Non-consent Data Retrieval While using Web or Email Services

Jose Martinez Rivera, Luis Medina Ramos, Amir H. Chinaei

2015

Abstract

User’s private data might be secretly retrieved for or against them every time they browse the web or use email services. This study addresses how these services could secretly retrieve such data. While users may appreciate these techniques as a means of protecting them from hacking, fraud, etc., they may have some privacy concerns against them. We have implemented two approaches to demonstrate how such data retrievals help web and email services to properly identify a user. We have also conducted extensive experiments to measure the success rates of our approaches. Results show 86.217% successful identification for web services and 81.1% successful identification of emails that were attempted to be sent anonymously.

References

  1. M. Abadi and B. Blanchet, 2005, "Computer-Assisted Verification of a Protocol for Certified Email," Science of Computer Programming, pp. 3-27.
  2. F. Sanchez, Z. Duan and Y. Dong, 2011, "Blocking Spam By Separating End-User Machines from Legitimate Mail Server Machines," in CEAS, Perth, Australia.
  3. F. Sanchez and Z. Duan, 2012, "A Sender-Centric Approach to Detecting Phishing Emails," in ASE International Conference on Cyber Security, Washington D.C.
  4. G. Ateniese and C. Nita-Rotaru, 2002, "StatelessRecipient Certified E-mail System Based on Verifiable Encryption," Proceedings of The ryptographer's Track at the RSA Conference on Topics in Cryptology, pp. 182-19.
  5. M. Abadi, N. Glew, B. Horne and B. Pinkas, 2002, "Certified Email with a Light On-line Trusted Third Party:," Proceedings of the 11th International Conference on World Wide Web, pp. 387-395.
  6. P. Eckersley, 2010, "How Unique Is Your Browser?," in Proceedings of the Privacy Enhancing Technologies Symposium.
  7. M. Ter Louw, J. Soon Lim and V. N. Venkatakrishnan, 2007, "Extensible Web Browser Security," in 4th International Conference, DIMVA, Lucerne, Switzerland, pp. 1-19.
Download


Paper Citation


in Harvard Style

Martinez Rivera J., Medina Ramos L. and Chinaei A. (2015). Non-consent Data Retrieval While using Web or Email Services . In Proceedings of 4th International Conference on Data Management Technologies and Applications - Volume 1: DATA, ISBN 978-989-758-103-8, pages 316-325. DOI: 10.5220/0005549703160325


in Bibtex Style

@conference{data15,
author={Jose Martinez Rivera and Luis Medina Ramos and Amir H. Chinaei},
title={Non-consent Data Retrieval While using Web or Email Services},
booktitle={Proceedings of 4th International Conference on Data Management Technologies and Applications - Volume 1: DATA,},
year={2015},
pages={316-325},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005549703160325},
isbn={978-989-758-103-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of 4th International Conference on Data Management Technologies and Applications - Volume 1: DATA,
TI - Non-consent Data Retrieval While using Web or Email Services
SN - 978-989-758-103-8
AU - Martinez Rivera J.
AU - Medina Ramos L.
AU - Chinaei A.
PY - 2015
SP - 316
EP - 325
DO - 10.5220/0005549703160325