Use this URL to cite or link to this record in EThOS:
Title: Who goes here? : confidentiality of location through anonymity
Author: Jackson, I. W.
Awarding Body: University of Cambridge
Current Institution: University of Cambridge
Date of Award: 1998
Availability of Full Text:
Full text unavailable from EThOS.
Please contact the current institution’s library for further details.
Initially, a specific problem in the security of location is presented: that of allowing the subjects of a particular location-tracking system to retain control over the distribution of the information about their location. Prior work in the field of location hiding and traffic flow confidentiality is reviewed and discussed. The social constraints which make the problem interesting and relevant are described, and the trust models and goals of the parties involved in the application area are discussed. The particular set of trust models and goals of interest for the research presented is stated. The general nature of the problem, and the key difficulties in solving it, are identified. Several possible solutions are outlined. One of these solutions is chosen - the use of mix-based remailer networks, with some modifications - and the choice is justified with reference to the factors operating in the application area. The cryptographic mechanisms required to implement this solution are discussed, and protocols are proposed which satisfy the application's basic requirements for users' control over their own location tracking information. More sophisticated requirements are discussed and some examples of mechanisms that could be used to implement them are present, including an 'anonymous certificate of location'. An attempt at formal analysis of these protocols is made; existing formal methods are shown to be inadequate, and a new logic for the analysis of protocols is presented. The new logic is shown to be useful in general, but still not to be able to express fully the concepts required to analyse the protocols proposed here. The solution and protocols chosen are developed into a design for a practical system in the initial application area. The design has been partially implemented and tested. Measurements of the performance of this implementation of the practical system are presented and discussed.
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID:  DOI: Not available