Negotiated Privacy: (Extended Abstract)

نویسندگان

  • Stanislaw Jarecki
  • Patrick Lincoln
  • Vitaly Shmatikov
چکیده

Exponential growth in digital information gathering, storage, and processing capabilities inexorably leads to conflict between wellintentioned government or commercial datamining, and fundamental privacy interests of individuals and organizations. This paper proposes a mechanism that provides cryptographic fetters on the mining of personal data, enabling efficient mining of previously-negotiated properties, but preventing any other uses of the protected personal data. Our approach does not rely on complete trust in the analysts to use the data appropriately, nor does it rely on incorruptible escrow agents. Instead, we propose conditional data escrow where the data generators, not the analysts, hold the keys to the data, but analysts can verify that the prenegotiated queries are enabled. Our solution relies on verifiable, anonymous, and deterministic commitments which play the role of tags that mark encrypted entries in the analyst’s database. The database owner cannot learn anything from the encrypted entries, or even verify his guess of the plaintext on which these entries are based. On the other hand, the verifiable and deterministic property ensures that the entries are marked with consistent tags, so that the database manager learns when the number of entries required to enable some query reaches the pre-negotiated threshold.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Differential Privacy Frontier (Extended Abstract)

We review the definition of differential privacy and briefly survey a handful of very recent contributions to the differential privacy frontier.

متن کامل

Holistic Privacy Impact Assessment Framework for Video Privacy Filtering Technologies

In this paper, we present a novel Holistic Framework for Privacy Protection Level Performance Evaluation and Impact Assessment (H-PIA) to support the design and deployment of privacy-preserving filtering techniques as may be co-evolved for video surveillance through user-centred participative engagement and collectively negotiated solution seeking for privacy protection. The proposed framework ...

متن کامل

The Unsolvable Privacy Problem and Its Implications for Security Technologies

Privacy presents many puzzles. In particular, why is it eroding, given the high value people assign to their privacy? This extended abstract argues that there are strong incentives for decreasing privacy, rooted in the economic benefits of price discrimination. As a result, the privacy problem is unsolvable. The conflict between incentives to price discriminate and the public dislike of this pr...

متن کامل

S4P: A Generic Language for Specifying Privacy Preferences and Policies

This paper presents S4P, a declarative language for specifying both users’ privacy preferences and services’ privacy policies. Preferences and policies are uniformly expressed as assertions and queries written in SecPAL extended with two modal verbs, may and will, and can express both permissions and obligations. Checking if a user’s preference is satisfied by a service’s policy is simple as it...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002