Transparency-Enhancing Tools PETs PhD Course at Chalmers Tobias - - PowerPoint PPT Presentation

transparency enhancing tools
SMART_READER_LITE
LIVE PREVIEW

Transparency-Enhancing Tools PETs PhD Course at Chalmers Tobias - - PowerPoint PPT Presentation

Transparency TETs Transparency Logging A4Cloud Summary Transparency-Enhancing Tools PETs PhD Course at Chalmers Tobias Pulls Karlstad University, Sweden tobias.pulls@kau.se October 29, 2012 Transparency TETs Transparency Logging


slide-1
SLIDE 1

Transparency TETs Transparency Logging A4Cloud Summary

Transparency-Enhancing Tools

PETs PhD Course at Chalmers Tobias Pulls

Karlstad University, Sweden tobias.pulls@kau.se

October 29, 2012

slide-2
SLIDE 2

Transparency TETs Transparency Logging A4Cloud Summary

The Transparent Society – David Brin

According to The Transparent Society, ubiquitous surveillance is inevitable The question is if the weak will in turn surveil the strong

slide-3
SLIDE 3

Transparency TETs Transparency Logging A4Cloud Summary

Brin’s viewpoint

slide-4
SLIDE 4

Transparency TETs Transparency Logging A4Cloud Summary

The Myth of the ‘Transparent Society’ – Bruce Schneier

Some quotes by Schneier:

  • “Except it doesn’t work, because it ignores the

crucial dissimilarity of power.”

slide-5
SLIDE 5

Transparency TETs Transparency Logging A4Cloud Summary

The Myth of the ‘Transparent Society’ – Bruce Schneier

Some quotes by Schneier:

  • “Except it doesn’t work, because it ignores the

crucial dissimilarity of power.”

  • “The more power you have, the more

additional power you derive from the new data.”

slide-6
SLIDE 6

Transparency TETs Transparency Logging A4Cloud Summary

The Myth of the ‘Transparent Society’ – Bruce Schneier

Some quotes by Schneier:

  • “Except it doesn’t work, because it ignores the

crucial dissimilarity of power.”

  • “The more power you have, the more

additional power you derive from the new data.”

  • “Forced openness in government reduces the

relative power differential between the two, and is generally good. Forced openness in laypeople increases the relative power, and is generally bad.”

slide-7
SLIDE 7

Transparency TETs Transparency Logging A4Cloud Summary

David Brin rebuts Schneier

Some quotes by Brin:

  • “All of the great enlightenment arenas –

markets, science and democracy – flourish in direct proportion to how much their players (consumers, scientists and voters) know, in

  • rder to make good decisions. To whatever

extent these arenas get clogged by secrecy, they fail.”

slide-8
SLIDE 8

Transparency TETs Transparency Logging A4Cloud Summary

David Brin rebuts Schneier

Some quotes by Brin:

  • “All of the great enlightenment arenas –

markets, science and democracy – flourish in direct proportion to how much their players (consumers, scientists and voters) know, in

  • rder to make good decisions. To whatever

extent these arenas get clogged by secrecy, they fail.”

  • “If civilization becomes a cloud of secrecy (as

some are now trying to achieve), that’s when elites can really exploit disparities of power.”

slide-9
SLIDE 9

Transparency TETs Transparency Logging A4Cloud Summary

David Brin rebuts Schneier

Some quotes by Brin:

  • “All of the great enlightenment arenas –

markets, science and democracy – flourish in direct proportion to how much their players (consumers, scientists and voters) know, in

  • rder to make good decisions. To whatever

extent these arenas get clogged by secrecy, they fail.”

  • “If civilization becomes a cloud of secrecy (as

some are now trying to achieve), that’s when elites can really exploit disparities of power.”

  • “...it was a generally open society that invented

modern privacy”

slide-10
SLIDE 10

Transparency TETs Transparency Logging A4Cloud Summary

What to make of all of this?

1 The progress of technology leads to

greater ability for the powerful to surveil the weak

slide-11
SLIDE 11

Transparency TETs Transparency Logging A4Cloud Summary

What to make of all of this?

1 The progress of technology leads to

greater ability for the powerful to surveil the weak

2 Transparency fosters control

slide-12
SLIDE 12

Transparency TETs Transparency Logging A4Cloud Summary

What to make of all of this?

