Towards a mechanism for incentivating privacy Piero Bonatti, Marco - - PowerPoint PPT Presentation

towards a mechanism for incentivating privacy
SMART_READER_LITE
LIVE PREVIEW

Towards a mechanism for incentivating privacy Piero Bonatti, Marco - - PowerPoint PPT Presentation

Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universit` a di Napoli Federico II, Italy Leuven, 14/9/2011 ESORICS11 14/9/2011 Introduction The economic value of user


slide-1
SLIDE 1

Towards a mechanism for incentivating privacy

Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro

Universit` a di Napoli “Federico II”, Italy

Leuven, 14/9/2011

ESORICS’11 – 14/9/2011

slide-2
SLIDE 2

Introduction

The economic value of user profiles

Rich user profiles = Money An incentive for providers to collect lots of personal (sensitive) information (and sell it!)

user name, birth date, gender, detailed address, credit card information

ESORICS’11 – 14/9/2011

slide-3
SLIDE 3

Introduction

The economic value of user profiles

Rich user profiles = Money An incentive for providers to collect lots of personal (sensitive) information (and sell it!)

user name, birth date, gender, detailed address, credit card information lots of quasi-identifiers

ESORICS’11 – 14/9/2011

slide-4
SLIDE 4

Introduction

The economic value of user profiles

Rich user profiles = Money An incentive for providers to collect lots of personal (sensitive) information (and sell it!)

user name, birth date, gender, detailed address, credit card information lots of quasi-identifiers even sex preferences, and political and religious views

ESORICS’11 – 14/9/2011

slide-5
SLIDE 5

Introduction

Privacy-related questions

Is all of the profile necessary for deploying services effectively and securely ?

ESORICS’11 – 14/9/2011

slide-6
SLIDE 6

Introduction

Privacy-related questions

Is all of the profile necessary for deploying services effectively and securely ? Is anything preventing providers from collecting more and more information ?

ESORICS’11 – 14/9/2011

slide-7
SLIDE 7

Introduction

Privacy-related questions

Is all of the profile necessary for deploying services effectively and securely ? Is anything preventing providers from collecting more and more information ? Is there any mechanism for minimizing provider requests?

ESORICS’11 – 14/9/2011

slide-8
SLIDE 8

Introduction

Privacy through competition

Many people do care about privacy

large groups of Facebook users threatened to leave and join

  • ther networks several times

Facebook had to stop and reshape some of its new services

ESORICS’11 – 14/9/2011

slide-9
SLIDE 9

Introduction

Privacy through competition

Many people do care about privacy

large groups of Facebook users threatened to leave and join

  • ther networks several times

Facebook had to stop and reshape some of its new services

Several analysts say that privacy may become a factor of competition

ESORICS’11 – 14/9/2011

slide-10
SLIDE 10

Introduction

Privacy through competition

Many people do care about privacy

large groups of Facebook users threatened to leave and join

  • ther networks several times

Facebook had to stop and reshape some of its new services

Several analysts say that privacy may become a factor of competition Our ultimate goal:

developing mechanisms that moderate profile collection through provider competition

ESORICS’11 – 14/9/2011

slide-11
SLIDE 11

The first step

(this paper)

Truthful mechanisms

i.e. providers ask for the user information they really need because that’s the best strategy

ESORICS’11 – 14/9/2011

slide-12
SLIDE 12

The first step

(this paper)

Truthful mechanisms

i.e. providers ask for the user information they really need because that’s the best strategy

Second-price auctions (a.k.a. Vickrey’s auctions)

perhaps the most popular truthful mechanism

ESORICS’11 – 14/9/2011

slide-13
SLIDE 13

The first step

(this paper)

Truthful mechanisms

i.e. providers ask for the user information they really need because that’s the best strategy

Second-price auctions (a.k.a. Vickrey’s auctions)

perhaps the most popular truthful mechanism

Technical problems

  • ur “currency” (profiles) is only partially ordered

there is no “second price”

ESORICS’11 – 14/9/2011

slide-14
SLIDE 14

The first step

(this paper)

Truthful mechanisms

i.e. providers ask for the user information they really need because that’s the best strategy

Second-price auctions (a.k.a. Vickrey’s auctions)

perhaps the most popular truthful mechanism

Technical problems

  • ur “currency” (profiles) is only partially ordered

there is no “second price”

First technical investigation

Is there any truthful mechanism compatible with the structure

  • f our scenarios ?

