1st International ICST Workshop on Applications of Private and Anonymous Communications

Research Article

Enforcing Behaviour with Anonymity

  • @INPROCEEDINGS{10.1145/1461464.1461468,
        author={Joss Wright and Susan Stepney},
        title={Enforcing Behaviour with Anonymity},
        proceedings={1st International ICST Workshop on Applications of Private and Anonymous Communications},
        publisher={ACM},
        proceedings_a={AIPACA},
        year={2008},
        month={9},
        keywords={Anonymity fairness.},
        doi={10.1145/1461464.1461468}
    }
    
  • Joss Wright
    Susan Stepney
    Year: 2008
    Enforcing Behaviour with Anonymity
    AIPACA
    ACM
    DOI: 10.1145/1461464.1461468
Joss Wright1,*, Susan Stepney1,*
  • 1: University of York Heslington, York. YO10 5DD
*Contact email: joss@cs.york.ac.uk, susan@cs.york.ac.uk

Abstract

We discuss applications of an underlying anonymous infrastructure to enforce fair behaviour on participants in a distributed resource-sharing system. This approach aims to prevent users from forming self-rewarding cliques in order to gain unfair advantages in the use of shared resources. We deliberately avoid considering the more traditional applications of anonymous systems in an attempt to show the potential for the use of restricted access to identifying user information in applications where privacy is not the main motivation. We also briefly explore the problem of enforcing anonymity on users who may not wish to be anonymous, and consider the effect that low-level identification may have on the overall behaviour that we seek to enforce.