ABSTRACT
In this note we discuss issues surrounding how to provide and use network measurement data made available for sharing among researchers. While previous work has focused on the technical details of enabling sharing via traffic anonymization, we focus on higher-level aspects of the process such as potential harm to the provider (e.g., by de-anonymizing a shared dataset) or interactions to strengthen subsequent research (e.g., helping to establish ground truth). We believe the community would benefit from a dialog regarding expectations and responsibilities of data providers, and the etiquette involved with using others' measurement data. To this end, we provide a set of guidelines that aim to aid the process of sharing measurement data. We present these not as specific rules, but rather a framework under which providers and users can better attain a mutual understanding about how to treat particular datasets.
- Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD). http://crawdad.cs.dartmouth.edu/.Google Scholar
- Enterprise tracing project. http://www.icir.org/linebreak{0}enterprise-tracing/.Google Scholar
- Protected Repository for the Defense of Infrastructure against CyberThreats. http://www.predict.org/.Google Scholar
- M. Allman, E. Blanton, and W. Eddy. A Scalable System for Sharing Internet Measurements. In Passive and Active Measurement Workshop, Mar. 2002.Google Scholar
- E. Blanton. tcpurify, May 2004. http://irg.cs.ohiou.edu/~eblanton/tcpurify/.Google Scholar
- E. Blanton. Personal communication, Apr. 2007.Google Scholar
- S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2007.Google Scholar
- J. Heidemann. Personal communication, Apr. 2007.Google Scholar
- k. claffy, M. Crovella, T. Friedman, C. Shannon, and N. Spring. Community-Oriented Network Measurement Infrastructure (CONMI) Workshop Report. ACM Computer Communication Review, 36(2):41--48, Apr. 2006. Google ScholarDigital Library
- G. Minshall. tcpdpriv, Aug. 1997. http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html.Google Scholar
- F. Monrose and M. Reiter. Personal communication, Apr. 2007.Google Scholar
- R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney. A First Look at Modern Enterprise Traffic. In ACM SIGCOMM/USENIX Internet Measurement Conference, Oct. 2005. Google ScholarDigital Library
- R. Pang, M. Allman, V. Paxson, and J. Lee. The Devil and Packet Trace Anonymization. ACM Computer Communication Review, 36(1), Jan. 2006. Google ScholarDigital Library
- R. Pang and V. Paxson. A High-Level Programming Environment for Packet Trace Anonymization and Transformation. In ACM SIGCOMM, Aug. 2003. Google ScholarDigital Library
- V. Paxson. Internet Traffic Archive.http://ita.ee.lbl.gov/.Google Scholar
- V. Paxson. Strategies for Sound Internet Measurement. In ACM SIGCOMM Internet Measurement Conference, Oct. 2004. Google ScholarDigital Library
- C. Shannon, D. Moore, K. Keys, M. Fomenkov, B. Huffaker, and k. c. claffy. The Internet Measurement Data Catalog. ACM Computer Communication Review, 35(5), Oct. 2005. Google ScholarDigital Library
- J. Xu, J. Fan, M. H. Ammar, and S. B. Moon. Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme. In Proc. of the 10th IEEE International Conference on Network Protocols, 2002. Google ScholarDigital Library
Index Terms
- Issues and etiquette concerning use of shared measurement data
Recommendations
Privacy Preserving Data Analysis with the Encode, Shuffle, Analyse Architecture in Vehicular Data Sharing
EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity ConferenceIn recent years, vehicles have become smarter, with more data being collected and analyzed. With further digitalisation, the importance of data within and around vehicles is only going to increase, allowing stakeholders to generate new and more ...
Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing
CSCS '21: Proceedings of the 5th ACM Computer Science in Cars SymposiumVehicles are becoming interconnected and autonomous while collecting, sharing and processing large amounts of personal, and private data. When developing a service that relies on such data, ensuring privacy preserving data sharing and processing is one ...
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization
Financial Cryptography and Data SecurityAnonymization provides a mechanism for sharing data while obscuring private/sensitive values within the shared data. However, anonymization for sharing also sets up a fundamental tradeoff --- the stronger the anonymization protection, the less ...
Comments