information. Many related works for anonymous routing have been proposed, but are designed for Internet traffic, and are over complicated for internal usage. A streaming design for circuit creation is proposed using elliptic curve cryptography. Allowing for a simple anonymous routing solution, which provides fast performance with source and destination anonymity to other organisations. |
URL | ieeexplore.ieee.org/document/8029550/ |
DOI | 10.1109/Trustcom/BigDataSE/ICESS.2017.347 |
Citation Key | will_anonymous_2017 |
- law enforcement
- telecommunication traffic
- telecommunication network routing
- streaming design
- source anonymity
- Secure Processing
- Scalability
- Resiliency
- public key cryptography
- pubcrawl
- Protocols
- Peer-to-peer computing
- Metrics
- Light-weight
- anonymous data sharing
- Internet traffic
- internet
- Information Leakage
- encryption
- encrypted search capabilities
- Elliptic curve cryptography
- destination anonymity
- data sharing
- computer network security
- circuit creation
- Ciphers
- anonymous routing