Access Control is an Inadequate Framework for Privacy Protection
نویسنده
چکیده
As Web architects, we might all agree on the need to protect privacy. But what is it that we want to protect? In Brandeis and Warren’s classic legal study [19], privacy is defined as the “right to be let alone”. In Alan Westin’s seminal work [20], privacy is the ability for people to determine for themselves “when, how, and to what extent, information about them is communicated to others”. The UN Declaration of Human Rights [16] stipulates that “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation”. There are important differences among these definitions. One central definition is that Westin focuses on information access: how information comes to be known. In contrast, the UN Declaration, and Brandeis and Warren, focus on what happens to people as a result of how information is used. Present discussions of Internet privacy, both policy and technology, tend to assume Westin’s perspective. The focus on access control sometimes regards privacy as a kind of ”currency of the digital age”1 that people need to exchange in return for better search results, more personalization, customized services, more targeted advertising, and better communication with friends, family, and colleagues. “Protecting privacy” is often equated with letting users make these tradeoffs by defining detailed rules to govern access to their personal information. This year’s technology press is filled with announcements by social networking sites about their new privacy controls, i.e. new ways for users to define access rules [18, 23]; followed by embarrassment when the choices prove to be inadequate or too complex for people to deal with [17, 1, 10, 22, 15, 3, 13]. Even when access control systems are successful in blocking out unwanted viewers, they are ineffective as privacy protection for a large, decentralized system like the World Wide Web, where it is easy to copy or aggregate information. These days, it is possible to infer sensitive information from publicly available information. For example, social security numbers (SSN) have always been closely guarded because they are used to identify individuals by most government and financial institutions. Every use
منابع مشابه
A centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملTransparent Accountable Data Mining: New Strategies for Privacy Protection
Attempts to address issues of personal privacy in a world of computerized databases and information networks -from security technology to data protection regulation to Fourth Amendment law jurisprudence -typically proceed from the perspective of controlling or preventing access to information. We argue that this perspective has become inadequate and obsolete, overtaken by the ease of sharing an...
متن کاملAuthorisation and access control architecture as a framework for data and privacy protection
Privacy protection in digital databases does not demand that data should not be collected, stored or used, but that there should be guarantees that the data can only be used for pre-approved and legitimate purposes. We argue that a data protection law based on traditional understanding of privacy protection and detection of privacy infringements is unlikely to be successful, and that what is re...
متن کاملTowards Compliance and Accountability: a Framework for Privacy Online
Over the last twenty years, there has been a tremendous growth in the amount of data collected about individuals. Most existing privacy enhancing technologies could not prevent privacy breach effectively, since the real threat is not the control of private data access but the control of usage. While "access control" is well understood, how to achieve "usage control" is still unclear. In the onl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010