transparency enhancing tools
play

Transparency-Enhancing Tools PETs PhD Course at Chalmers Tobias - PowerPoint PPT Presentation

Transparency TETs Transparency Logging A4Cloud Summary Transparency-Enhancing Tools PETs PhD Course at Chalmers Tobias Pulls Karlstad University, Sweden tobias.pulls@kau.se October 29, 2012 Transparency TETs Transparency Logging


  1. Transparency TETs Transparency Logging A4Cloud Summary Transparency-Enhancing Tools PETs PhD Course at Chalmers Tobias Pulls Karlstad University, Sweden tobias.pulls@kau.se October 29, 2012

  2. Transparency TETs Transparency Logging A4Cloud Summary The Transparent Society – David Brin According to The Transparent Society , ubiquitous surveillance is inevitable The question is if the weak will in turn surveil the strong

  3. Transparency TETs Transparency Logging A4Cloud Summary Brin’s viewpoint

  4. Transparency TETs Transparency Logging A4Cloud Summary The Myth of the ‘Transparent Society’ – Bruce Schneier Some quotes by Schneier: • “Except it doesn’t work, because it ignores the crucial dissimilarity of power.”

  5. Transparency TETs Transparency Logging A4Cloud Summary The Myth of the ‘Transparent Society’ – Bruce Schneier Some quotes by Schneier: • “Except it doesn’t work, because it ignores the crucial dissimilarity of power.” • “The more power you have, the more additional power you derive from the new data.”

  6. Transparency TETs Transparency Logging A4Cloud Summary The Myth of the ‘Transparent Society’ – Bruce Schneier Some quotes by Schneier: • “Except it doesn’t work, because it ignores the crucial dissimilarity of power.” • “The more power you have, the more additional power you derive from the new data.” • “Forced openness in government reduces the relative power differential between the two, and is generally good. Forced openness in laypeople increases the relative power, and is generally bad.”

  7. Transparency TETs Transparency Logging A4Cloud Summary David Brin rebuts Schneier Some quotes by Brin: • “All of the great enlightenment arenas – markets, science and democracy – flourish in direct proportion to how much their players (consumers, scientists and voters) know, in order to make good decisions. To whatever extent these arenas get clogged by secrecy, they fail.”

  8. Transparency TETs Transparency Logging A4Cloud Summary David Brin rebuts Schneier Some quotes by Brin: • “All of the great enlightenment arenas – markets, science and democracy – flourish in direct proportion to how much their players (consumers, scientists and voters) know, in order to make good decisions. To whatever extent these arenas get clogged by secrecy, they fail.” • “If civilization becomes a cloud of secrecy (as some are now trying to achieve), that’s when elites can really exploit disparities of power.”

  9. Transparency TETs Transparency Logging A4Cloud Summary David Brin rebuts Schneier Some quotes by Brin: • “All of the great enlightenment arenas – markets, science and democracy – flourish in direct proportion to how much their players (consumers, scientists and voters) know, in order to make good decisions. To whatever extent these arenas get clogged by secrecy, they fail.” • “If civilization becomes a cloud of secrecy (as some are now trying to achieve), that’s when elites can really exploit disparities of power.” • “...it was a generally open society that invented modern privacy”

  10. Transparency TETs Transparency Logging A4Cloud Summary What to make of all of this? 1 The progress of technology leads to greater ability for the powerful to surveil the weak

  11. Transparency TETs Transparency Logging A4Cloud Summary What to make of all of this? 1 The progress of technology leads to greater ability for the powerful to surveil the weak 2 Transparency fosters control

  12. Transparency TETs Transparency Logging A4Cloud Summary What to make of all of this? 1 The progress of technology leads to greater ability for the powerful to surveil the weak 2 Transparency fosters control 3 Society functions the best when the relative power between the strong and weak is as small as possible

  13. Transparency TETs Transparency Logging A4Cloud Summary What are TETs?

  14. Transparency TETs Transparency Logging A4Cloud Summary TETs and PETs Different approaches to addressing information asymmetries : TETs Increases the information available to the weaker party PETs Decreases the information available to the stronger party PETs information TETs strong weak party

  15. Transparency TETs Transparency Logging A4Cloud Summary The need for preserving privacy in TETs • Ensuring that TETs preserve privacy is a form of optimisation

