Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

The Communicative Effects Of Anonymity Online: A Natural Language Analysis Of The Faceless, Caleb Johnson Mar 2021

The Communicative Effects Of Anonymity Online: A Natural Language Analysis Of The Faceless, Caleb Johnson

Undergraduate Honors Theses

An ever-increasing number of Americans have an active social media

presence online. As of March 2020, an estimated 79% of Americans were active

monthly users of some sort. Many of these online platforms allow users to

operate anonymously which could potentially lead to shifts in communicative

behavior. I first discuss my compilation process of the Twitter Anonymity

Dataset (TAD), a human-classified dataset of 100,000 Twitter accounts that are

categorized by their level of identifiability to their real-world agent. Next, I

investigate some of the structural differences between the classification levels

and employ a variety of Natural Language Processing models and …


Crowdsourcing Atop Blockchains, Yuan Lu Aug 2020

Crowdsourcing Atop Blockchains, Yuan Lu

Dissertations

Traditional crowdsourcing systems, such as Amazon's Mechanical Turk (MTurk), though once acquiring great economic successes, have to fully rely on third-party platforms to serve between the requesters and the workers for basic utilities. These third-parties have to be fully trusted to assist payments, resolve disputes, protect data privacy, manage user authentications, maintain service online, etc. Nevertheless, tremendous real-world incidents indicate how elusive it is to completely trust these platforms in reality, and the reduction of such over-reliance becomes desirable.

In contrast to the arguably vulnerable centralized approaches, a public blockchain is a distributed and transparent global "consensus computer" that is …


Improving Performance And Security In Anonymity Systems, Mohsen Imani Aug 2018

Improving Performance And Security In Anonymity Systems, Mohsen Imani

Computer Science and Engineering Dissertations

Tor is an anonymity network that provides online privacy for the Internet users. Tor hides the user's traffic among the others' traffic. The more users Tor attracts, the stronger anonymity it provides. Unfortunately, users of the Tor anonymity system suffer from less-than-ideal performance, in part because circuit building and selection processes are not tuned for speed. Moreover, there are some attacks like guard fingerprinting and website fingerprinting attacks that try to profile or de-anonymize the Tor users. In this dissertation, we propose methods to address both security and performance issues in Tor. We first examine the process of selecting among …


Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee Jan 2014

Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee

Masters Theses

"Structured overlay networks are primarily used in data storage and data lookup, but they are vulnerable against many kinds of attacks. Within the realm of security, overlay networks have demonstrated applicability in providing privacy, availability, integrity, along with scalability. The thesis first analyses the Chord and the SALSA protocols which are organized in structured overlays to provide data with a certain degree of privacy, and then defines a new protocol called Spherical Chord which provides data lookup with privacy, while also being scalable, and addresses critical existing weaknesses in Chord and SALSA protocols. Spherical Chord is a variant of the …


Location Privacy In Emerging Network-Based Applications, Yong Xi Jan 2012

Location Privacy In Emerging Network-Based Applications, Yong Xi

Wayne State University Dissertations

With the wide spread of computer systems and networks, privacy has become an issue that increasingly attracts attention. In wireless sensor networks, the location of an event source may be subject to unintentional disclosure through traffic analysis by the attacker. In vehicular networks, authentication leaves a trail to tie a driver to a sequence of time and space coordinates. In a cloud-based navigation system, the location information of a sensitive itinerary is disclosed. Those scenarios have shown that privacy protection is a far-reaching problem that could span many different aspects of a computer/network system, especially on a diversified landscape of …


Enabling Accurate Analysis Of Private Network Data, Michael Hay Sep 2010

Enabling Accurate Analysis Of Private Network Data, Michael Hay

Open Access Dissertations

This dissertation addresses the challenge of enabling accurate analysis of network data while ensuring the protection of network participants' privacy. This is an important problem: massive amounts of data are being collected (facebook activity, email correspondence, cell phone records), there is huge interest in analyzing the data, but the data is not being shared due to concerns about privacy. Despite much research in privacy-preserving data analysis, existing technologies fail to provide a solution because they were designed for tables, not networks, and cannot be easily adapted to handle the complexities of network data. We develop several technologies that advance us …


Cpg: Closed Pseudonymous Groups, Reed S. Abbott Mar 2008

Cpg: Closed Pseudonymous Groups, Reed S. Abbott

Theses and Dissertations

Internet users generally feel their actions are anonymous, but this is often not the case. Users can be tracked and their actions logged for future analysis, which is not the desire of most users. Software and services exist which offer anonymity on the Internet when used correctly. Anonymity on the Internet is useful for many people including whistleblowers, dissidents, law enforcement, and the security conscious, but it can be abused. A user can act maliciously under the guise of anonymity without the fear of retribution. Thus, a level of administrative control over users is desirable, even in an anonymous system. …