ESORICS’11 – 14/9/2011

slide-15
SLIDE 15

The Formal Framework – Auction-like mechanism

V 0.0

Protocol:

1

User asks for a service

ESORICS’11 – 14/9/2011

slide-16
SLIDE 16

The Formal Framework – Auction-like mechanism

V 0.0

Protocol:

1

User asks for a service

2

Providers respond with their information requests, e.g. {login, password} or {credit-card, ID}

ESORICS’11 – 14/9/2011

slide-17
SLIDE 17

The Formal Framework – Auction-like mechanism

V 0.0

Protocol:

1

User asks for a service

2

Providers respond with their information requests, e.g. {login, password} or {credit-card, ID}

3

User selects provider (user ∼ auctioneer, providers ∼ bidders)

ESORICS’11 – 14/9/2011

slide-18
SLIDE 18

The Formal Framework – Auction-like mechanism

V 0.0

Protocol:

1

User asks for a service

2

Providers respond with their information requests, e.g. {login, password} or {credit-card, ID}

3

User selects provider (user ∼ auctioneer, providers ∼ bidders)

Information items (called credentials) are not equally sensitive {prepaid-card} ≺ {birthdate,zip}

(strict partial order)

ESORICS’11 – 14/9/2011

slide-19
SLIDE 19

The Formal Framework – Auction-like mechanism

V 0.0

Protocol:

1

User asks for a service

2

Providers respond with their information requests, e.g. {login, password} or {credit-card, ID}

3

User selects provider (user ∼ auctioneer, providers ∼ bidders)

Information items (called credentials) are not equally sensitive {prepaid-card} ≺ {birthdate,zip}

(strict partial order)

Simplifying assumptions (to be dropped)

providers offer functionally equivalent services information-disclosure costs only (e.g. flight booking like Kayak, Momondo, ...)

ESORICS’11 – 14/9/2011

slide-20
SLIDE 20

The Formal Framework – Auction-like mechanism

V 0.0

Protocol:

1

User asks for a service

2

Providers respond with their information requests, e.g. {login, password} or {credit-card, ID}

3

User selects provider (user ∼ auctioneer, providers ∼ bidders)

Information items (called credentials) are not equally sensitive {prepaid-card} ≺ {birthdate,zip}

(strict partial order)

Simplifying assumptions (to be dropped)

providers offer functionally equivalent services information-disclosure costs only (e.g. flight booking like Kayak, Momondo, ...) ⇓ users choose providers based on information requests only repeated service usage has no additional costs

ESORICS’11 – 14/9/2011

slide-21
SLIDE 21

The Formal Framework – User privacy constraints

V 0.0

User privacy constraints (user policy): maximal disclosable sets {zip,nationality} or {credit-card, birthdate}

ESORICS’11 – 14/9/2011

slide-22
SLIDE 22

The Formal Framework – User privacy constraints

V 0.0

User privacy constraints (user policy): maximal disclosable sets {zip,nationality} or {credit-card, birthdate}

zip is OK; credit-card + birthdate is OK

ESORICS’11 – 14/9/2011

slide-23
SLIDE 23

The Formal Framework – User privacy constraints

V 0.0

User privacy constraints (user policy): maximal disclosable sets {zip,nationality} or {credit-card, birthdate}

zip is OK; credit-card + birthdate is OK zip + birthdate not releasable

ESORICS’11 – 14/9/2011

slide-24
SLIDE 24

The Formal Framework – User privacy constraints

V 0.0

User privacy constraints (user policy): maximal disclosable sets {zip,nationality} or {credit-card, birthdate}

zip is OK; credit-card + birthdate is OK zip + birthdate not releasable

Admissible requests

Let adm be the set of all requests (sets of items) that satisfy the user’s privacy preferences

ESORICS’11 – 14/9/2011

slide-25
SLIDE 25

The Formal Framework – Provider policy

V 0.0

Provider policy: minimal acceptable sets (for service access) {login,password} or {credit-card, exp-date,username,...}

ESORICS’11 – 14/9/2011

slide-26
SLIDE 26

The Formal Framework – Provider policy

V 0.0

Provider policy: minimal acceptable sets (for service access) {login,password} or {credit-card, exp-date,username,...}

login + password + credit-card is OK

ESORICS’11 – 14/9/2011

slide-27
SLIDE 27

The Formal Framework – Provider policy

V 0.0

Provider policy: minimal acceptable sets (for service access) {login,password} or {credit-card, exp-date,username,...}

login + password + credit-card is OK login + credit-card not enough

ESORICS’11 – 14/9/2011

slide-28
SLIDE 28

The Formal Framework – Provider policy

V 0.0

Provider policy: minimal acceptable sets (for service access) {login,password} or {credit-card, exp-date,username,...}

login + password + credit-card is OK login + credit-card not enough

Fulfilling disclosures

Let ful(poli) be all sets of items that satisfy provider i’s policy

ESORICS’11 – 14/9/2011

slide-29
SLIDE 29

The Formal Framework – Provider requests (strategies)

