University of Piraeus
      Department of Digital Systems

Post graduate Programme in Digital Systems
                 Security

              Master Thesis

Privacy Techniques in Fourth Generation
        Heterogeneous Networks

                         Dimitris Gkikakis

           Supervising Professor: Christos Xenakis
Contents
 Problem
 Related
 Scope
 Requirements
 Proposed Architecture
 Proposed Signaling
 Evaluation




                          2
Problem
 Plethora of data for internet services
 Data mining techniques
 Credit card information exposed
 Smartphone era




                                           3
Related
 PETs
 E-commerce
 LBSs




               4
Scope
 A model that could be deployed in the
  current & future mobile networks
 Privacy
 E-commerce
 Security




                                          5
Requirements
 Privacy
    Pseudonymity
    Unlinkability
    Traceability
 Trust
    Based on existing Trust relationship
 Security
    Confidentiality
    Integrity
    Authenticity
 Business Model                            6
    Micropayments
Architecture




               7
DB entries




             8
Signaling




            9
Evaluation
 High level of Privacy
 High level of Security
 Ease of deployment
 Financial transactions without exposing
 personal information
 New IP address allocation for each
 connection
 Insider threat




                                       10

Privacy Techniques in Fourth Generation Heterogeneous Networks

  • 1.
    University of Piraeus Department of Digital Systems Post graduate Programme in Digital Systems Security Master Thesis Privacy Techniques in Fourth Generation Heterogeneous Networks Dimitris Gkikakis Supervising Professor: Christos Xenakis
  • 2.
    Contents  Problem  Related Scope  Requirements  Proposed Architecture  Proposed Signaling  Evaluation 2
  • 3.
    Problem  Plethora ofdata for internet services  Data mining techniques  Credit card information exposed  Smartphone era 3
  • 4.
  • 5.
    Scope  A modelthat could be deployed in the current & future mobile networks  Privacy  E-commerce  Security 5
  • 6.
    Requirements  Privacy  Pseudonymity  Unlinkability  Traceability  Trust  Based on existing Trust relationship  Security  Confidentiality  Integrity  Authenticity  Business Model 6  Micropayments
  • 7.
  • 8.
  • 9.
  • 10.
    Evaluation High levelof Privacy High level of Security Ease of deployment Financial transactions without exposing personal information New IP address allocation for each connection Insider threat 10

Editor's Notes

  • #4 Plethora of data for internet services & data mining techniques - violate the right to be left alone Credit card info exposed- credit card fraud