This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Centralized Web Proxy Services: Security and Privacy Considerations
November/December 2007 (vol. 11 no. 6)
pp. 46-52
Guy-Vincent Jourdan, University of Ottawa
The widespread use of centrally controlled, externally run Web proxy services has several potential security issues related to privacy and deception, intranet information disclosure, and the creation of a single point of failure for widespread attacks. The author evaluates the security implications of such a Web proxy service from the viewpoints of users, organizations, and content providers. The discussion is illustrated with an analysis of Google's Web Accelerator, a free Web proxy service.

1. R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2001
2. A. Luotonen and K. Altis, "World-Wide Web Proxies," Computer Networks and ISDN Systems, vol. 27, no. 2, 1994, pp. 147–154.
3. J. Wang, "A Survey of Web Caching Schemes for the Internet," ACM SIGCOMM Computer Comm. Rev., vol. 29, no. 5, 1999, pp. 36–46.
4. A. Rousskov and V. Soloviev, "A Performance Study of the Squid Proxy on HTTP/1.0," World Wide Web, vol. 2, nos. 1–2, 1999, pp. 47–67.
5. J. Domènech et al., "The Impact of the Web Prefetching Architecture on the Limits of Reducing User's Perceived Latency," Proc. IEEE/ACM Int'l Conf. Web Intelligence, IEEE CS Press, 2006, pp. 740–744.
6. J. Domènech et al., "DDG: An Efficient Prefetching Algorithm for Current Web Generation," IEEE Workshop on Hot Topics in Web Systems and Technologies, IEEE CS Press, 2006, pp. 1–12.
7. C. Bouras, A. Konidaris, and D. Kostoulas, "Predictive Prefetching on the Web and Its Potential Impact in the Wide Area," World Wide Web, vol. 7, no. 2, 2004, pp. 143–179.
8. K. Lau and Y.-K. Ng, "A Client-Based Web Prefetching Management System Based on Detection Theory," Web Content Caching and Distribution, LNCS 3293, Springer-Verlag, 2004, pp. 129–143.
9. B. Berendt et al., "The Impact of Site Structure and User Environment on Session Reconstruction in Web Usage Analysis," Proc. 4th Int'l Workshop on Web Mining for Usage Patterns and User Profiles (WEBKDED 02), LNCS 2703, Springer-Verlag, 2003, pp. 159–179.

Index Terms:
social search, proxy services, Web services
Citation:
Guy-Vincent Jourdan, "Centralized Web Proxy Services: Security and Privacy Considerations," IEEE Internet Computing, vol. 11, no. 6, pp. 46-52, Nov.-Dec. 2007, doi:10.1109/MIC.2007.122
Usage of this product signifies your acceptance of the Terms of Use.