V 0.0

Request policy

they have the same structure, though (a list of info sets) reqi denotes the information request of provider i (its strategy)

ESORICS’11 – 14/9/2011

slide-30
SLIDE 30

The Formal Framework – Provider requests (strategies)

V 0.0

Request policy

they have the same structure, though (a list of info sets) reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets {credit-card, ID, SSN} or ...

ESORICS’11 – 14/9/2011

slide-31
SLIDE 31

The Formal Framework – Provider requests (strategies)

V 0.0

Request policy

they have the same structure, though (a list of info sets) reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets {credit-card, ID, SSN} or ... Providers may omit alternatives

e.g. omit student-id because passport is “richer” {credit-card, student-id} or {credit-card, passport}

ESORICS’11 – 14/9/2011

slide-32
SLIDE 32

The Formal Framework – Provider requests (strategies)

V 0.0

Request policy

they have the same structure, though (a list of info sets) reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets {credit-card, ID, SSN} or ... Providers may omit alternatives

e.g. omit student-id because passport is “richer” {credit-card, student-id} or {credit-card, passport}

A strategy reqi is truthful if reqi = poli

ESORICS’11 – 14/9/2011

slide-33
SLIDE 33

The Formal Framework – Provider requests (strategies)

V 0.0

Request policy

they have the same structure, though (a list of info sets) reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets {credit-card, ID, SSN} or ... Providers may omit alternatives

e.g. omit student-id because passport is “richer” {credit-card, student-id} or {credit-card, passport}

A strategy reqi is truthful if reqi = poli Users must release a set in ful(reqi)

ESORICS’11 – 14/9/2011

slide-34
SLIDE 34

The Formal Framework – Provider requests (strategies)

V 0.0

Request policy

they have the same structure, though (a list of info sets) reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets {credit-card, ID, SSN} or ... Providers may omit alternatives

e.g. omit student-id because passport is “richer” {credit-card, student-id} or {credit-card, passport}

A strategy reqi is truthful if reqi = poli Users must release a set in ful(reqi) Each set in reqi must be in ful(poli)

ESORICS’11 – 14/9/2011

slide-35
SLIDE 35

Provider goals

Which information sets do they prefer?

larger (w.r.t. ⊆) more sensitive (w.r.t. ≺)

hypothesis: more sensitive ⇒ more valuable

ESORICS’11 – 14/9/2011

slide-36
SLIDE 36

Provider goals

Which information sets do they prefer?

larger (w.r.t. ⊆) more sensitive (w.r.t. ≺)

hypothesis: more sensitive ⇒ more valuable

What are their priorities?

getting preferred info sets winning (i.e. being selected)

ESORICS’11 – 14/9/2011

slide-37
SLIDE 37

Profiles

A profile π is a vector that summarizes the whole scenario

user policy all provider policies, strategies, and preferences

ESORICS’11 – 14/9/2011

slide-38
SLIDE 38

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario π reqi ∩ opt(π) ∅

  • pt(π) = min ≺

        

N

  • j=1

reqj ∩ adm

        

ESORICS’11 – 14/9/2011

slide-39
SLIDE 39

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario π reqi ∩ opt(π) ∅

  • pt(π) = min ≺

        

N

  • j=1

reqj ∩ adm

        

ESORICS’11 – 14/9/2011

slide-40
SLIDE 40

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario π reqi ∩ opt(π) ∅

  • pt(π) = min ≺

        

N

  • j=1

reqj ∩ adm

        

ESORICS’11 – 14/9/2011

slide-41
SLIDE 41

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario π reqi ∩ opt(π) ∅

  • pt(π) = min ≺

        

N

  • j=1

reqj ∩ adm

        

1

Choose some provider i ∈ cw(π) (randomly)

ESORICS’11 – 14/9/2011

slide-42
SLIDE 42

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario π reqi ∩ opt(π) ∅

  • pt(π) = min ≺

        

N

  • j=1

reqj ∩ adm

        

1

Choose some provider i ∈ cw(π) (randomly)

2

Choose a set of credentials from res(π, i) and disclose it to i

if res(π, i) = ∅ the transaction fails how to define res(π, i) ?

