Australian Information Security Management Conference

Document Type

Conference Proceeding


School of Computer and Information Science, Edith Cowan University, Perth, Western Australia


4th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia, 5th December, 2006


The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs). Among the Internet users, there are attackers who desire more than anything else to enjoy privacy during their malicious actions, and a PET is what they were looking for. Thus, although a PET should offer privacy to the internet users, proper techniques should also be employed in order to help the victims during the investigation procedure and unveil the identification of the attackers. The paper summarizes the current design issues of PETs and introduces additional issues in order to offer forensic investigation services. To the best of our knowledge this is the first attempt which it proves (the obvious) that the existing PETs do not meet accountability requirements. By knowing explicitly the reasons the PETs are inefficient offering accountability, it is the most appropriate way to make PETs offering higher level of accountability without decreasing the level of the privacy offered.