Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
Articles 1 - 7 of 7
Full-Text Articles in Physical Sciences and Mathematics
The Communicative Effects Of Anonymity Online: A Natural Language Analysis Of The Faceless, Caleb Johnson
The Communicative Effects Of Anonymity Online: A Natural Language Analysis Of The Faceless, Caleb Johnson
Undergraduate Honors Theses
An ever-increasing number of Americans have an active social media
presence online. As of March 2020, an estimated 79% of Americans were active
monthly users of some sort. Many of these online platforms allow users to
operate anonymously which could potentially lead to shifts in communicative
behavior. I first discuss my compilation process of the Twitter Anonymity
Dataset (TAD), a human-classified dataset of 100,000 Twitter accounts that are
categorized by their level of identifiability to their real-world agent. Next, I
investigate some of the structural differences between the classification levels
and employ a variety of Natural Language Processing models and …
Crowdsourcing Atop Blockchains, Yuan Lu
Crowdsourcing Atop Blockchains, Yuan Lu
Dissertations
Traditional crowdsourcing systems, such as Amazon's Mechanical Turk (MTurk), though once acquiring great economic successes, have to fully rely on third-party platforms to serve between the requesters and the workers for basic utilities. These third-parties have to be fully trusted to assist payments, resolve disputes, protect data privacy, manage user authentications, maintain service online, etc. Nevertheless, tremendous real-world incidents indicate how elusive it is to completely trust these platforms in reality, and the reduction of such over-reliance becomes desirable.
In contrast to the arguably vulnerable centralized approaches, a public blockchain is a distributed and transparent global "consensus computer" that is …
Improving Performance And Security In Anonymity Systems, Mohsen Imani
Improving Performance And Security In Anonymity Systems, Mohsen Imani
Computer Science and Engineering Dissertations
Tor is an anonymity network that provides online privacy for the Internet users. Tor hides the user's traffic among the others' traffic. The more users Tor attracts, the stronger anonymity it provides. Unfortunately, users of the Tor anonymity system suffer from less-than-ideal performance, in part because circuit building and selection processes are not tuned for speed. Moreover, there are some attacks like guard fingerprinting and website fingerprinting attacks that try to profile or de-anonymize the Tor users. In this dissertation, we propose methods to address both security and performance issues in Tor. We first examine the process of selecting among …
Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee
Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee
Masters Theses
"Structured overlay networks are primarily used in data storage and data lookup, but they are vulnerable against many kinds of attacks. Within the realm of security, overlay networks have demonstrated applicability in providing privacy, availability, integrity, along with scalability. The thesis first analyses the Chord and the SALSA protocols which are organized in structured overlays to provide data with a certain degree of privacy, and then defines a new protocol called Spherical Chord which provides data lookup with privacy, while also being scalable, and addresses critical existing weaknesses in Chord and SALSA protocols. Spherical Chord is a variant of the …
Location Privacy In Emerging Network-Based Applications, Yong Xi
Location Privacy In Emerging Network-Based Applications, Yong Xi
Wayne State University Dissertations
With the wide spread of computer systems and networks, privacy has become an issue that increasingly attracts attention. In wireless sensor networks, the location of an event source may be subject to unintentional disclosure through traffic analysis by the attacker. In vehicular networks, authentication leaves a trail to tie a driver to a sequence of time and space coordinates. In a cloud-based navigation system, the location information of a sensitive itinerary is disclosed. Those scenarios have shown that privacy protection is a far-reaching problem that could span many different aspects of a computer/network system, especially on a diversified landscape of …
Enabling Accurate Analysis Of Private Network Data, Michael Hay
Enabling Accurate Analysis Of Private Network Data, Michael Hay
Open Access Dissertations
This dissertation addresses the challenge of enabling accurate analysis of network data while ensuring the protection of network participants' privacy. This is an important problem: massive amounts of data are being collected (facebook activity, email correspondence, cell phone records), there is huge interest in analyzing the data, but the data is not being shared due to concerns about privacy. Despite much research in privacy-preserving data analysis, existing technologies fail to provide a solution because they were designed for tables, not networks, and cannot be easily adapted to handle the complexities of network data. We develop several technologies that advance us …
Cpg: Closed Pseudonymous Groups, Reed S. Abbott
Cpg: Closed Pseudonymous Groups, Reed S. Abbott
Theses and Dissertations
Internet users generally feel their actions are anonymous, but this is often not the case. Users can be tracked and their actions logged for future analysis, which is not the desire of most users. Software and services exist which offer anonymity on the Internet when used correctly. Anonymity on the Internet is useful for many people including whistleblowers, dissidents, law enforcement, and the security conscious, but it can be abused. A user can act maliciously under the guise of anonymity without the fear of retribution. Thus, a level of administrative control over users is desirable, even in an anonymous system. …