1 The progress of technology leads to

greater ability for the powerful to surveil the weak

2 Transparency fosters control 3 Society functions the best when the

relative power between the strong and weak is as small as possible

slide-13
SLIDE 13

Transparency TETs Transparency Logging A4Cloud Summary

What are TETs?

slide-14
SLIDE 14

Transparency TETs Transparency Logging A4Cloud Summary

TETs and PETs

Different approaches to addressing information asymmetries: TETs Increases the information available to the weaker party PETs Decreases the information available to the stronger party TETs weak PETs strong information party

slide-15
SLIDE 15

Transparency TETs Transparency Logging A4Cloud Summary

The need for preserving privacy in TETs

  • Ensuring that TETs preserve privacy is a form of optimisation
slide-16
SLIDE 16

Transparency TETs Transparency Logging A4Cloud Summary

The need for preserving privacy in TETs

  • Ensuring that TETs preserve privacy is a form of optimisation
  • The big picture: not repeating past mistakes, ensuring accuracy
slide-17
SLIDE 17

Transparency TETs Transparency Logging A4Cloud Summary

The need for preserving privacy in TETs

  • Ensuring that TETs preserve privacy is a form of optimisation
  • The big picture: not repeating past mistakes, ensuring accuracy
  • Just like any other type of technology: privacy matters
slide-18
SLIDE 18

Transparency TETs Transparency Logging A4Cloud Summary

A question

How is data processed by data processors?

slide-19
SLIDE 19

Transparency TETs Transparency Logging A4Cloud Summary

What you usually find

slide-20
SLIDE 20

Transparency TETs Transparency Logging A4Cloud Summary

One step further

Log processing data and send it to data subjects (users)

slide-21
SLIDE 21

Transparency TETs Transparency Logging A4Cloud Summary

One step further

Log processing data and send it to data subjects (users)

  • Comparing actual processing with prior agreements
slide-22
SLIDE 22

Transparency TETs Transparency Logging A4Cloud Summary

One step further

Log processing data and send it to data subjects (users)

  • Comparing actual processing with prior agreements
  • Towards holding data processors accountable
slide-23
SLIDE 23

Transparency TETs Transparency Logging A4Cloud Summary

One step further

Log processing data and send it to data subjects (users)

  • Comparing actual processing with prior agreements
  • Towards holding data processors accountable

Main research question How to log processing data in a privacy-preserving way?

slide-24
SLIDE 24

Transparency TETs Transparency Logging A4Cloud Summary

Building a log trail

slide-25
SLIDE 25

Transparency TETs Transparency Logging A4Cloud Summary

Building a log trail

slide-26
SLIDE 26

Transparency TETs Transparency Logging A4Cloud Summary

Building a log trail

slide-27
SLIDE 27

Transparency TETs Transparency Logging A4Cloud Summary

Reconstructing a log trail

slide-28
SLIDE 28

Transparency TETs Transparency Logging A4Cloud Summary

Reconstructing a log trail

slide-29
SLIDE 29

Transparency TETs Transparency Logging A4Cloud Summary

Reconstructing a log trail

slide-30
SLIDE 30

Transparency TETs Transparency Logging A4Cloud Summary

Properties

The scheme has the following properties:

  • Confidentiality of log data (forward secrecy)
slide-31
SLIDE 31

Transparency TETs Transparency Logging A4Cloud Summary

Properties

The scheme has the following properties:

  • Confidentiality of log data (forward secrecy)
  • Integrity of log data (forward integrity)
slide-32
SLIDE 32

Transparency TETs Transparency Logging A4Cloud Summary

Properties

The scheme has the following properties:

  • Confidentiality of log data (forward secrecy)
  • Integrity of log data (forward integrity)
  • Unlinkability of log entries and data subjects (forward unlinkability)
slide-33
SLIDE 33

Transparency TETs Transparency Logging A4Cloud Summary

Properties

The scheme has the following properties:

  • Confidentiality of log data (forward secrecy)
  • Integrity of log data (forward integrity)
  • Unlinkability of log entries and data subjects (forward unlinkability)
  • Auditable
slide-34
SLIDE 34

Transparency TETs Transparency Logging A4Cloud Summary

Properties

The scheme has the following properties:

  • Confidentiality of log data (forward secrecy)
  • Integrity of log data (forward integrity)
  • Unlinkability of log entries and data subjects (forward unlinkability)
  • Auditable
  • Anonymous trail reconstruction and verification
slide-35
SLIDE 35

Transparency TETs Transparency Logging A4Cloud Summary

Properties

The scheme has the following properties:

  • Confidentiality of log data (forward secrecy)
  • Integrity of log data (forward integrity)
  • Unlinkability of log entries and data subjects (forward unlinkability)
  • Auditable
  • Anonymous trail reconstruction and verification
  • Resilient to compromise
slide-36
SLIDE 36