ESORICS’11 – 14/9/2011

slide-43
SLIDE 43

The right notion of response

Some definitions introduce additional failures (see the paper) Some don’t, but release lots of information items (see the paper) Other variants make it profitable to lie Vaults are the best solution so far

the largest admissible responses that are not more sensitive than any other provider’s request

vault(π, i) = max ⊆

  • r | r ∈ adm ∧ ∀r′ ∈ opt−i(π). r′ ⊀ r
  • .

ESORICS’11 – 14/9/2011

slide-44
SLIDE 44

The right notion of response

Some definitions introduce additional failures (see the paper) Some don’t, but release lots of information items (see the paper) Other variants make it profitable to lie Vaults are the best solution so far

the largest admissible responses that are not more sensitive than any other provider’s request

vault(π, i) = max ⊆

  • r | r ∈ adm ∧ ∀r′ ∈ opt−i(π). r′ ⊀ r
  • .

ESORICS’11 – 14/9/2011

slide-45
SLIDE 45

The right notion of response

Some definitions introduce additional failures (see the paper) Some don’t, but release lots of information items (see the paper) Other variants make it profitable to lie Vaults are the best solution so far

the largest admissible responses that are not more sensitive than any other provider’s request

vault(π, i) = max ⊆

  • r | r ∈ adm ∧ ∀r′ ∈ opt−i(π). r′ ⊀ r
  • .

ESORICS’11 – 14/9/2011

slide-46
SLIDE 46

The right notion of response

Some definitions introduce additional failures (see the paper) Some don’t, but release lots of information items (see the paper) Other variants make it profitable to lie Vaults are the best solution so far

the largest admissible responses that are not more sensitive than any other provider’s request

vault(π, i) = max ⊆

  • r | r ∈ adm ∧ ∀r′ ∈ opt−i(π). r′ ⊀ r
  • .

ESORICS’11 – 14/9/2011

slide-47
SLIDE 47

The right notion of response

Some definitions introduce additional failures (see the paper) Some don’t, but release lots of information items (see the paper) Other variants make it profitable to lie Vaults are the best solution so far

the largest admissible responses that are not more sensitive than any other provider’s request

vault(π, i) = max ⊆

  • r | r ∈ adm ∧ ∀r′ ∈ opt−i(π). r′ ⊀ r
  • .

Responses must also fulfil some of i’s optimal requests res(π, i) = vault(π, i) ∩ ful(opt(π) ∩ reqi) .

ESORICS’11 – 14/9/2011

slide-48
SLIDE 48

Analogy with second price

Vickrey’s auctions

The winner pays the minimum price that is not worse (i.e., smaller) than any other offer (and satisfies the winner’s request)

Vault-based mechanism

The winner gets a maximal response that is not worse (i.e., more sensitive) than any other offer, and satisfies both the user’s policy and the winner’s request

ESORICS’11 – 14/9/2011

slide-49
SLIDE 49

Results

comparison with other res we tried

The vault-based definition of res

does not fail if at least one provider makes an admissible request it never releases more information than the other response functions with the same property

ESORICS’11 – 14/9/2011

slide-50
SLIDE 50

Results

releasing maximal admissible sets

In general, a provider may get more than what it asked for

as in 2nd price auctions the price to pay for truthfulness nonetheless...

ESORICS’11 – 14/9/2011

slide-51
SLIDE 51

Results

releasing maximal admissible sets

In general, a provider may get more than what it asked for

as in 2nd price auctions the price to pay for truthfulness nonetheless...

The vault-based definition of res may release a maximal admissible set r only if

either there is no competition

  • r some j asks exactly for r

in practice, systematic exploitation requires exact knowledge of user preferences

ESORICS’11 – 14/9/2011

slide-52
SLIDE 52

Results

truthfulness

The vault-based mechanism is truthful, i.e. reqi = poli is the most effective strategy

both for the providers that give higher priority to getting more preferred sets (larger or more sensitive) and for the providers that give higher priority to winning

ESORICS’11 – 14/9/2011

slide-53
SLIDE 53

Results

truthfulness

The vault-based mechanism is truthful, i.e. reqi = poli is the most effective strategy

both for the providers that give higher priority to getting more preferred sets (larger or more sensitive) and for the providers that give higher priority to winning

Knowledge about the other agents’ behavior does not affect truthfulness

ESORICS’11 – 14/9/2011

slide-54
SLIDE 54

Results

truthfulness

The vault-based mechanism is truthful, i.e. reqi = poli is the most effective strategy

both for the providers that give higher priority to getting more preferred sets (larger or more sensitive) and for the providers that give higher priority to winning

Knowledge about the other agents’ behavior does not affect truthfulness (Minimal disclosures) If all providers have the same policy

by exhogenous technological constraints e.g. because they support the same credit card companies

and i is rational/truthful, then:

ESORICS’11 – 14/9/2011

slide-55
SLIDE 55

Results

truthfulness

The vault-based mechanism is truthful, i.e. reqi = poli is the most effective strategy

both for the providers that give higher priority to getting more preferred sets (larger or more sensitive) and for the providers that give higher priority to winning

Knowledge about the other agents’ behavior does not affect truthfulness (Minimal disclosures) If all providers have the same policy

by exhogenous technological constraints e.g. because they support the same credit card companies

and i is rational/truthful, then:

all other agents j i can get only elements of polj if some k i is rational/truthful, too, then all providers j can get

  • nly elements of polj

ESORICS’11 – 14/9/2011

slide-56
SLIDE 56

Related work

nothing really similar

In trust negotiation

no equivalent to poli: TN policies ≈ reqi no attempt to minimize provider requests

ESORICS’11 – 14/9/2011

slide-57
SLIDE 57

Related work

nothing really similar

In trust negotiation

no equivalent to poli: TN policies ≈ reqi no attempt to minimize provider requests

In [Feigenbaum et al 2010] the goal is minimizing the information that bidders (providers) have to disclose to the auctioneer

ESORICS’11 – 14/9/2011

slide-58
SLIDE 58

Related work

nothing really similar

In trust negotiation

no equivalent to poli: TN policies ≈ reqi no attempt to minimize provider requests

In [Feigenbaum et al 2010] the goal is minimizing the information that bidders (providers) have to disclose to the auctioneer In [Kleinberg et al 2001] the goal is inducing users to release more (and more accurate) information about their preferences, by means of compensation

ESORICS’11 – 14/9/2011

slide-59
SLIDE 59

Related work

nothing really similar

In trust negotiation

no equivalent to poli: TN policies ≈ reqi no attempt to minimize provider requests

In [Feigenbaum et al 2010] the goal is minimizing the information that bidders (providers) have to disclose to the auctioneer In [Kleinberg et al 2001] the goal is inducing users to release more (and more accurate) information about their preferences, by means of compensation To the best of our knowledge, no auction mechanism deals with partially ordered payment means.

ESORICS’11 – 14/9/2011

slide-60
SLIDE 60

Conclusion

Achievements

Competition between equivalent applications provably minimizes the amount of personal information requested by rational providers

ESORICS’11 – 14/9/2011

slide-61
SLIDE 61

Conclusion

Achievements

Competition between equivalent applications provably minimizes the amount of personal information requested by rational providers Possible applications

preventing attacks to TN strategies that gradually extract all releasable information from the user agent

ESORICS’11 – 14/9/2011

slide-62
SLIDE 62

Conclusion

Achievements

Competition between equivalent applications provably minimizes the amount of personal information requested by rational providers Possible applications

preventing attacks to TN strategies that gradually extract all releasable information from the user agent enhancing the privacy of profile transfers (as in OpenID)

transfer only what the new provider asks for (minimized through competition)

ESORICS’11 – 14/9/2011

slide-63
SLIDE 63

Conclusion

Future work: A long to-do list (details in the paper)

Introduce service costs, functional differences, quality of service...

information requests are not the only choice criterion any longer

  • pportunities for compensation and negotiation/repeated

auctions

ESORICS’11 – 14/9/2011

slide-64
SLIDE 64

Conclusion

Future work: A long to-do list (details in the paper)

Introduce service costs, functional differences, quality of service...

information requests are not the only choice criterion any longer

  • pportunities for compensation and negotiation/repeated

auctions

Deployment issues

Providing guarantees to providers, e.g.

Cryptographic protocols for checking that the user carries out the auction correctly (e.g. via commitments & blind signatures, secure multiparty computations) Trusted third parties: a new role for portals like Kayak, Momondo etc.?

ESORICS’11 – 14/9/2011

slide-65
SLIDE 65

The End

Question time

ESORICS’11 – 14/9/2011