An Analysis of Anonymity Side Effects in the Internet of Services
Key: LML+13-1
Author: Ulrich Lampe, André Miede, Tim Lusa, Stefan Schulte, Ralf Steinmetz, Schahram Dustdar
Date: March 2013
Kind: In proceedings
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Book title: Proceedings of the 2013 International Conference on Networked Systems (NetSys 2013)
Keywords: Internet of Services; Web Services; Security; Anonymity; Quality of Service
Abstract: The Internet of Services will facilitate cross-organizational collaboration by allowing companies to utilize services from external providers. Even though standard security mechanisms such as message encryption may be in place, attackers could create detailed profiles of service consumers, providers, and marketplaces by monitoring communication endpoints. This threatens the security objective of relationship anonymity and potentially permits sensitive information about the underlying business processes or relationships between service consumers and providers to be revealed. While state-of-the-art countermeasures in the form of anonymity systems allow this problem to be addressed, they may have undesired side effects on the Quality of Service. This work provides a detailed empirical analysis of these side effects, based on an extensive measurement of the response time, availability, and throughput of representative, globally distributed services. Our experimental results are available to the interested public within the comprehensive dataset WS-Anon.
View Full paper (PDF) | Download Full paper (PDF)

The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, not withstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.