  16. Transparency TETs Transparency Logging A4Cloud Summary The need for preserving privacy in TETs • Ensuring that TETs preserve privacy is a form of optimisation • The big picture: not repeating past mistakes, ensuring accuracy

  17. Transparency TETs Transparency Logging A4Cloud Summary The need for preserving privacy in TETs • Ensuring that TETs preserve privacy is a form of optimisation • The big picture: not repeating past mistakes, ensuring accuracy • Just like any other type of technology: privacy matters

  18. Transparency TETs Transparency Logging A4Cloud Summary A question How is data processed by data processors?

  19. Transparency TETs Transparency Logging A4Cloud Summary What you usually find

  20. Transparency TETs Transparency Logging A4Cloud Summary One step further Log processing data and send it to data subjects (users)

  21. Transparency TETs Transparency Logging A4Cloud Summary One step further Log processing data and send it to data subjects (users) • Comparing actual processing with prior agreements

  22. Transparency TETs Transparency Logging A4Cloud Summary One step further Log processing data and send it to data subjects (users) • Comparing actual processing with prior agreements • Towards holding data processors accountable

  23. Transparency TETs Transparency Logging A4Cloud Summary One step further Log processing data and send it to data subjects (users) • Comparing actual processing with prior agreements • Towards holding data processors accountable Main research question How to log processing data in a privacy-preserving way?

  24. Transparency TETs Transparency Logging A4Cloud Summary Building a log trail

  25. Transparency TETs Transparency Logging A4Cloud Summary Building a log trail

  26. Transparency TETs Transparency Logging A4Cloud Summary Building a log trail

  27. Transparency TETs Transparency Logging A4Cloud Summary Reconstructing a log trail

  28. Transparency TETs Transparency Logging A4Cloud Summary Reconstructing a log trail

  29. Transparency TETs Transparency Logging A4Cloud Summary Reconstructing a log trail

  30. Transparency TETs Transparency Logging A4Cloud Summary Properties The scheme has the following properties: • Confidentiality of log data (forward secrecy)

  31. Transparency TETs Transparency Logging A4Cloud Summary Properties The scheme has the following properties: • Confidentiality of log data (forward secrecy) • Integrity of log data (forward integrity)

  32. Transparency TETs Transparency Logging A4Cloud Summary Properties The scheme has the following properties: • Confidentiality of log data (forward secrecy) • Integrity of log data (forward integrity) • Unlinkability of log entries and data subjects (forward unlinkability)

  33. Transparency TETs Transparency Logging A4Cloud Summary Properties The scheme has the following properties: • Confidentiality of log data (forward secrecy) • Integrity of log data (forward integrity) • Unlinkability of log entries and data subjects (forward unlinkability) • Auditable

  34. Transparency TETs Transparency Logging A4Cloud Summary Properties The scheme has the following properties: • Confidentiality of log data (forward secrecy) • Integrity of log data (forward integrity) • Unlinkability of log entries and data subjects (forward unlinkability) • Auditable • Anonymous trail reconstruction and verification

  35. Transparency TETs Transparency Logging A4Cloud Summary Properties The scheme has the following properties: • Confidentiality of log data (forward secrecy) • Integrity of log data (forward integrity) • Unlinkability of log entries and data subjects (forward unlinkability) • Auditable • Anonymous trail reconstruction and verification • Resilient to compromise

  36. Transparency TETs Transparency Logging A4Cloud Summary Auditability

  37. Transparency TETs Transparency Logging A4Cloud Summary Auditability

  38. Transparency TETs Transparency Logging A4Cloud Summary Auditability

  39. Transparency TETs Transparency Logging A4Cloud Summary Auditability

  40. Transparency TETs Transparency Logging A4Cloud Summary Unlinkability

  41. Transparency TETs Transparency Logging A4Cloud Summary Unlinkability

  42. Transparency TETs Transparency Logging A4Cloud Summary Unlinkability

  43. Transparency TETs Transparency Logging A4Cloud Summary Unlinkability - why

  44. Transparency TETs Transparency Logging A4Cloud Summary Unlinkability - why

  45. Transparency TETs Transparency Logging A4Cloud Summary Unlinkability - enabled by

  46. Transparency TETs Transparency Logging A4Cloud Summary Unlinkability - enabled by

  47. Transparency TETs Transparency Logging A4Cloud Summary Unlinkability - enabled by

  48. Transparency TETs Transparency Logging A4Cloud Summary Attackers - our model

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend