towards a mechanism for incentivating privacy
play

Towards a mechanism for incentivating privacy Piero Bonatti, Marco - PowerPoint PPT Presentation

Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universit` a di Napoli Federico II, Italy Leuven, 14/9/2011 ESORICS11 14/9/2011 Introduction The economic value of user


  1. Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universit` a di Napoli “Federico II”, Italy Leuven, 14/9/2011 ESORICS’11 – 14/9/2011

  2. Introduction The economic value of user profiles Rich user profiles = Money An incentive for providers to collect lots of personal (sensitive) information (and sell it!) user name, birth date, gender, detailed address, credit card information ESORICS’11 – 14/9/2011

  3. Introduction The economic value of user profiles Rich user profiles = Money An incentive for providers to collect lots of personal (sensitive) information (and sell it!) user name, birth date, gender, detailed address, credit card information lots of quasi-identifiers ESORICS’11 – 14/9/2011

  4. Introduction The economic value of user profiles Rich user profiles = Money An incentive for providers to collect lots of personal (sensitive) information (and sell it!) user name, birth date, gender, detailed address, credit card information lots of quasi-identifiers even sex preferences, and political and religious views ESORICS’11 – 14/9/2011

  5. Introduction Privacy-related questions Is all of the profile necessary for deploying services effectively and securely ? ESORICS’11 – 14/9/2011

  6. Introduction Privacy-related questions Is all of the profile necessary for deploying services effectively and securely ? Is anything preventing providers from collecting more and more information ? ESORICS’11 – 14/9/2011

  7. Introduction Privacy-related questions Is all of the profile necessary for deploying services effectively and securely ? Is anything preventing providers from collecting more and more information ? Is there any mechanism for minimizing provider requests? ESORICS’11 – 14/9/2011

  8. Introduction Privacy through competition Many people do care about privacy large groups of Facebook users threatened to leave and join other networks several times Facebook had to stop and reshape some of its new services ESORICS’11 – 14/9/2011

  9. Introduction Privacy through competition Many people do care about privacy large groups of Facebook users threatened to leave and join other networks several times Facebook had to stop and reshape some of its new services Several analysts say that privacy may become a factor of competition ESORICS’11 – 14/9/2011

  10. Introduction Privacy through competition Many people do care about privacy large groups of Facebook users threatened to leave and join other networks several times Facebook had to stop and reshape some of its new services Several analysts say that privacy may become a factor of competition Our ultimate goal: developing mechanisms that moderate profile collection through provider competition ESORICS’11 – 14/9/2011

  11. The first step (this paper) Truthful mechanisms i.e. providers ask for the user information they really need because that’s the best strategy ESORICS’11 – 14/9/2011

  12. The first step (this paper) Truthful mechanisms i.e. providers ask for the user information they really need because that’s the best strategy Second-price auctions (a.k.a. Vickrey’s auctions) perhaps the most popular truthful mechanism ESORICS’11 – 14/9/2011

  13. The first step (this paper) Truthful mechanisms i.e. providers ask for the user information they really need because that’s the best strategy Second-price auctions (a.k.a. Vickrey’s auctions) perhaps the most popular truthful mechanism Technical problems our “currency” (profiles) is only partially ordered there is no “second price” ESORICS’11 – 14/9/2011

  14. The first step (this paper) Truthful mechanisms i.e. providers ask for the user information they really need because that’s the best strategy Second-price auctions (a.k.a. Vickrey’s auctions) perhaps the most popular truthful mechanism Technical problems our “currency” (profiles) is only partially ordered there is no “second price” First technical investigation Is there any truthful mechanism compatible with the structure of our scenarios ? ESORICS’11 – 14/9/2011

  15. The Formal Framework – Auction-like mechanism V 0.0 Protocol: User asks for a service 1 ESORICS’11 – 14/9/2011

  16. The Formal Framework – Auction-like mechanism V 0.0 Protocol: User asks for a service 1 Providers respond with their information requests, e.g. 2 { login, password } or { credit-card, ID } ESORICS’11 – 14/9/2011

  17. The Formal Framework – Auction-like mechanism V 0.0 Protocol: User asks for a service 1 Providers respond with their information requests, e.g. 2 { login, password } or { credit-card, ID } User selects provider (user ∼ auctioneer, providers ∼ bidders) 3 ESORICS’11 – 14/9/2011

