Privacy in Context A panel discussion Karen Sollins Overview - - PowerPoint PPT Presentation

privacy in context a panel discussion
SMART_READER_LITE
LIVE PREVIEW

Privacy in Context A panel discussion Karen Sollins Overview - - PowerPoint PPT Presentation

Privacy in Context A panel discussion Karen Sollins Overview Sollins: Introduction, some thoughts for framing Panelists: Tschofenig, Sowell, Clark Discussion: Everyone What is privacy? Information privacy concerns the


slide-1
SLIDE 1

Karen Sollins

Privacy in Context A panel discussion

slide-2
SLIDE 2

► Sollins: Introduction, some thoughts for framing ► Panelists: Tschofenig, Sowell, Clark ► Discussion: Everyone

Overview

slide-3
SLIDE 3

Information privacy concerns the protection of information about individuals and other entities. The environment for privacy is dynamic, reflecting social shifts…, varying and evolving attitudes…, and discontinuities… as well as technological change. Toward Better Usability, Security, and Privacy of Information Technology, National Research Council, 2010

What is “privacy”?

slide-4
SLIDE 4

► Paper by Hansen and Pfitzmann, and more recently

Tschofenig: Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, August 11, 2010, Internet Draft

Introduction

slide-5
SLIDE 5

The Scenario

Alice Bob Malice Carol Accomplice (2) Senders (3) Recipients (1) Communication Network

Msg from Alice Msg from Bob Msg from Malice

System: Universe

slide-6
SLIDE 6

► From perspective attacker interested in:

► What communications occur ► Patterns of communication ► Manipulation of communication

► Perspective

► All possible observations must be considered ► Focus on items of interest (IOI): subjects, messages, actions ► Can learn (actor, action, object) ► Later can learn attributes/values of an IOI

The basis

slide-7
SLIDE 7

► Definition of anonymity: attacker cannot sufficiently

identify the subject from with a set of subjects, the anonymity set.

► Shared observable attributes

► Definition of anonymity delta: specifies subject’s

anonymity difference between

► Subject’s anonymity given the attacker’s observations ► Subject’s anonymity given the attacker’s a priori knowledge

  • nly

Anonymity

slide-8
SLIDE 8

► Definition of unlinkability: given two IOIs, from within

the system the attacker cannot sufficiently distinguish whether they are related or not.

► Reconsidering anonymity:

► Anonymity: unlinkability of subject and attribute ► Consider attribute of “having sent a message m” ► New def. of Anonymity: whether subject is anonymous within

the “sender-of-m anonymity set”

Unlinkability

slide-9
SLIDE 9

Definition of undetectability: from the attacker’s perspective, the attacker cannot sufficiently detect whether a particular IOI exists

  • r not. (Example: steganography)

Unobservability of communication (IOI)

► Two parts

► Subjects not involved can know nothing about the IOI or subjects ► Subjects involved can only know about the IOI itself, but nothing

about the other subjects (preserves anonymity)

► Definition: (a) preserves undetectability of IOI from all

uninvolved subjects, (b) preserves anonymity of all subjects in IOI including other participants in the IOI.

Undetectability and Unobservability

slide-10
SLIDE 10

Unobservability

Alice Bob Malice Carol Accomplice (2) Senders (3) Recipients (1) Communication Network

Msg from Alice Msg from Bob Msg from Malice

System: Universe Unobservability sets

slide-11
SLIDE 11

► Accountability and anonymity: extremes from each

  • ther

► Pseudonymity

► Identifier used instead of real identifier ► Can be used for subsets of IOIs and attributes ► Can be used in credentials ► Can be used for: person, role, relationship, role-relationship,

transaction

► Fills the gap between accountability and anonymity

The spectrum

slide-12
SLIDE 12

► Hannes Tschofenig, NSN: Privacy and Standards ► Jesse Sowell, MIT: Privacy and Regulation ► Dave Clark, MIT: Privacy and Accountability ► Open discussion

What next: