This Article 
 Bibliographic References 
 Add to: 
Centralized Web Proxy Services: Security and Privacy Considerations
November/December 2007 (vol. 11 no. 6)
pp. 46-52
Guy-Vincent Jourdan, University of Ottawa
The widespread use of centrally controlled, externally run Web proxy services has several potential security issues related to privacy and deception, intranet information disclosure, and the creation of a single point of failure for widespread attacks. The author evaluates the security implications of such a Web proxy service from the viewpoints of users, organizations, and content providers. The discussion is illustrated with an analysis of Google's Web Accelerator, a free Web proxy service.

1. R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2001
2. A. Luotonen and K. Altis, "World-Wide Web Proxies," Computer Networks and ISDN Systems, vol. 27, no. 2, 1994, pp. 147–154.
3. J. Wang, "A Survey of Web Caching Schemes for the Internet," ACM SIGCOMM Computer Comm. Rev., vol. 29, no. 5, 1999, pp. 36–46.
4. A. Rousskov and V. Soloviev, "A Performance Study of the Squid Proxy on HTTP/1.0," World Wide Web, vol. 2, nos. 1–2, 1999, pp. 47–67.
5. J. Domènech et al., "The Impact of the Web Prefetching Architecture on the Limits of Reducing User's Perceived Latency," Proc. IEEE/ACM Int'l Conf. Web Intelligence, IEEE CS Press, 2006, pp. 740–744.
6. J. Domènech et al., "DDG: An Efficient Prefetching Algorithm for Current Web Generation," IEEE Workshop on Hot Topics in Web Systems and Technologies, IEEE CS Press, 2006, pp. 1–12.
7. C. Bouras, A. Konidaris, and D. Kostoulas, "Predictive Prefetching on the Web and Its Potential Impact in the Wide Area," World Wide Web, vol. 7, no. 2, 2004, pp. 143–179.
8. K. Lau and Y.-K. Ng, "A Client-Based Web Prefetching Management System Based on Detection Theory," Web Content Caching and Distribution, LNCS 3293, Springer-Verlag, 2004, pp. 129–143.
9. B. Berendt et al., "The Impact of Site Structure and User Environment on Session Reconstruction in Web Usage Analysis," Proc. 4th Int'l Workshop on Web Mining for Usage Patterns and User Profiles (WEBKDED 02), LNCS 2703, Springer-Verlag, 2003, pp. 159–179.

Index Terms:
social search, proxy services, Web services
Guy-Vincent Jourdan, "Centralized Web Proxy Services: Security and Privacy Considerations," IEEE Internet Computing, vol. 11, no. 6, pp. 46-52, Nov.-Dec. 2007, doi:10.1109/MIC.2007.122
Usage of this product signifies your acceptance of the Terms of Use.