  18. The Formal Framework – Auction-like mechanism V 0.0 Protocol: User asks for a service 1 Providers respond with their information requests, e.g. 2 { login, password } or { credit-card, ID } User selects provider (user ∼ auctioneer, providers ∼ bidders) 3 Information items (called credentials ) are not equally sensitive { prepaid-card } ≺ { birthdate,zip } (strict partial order) ESORICS’11 – 14/9/2011

  19. The Formal Framework – Auction-like mechanism V 0.0 Protocol: User asks for a service 1 Providers respond with their information requests, e.g. 2 { login, password } or { credit-card, ID } User selects provider (user ∼ auctioneer, providers ∼ bidders) 3 Information items (called credentials ) are not equally sensitive { prepaid-card } ≺ { birthdate,zip } (strict partial order) Simplifying assumptions (to be dropped) providers offer functionally equivalent services information-disclosure costs only (e.g. flight booking like Kayak, Momondo, ...) ESORICS’11 – 14/9/2011

  20. The Formal Framework – Auction-like mechanism V 0.0 Protocol: User asks for a service 1 Providers respond with their information requests, e.g. 2 { login, password } or { credit-card, ID } User selects provider (user ∼ auctioneer, providers ∼ bidders) 3 Information items (called credentials ) are not equally sensitive { prepaid-card } ≺ { birthdate,zip } (strict partial order) Simplifying assumptions (to be dropped) providers offer functionally equivalent services information-disclosure costs only (e.g. flight booking like Kayak, Momondo, ...) ⇓ users choose providers based on information requests only repeated service usage has no additional costs ESORICS’11 – 14/9/2011

  21. The Formal Framework – User privacy constraints V 0.0 User privacy constraints (user policy): maximal disclosable sets { zip,nationality } or { credit-card, birthdate } ESORICS’11 – 14/9/2011

  22. The Formal Framework – User privacy constraints V 0.0 User privacy constraints (user policy): maximal disclosable sets { zip,nationality } or { credit-card, birthdate } zip is OK; credit-card + birthdate is OK ESORICS’11 – 14/9/2011

  23. The Formal Framework – User privacy constraints V 0.0 User privacy constraints (user policy): maximal disclosable sets { zip,nationality } or { credit-card, birthdate } zip is OK; credit-card + birthdate is OK zip + birthdate not releasable ESORICS’11 – 14/9/2011

  24. The Formal Framework – User privacy constraints V 0.0 User privacy constraints (user policy): maximal disclosable sets { zip,nationality } or { credit-card, birthdate } zip is OK; credit-card + birthdate is OK zip + birthdate not releasable Admissible requests Let adm be the set of all requests (sets of items) that satisfy the user’s privacy preferences ESORICS’11 – 14/9/2011

  25. The Formal Framework – Provider policy V 0.0 Provider policy: minimal acceptable sets (for service access) { login,password } or { credit-card, exp-date,username,... } ESORICS’11 – 14/9/2011

  26. The Formal Framework – Provider policy V 0.0 Provider policy: minimal acceptable sets (for service access) { login,password } or { credit-card, exp-date,username,... } login + password + credit-card is OK ESORICS’11 – 14/9/2011

  27. The Formal Framework – Provider policy V 0.0 Provider policy: minimal acceptable sets (for service access) { login,password } or { credit-card, exp-date,username,... } login + password + credit-card is OK login + credit-card not enough ESORICS’11 – 14/9/2011

  28. The Formal Framework – Provider policy V 0.0 Provider policy: minimal acceptable sets (for service access) { login,password } or { credit-card, exp-date,username,... } login + password + credit-card is OK login + credit-card not enough Fulfilling disclosures Let ful ( pol i ) be all sets of items that satisfy provider i ’s policy ESORICS’11 – 14/9/2011

  29. The Formal Framework – Provider requests (strategies) V 0.0 Request � policy they have the same structure, though (a list of info sets) req i denotes the information request of provider i (its strategy ) ESORICS’11 – 14/9/2011

  30. The Formal Framework – Provider requests (strategies) V 0.0 Request � policy they have the same structure, though (a list of info sets) req i denotes the information request of provider i (its strategy ) Providers may ask for larger information sets { credit-card, ID, SSN } or ... ESORICS’11 – 14/9/2011

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend