Negotiated Privacy: (Extended Abstract)
نویسندگان
چکیده
Exponential growth in digital information gathering, storage, and processing capabilities inexorably leads to conflict between wellintentioned government or commercial datamining, and fundamental privacy interests of individuals and organizations. This paper proposes a mechanism that provides cryptographic fetters on the mining of personal data, enabling efficient mining of previously-negotiated properties, but preventing any other uses of the protected personal data. Our approach does not rely on complete trust in the analysts to use the data appropriately, nor does it rely on incorruptible escrow agents. Instead, we propose conditional data escrow where the data generators, not the analysts, hold the keys to the data, but analysts can verify that the prenegotiated queries are enabled. Our solution relies on verifiable, anonymous, and deterministic commitments which play the role of tags that mark encrypted entries in the analyst’s database. The database owner cannot learn anything from the encrypted entries, or even verify his guess of the plaintext on which these entries are based. On the other hand, the verifiable and deterministic property ensures that the entries are marked with consistent tags, so that the database manager learns when the number of entries required to enable some query reaches the pre-negotiated threshold.
منابع مشابه
The Differential Privacy Frontier (Extended Abstract)
We review the definition of differential privacy and briefly survey a handful of very recent contributions to the differential privacy frontier.
متن کاملHolistic Privacy Impact Assessment Framework for Video Privacy Filtering Technologies
In this paper, we present a novel Holistic Framework for Privacy Protection Level Performance Evaluation and Impact Assessment (H-PIA) to support the design and deployment of privacy-preserving filtering techniques as may be co-evolved for video surveillance through user-centred participative engagement and collectively negotiated solution seeking for privacy protection. The proposed framework ...
متن کاملThe Unsolvable Privacy Problem and Its Implications for Security Technologies
Privacy presents many puzzles. In particular, why is it eroding, given the high value people assign to their privacy? This extended abstract argues that there are strong incentives for decreasing privacy, rooted in the economic benefits of price discrimination. As a result, the privacy problem is unsolvable. The conflict between incentives to price discriminate and the public dislike of this pr...
متن کاملS4P: A Generic Language for Specifying Privacy Preferences and Policies
This paper presents S4P, a declarative language for specifying both users’ privacy preferences and services’ privacy policies. Preferences and policies are uniformly expressed as assertions and queries written in SecPAL extended with two modal verbs, may and will, and can express both permissions and obligations. Checking if a user’s preference is satisfied by a service’s policy is simple as it...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002