Transparency TETs Transparency Logging A4Cloud Summary

Auditability

slide-37
SLIDE 37

Transparency TETs Transparency Logging A4Cloud Summary

Auditability

slide-38
SLIDE 38

Transparency TETs Transparency Logging A4Cloud Summary

Auditability

slide-39
SLIDE 39

Transparency TETs Transparency Logging A4Cloud Summary

Auditability

slide-40
SLIDE 40

Transparency TETs Transparency Logging A4Cloud Summary

Unlinkability

slide-41
SLIDE 41

Transparency TETs Transparency Logging A4Cloud Summary

Unlinkability

slide-42
SLIDE 42

Transparency TETs Transparency Logging A4Cloud Summary

Unlinkability

slide-43
SLIDE 43

Transparency TETs Transparency Logging A4Cloud Summary

Unlinkability - why

slide-44
SLIDE 44

Transparency TETs Transparency Logging A4Cloud Summary

Unlinkability - why

slide-45
SLIDE 45

Transparency TETs Transparency Logging A4Cloud Summary

Unlinkability - enabled by

slide-46
SLIDE 46

Transparency TETs Transparency Logging A4Cloud Summary

Unlinkability - enabled by

slide-47
SLIDE 47

Transparency TETs Transparency Logging A4Cloud Summary

Unlinkability - enabled by

slide-48
SLIDE 48

Transparency TETs Transparency Logging A4Cloud Summary

Attackers - our model

slide-49
SLIDE 49

Transparency TETs Transparency Logging A4Cloud Summary

Attackers - our model

slide-50
SLIDE 50

Transparency TETs Transparency Logging A4Cloud Summary

Attackers - our model

slide-51
SLIDE 51

Transparency TETs Transparency Logging A4Cloud Summary

Attackers - would like to be OK

slide-52
SLIDE 52

Transparency TETs Transparency Logging A4Cloud Summary

Attackers - would like to be OK

slide-53
SLIDE 53

Transparency TETs Transparency Logging A4Cloud Summary

A4Cloud

Accountability For Cloud and Other Future Internet Services

slide-54
SLIDE 54

Transparency TETs Transparency Logging A4Cloud Summary

Summary

  • “The goal is justice, the method is

transparency” – Julian Assange

  • Transparency → Control

→ Accountability → Trust

  • TETs address information

asymmetries by increasing information available to the weak party

  • Privacy in the context of TETs is a

matter of accuracy and optimisation

slide-55
SLIDE 55

Transparency TETs Transparency Logging A4Cloud Summary

Assumed trust in prior sessions 1/2

Session 1: Privacy & legal Aspects society E-voting at least one mix, entity performing setup Mix-nets at least one mix

slide-56
SLIDE 56

Transparency TETs Transparency Logging A4Cloud Summary

Assumed trust in prior sessions 1/2

Session 1: Privacy & legal Aspects society E-voting at least one mix, entity performing setup Mix-nets at least one mix Session 2: Onion routing at least one node DC-nets passive adversaries Crowds a subset of the crowd Tor at least one relay, directory servie Traffic analysis “what if we don’t trust the network?”

slide-57
SLIDE 57

Transparency TETs Transparency Logging A4Cloud Summary

Assumed trust in prior sessions 2/2

Session 3: Bitcoin a majority of the computational power E-Cash nobody Vehicular communication manufacturer, identity authorities, ... Secure MPC a subset of participants

slide-58
SLIDE 58

Transparency TETs Transparency Logging A4Cloud Summary

Assumed trust in prior sessions 2/2

Session 3: Bitcoin a majority of the computational power E-Cash nobody Vehicular communication manufacturer, identity authorities, ... Secure MPC a subset of participants Session 4: Statistical databases the collector and holder of data, recipients of the knowledge of the database Smart grid everyone except the provider (but the provider’s engineers)

slide-59
SLIDE 59

Transparency TETs Transparency Logging A4Cloud Summary

Sources

Sources of images (all accessed 2012-10-28):

1 Sousveillance:

https://zaboujojo.wordpress.com/2012/03/20/sousveillance-when-the- citizens-watch-back/

2 Doctor:

http://wiki.teamfortress.com/wiki/File:Physician%27s Procedure Mask.png

3 Principia Mathematica:

http://history.howstuffworks.com/historical-events/enlightenment.htm

4 Spy mosquito: http://www.hell-labs.com/images/skeeter.jpg 5 Open government:

https://digiphile.wordpress.com/2010/03/28/transparency-camp-2010- government-transparency-open-data-and-coffee/