30.01.2014 Views

Annual Report 2010 - Fachgruppe Informatik an der RWTH Aachen ...

Annual Report 2010 - Fachgruppe Informatik an der RWTH Aachen ...

Annual Report 2010 - Fachgruppe Informatik an der RWTH Aachen ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

World libraries : towards efficiently sharing large data volumes in open<br />

untrusted environments while preserving privacy<br />

Stef<strong>an</strong> Richter<br />

Public libraries have served <strong>an</strong> invaluable function for a long time. Yet in <strong>an</strong> age of digital<br />

media, traditional methods of publishing <strong>an</strong>d distributing information become increasingly<br />

marginalized. This thesis poses the question if <strong>an</strong>d how information technology c<strong>an</strong> be<br />

employed to find functional alternatives, conforming to the needs of society that have been<br />

ch<strong>an</strong>ged by information technology itself. To this end we introduce the concept of world<br />

libraries: Massively distributed systems that allow for the efficient sharing of large data<br />

volumes in open, untrusted environments while preserving privacy. To begin with, we discuss<br />

our definition as it relates to similar but different notions, then defend its utility with<br />

philosophical, economical, <strong>an</strong>d legal arguments. We go on to examine <strong>an</strong>onymous file sharing<br />

systems with regard to their applicability for world libraries. We identify reasons why these<br />

systems have failed to achieve popularity so far, as well as promising principles <strong>an</strong>d structures<br />

for successful world library implementations. Of these, distributed hash tables (DHTs) turn<br />

out to be particularly import<strong>an</strong>t. That is why we study their security <strong>an</strong>d privacy properties in<br />

detail. Using both <strong>an</strong>alytical models <strong>an</strong>d simulation, weaknesses in earlier approaches are<br />

shown, leading us to the discovery of the first practical DHT that scalably defends against<br />

active adversaries. The fourth chapter is dedicated to general bounds on <strong>an</strong>onymity.<br />

Anonymity techniques are import<strong>an</strong>t tools for the preservation of privacy. We present novel<br />

attacks that end<strong>an</strong>ger the <strong>an</strong>onymity provided by these tools un<strong>der</strong> very general<br />

circumst<strong>an</strong>ces, giving <strong>an</strong>alytical lower bounds to the success probability of such attacks<br />

measured in the number of adversarial observations. These results limit the applicability of<br />

<strong>an</strong>onymity techniques in world library implementations <strong>an</strong>d other privacy enh<strong>an</strong>cing<br />

technologies. Finally, we summarize our findings <strong>an</strong>d their impact on world library design.<br />

Evaluators: Prof. Dr. Peter Rossm<strong>an</strong>ith (<strong>RWTH</strong> <strong>Aachen</strong> University)<br />

Prof. Dr. Dr. h.c. Otto Sp<strong>an</strong>iol (<strong>RWTH</strong> <strong>Aachen</strong> University)<br />

Date of oral exam: 12 November 2009<br />

489

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!