Building a Privacy Gardian for the Electronic Age

نویسندگان

  • Larry Korba
  • Ronggong Song
  • Xinan Zhou
چکیده

WP5 involves an investigation of issues associated with network, scalability and user interfaces for privacy enhancing technologies. The goal of this work is to produce an analysis of the design of PISA privacy enhancing technologies with a view to improving network security, scalability and usability of implementations. For deliverable 5.2 we outline approaches for scalability for privacy provisions within PISA Systems, define test cases for PISA system scalability, test PISA system scalability for these cases and analyze PISA scalability. Keyword list Agent, Mobile Agents, modeling, usability, communication, privacy, user interfaces, security, network, scalability D 22: PISA system scalability Page 2 / 66 Executive summary In this document we examine two areas: modeling aspects of PISA system design, and testing PISA system scalability. Since at this stage the PISA prototype is under development, the objective of this work is to provide an overview of approaches that may be applied to modeling and testing. More specifically, we develop early models of the PISA prototype system design, define test cases for PISA system scalability, test the design for PISA system scalability and indicate the direction we will take in WP5. D 22: PISA system scalability Page 3 / 66 PISA, project information Contribution PISA contributes to key action lines of the IST-program of the EC: II4.1: “ To develop and validate novel, scalable and interoperable technologies, mechanisms and architectures for trust and security in distributed organizations, services and underlying infrastructures”. II4.2: To scale-up, integrate, validate and demonstrate trust and confidence technologies and architectures in the context of advanced large-scale scenarios for business and everyday life. This work will largely be carried out through trials, integrated test-beds and combined RTD and demonstrations. Goal The objectives of the PISA-project are: Demonstration of PET as a secure technical solution to protect the privacy of the citizen when he/she is using Intelligent Agents (called shopbots, buybots, pricebots or just "bots", a short for robot1) in E-commerce or M-commerce applications, according to EC-Directives on Privacy. Interaction with industry and government to launch new privacy protected services. The PISAproject will produce a handbook on Privacy and PET for ISAT and a PISA-agent as shareware. Also a plan for the dissemination of the results of PISA will be produced. Propose a standard for Privacy Protected Agent Transactions to Standardization Bodies. Results PISA contributes at building a model of a software agent within a network environment, to demonstrate that it is possible to perform complicated actions on behalf of a person, without the personal data of that person being compromised. In the design of the agent an effective selection of the presented Privacy Enhancing Technologies (PET) will be implemented. We label this product as a Privacy Incorporated Software Agent (PISA). The PISA demonstration model is planned to be a novel piece of software that incorporates several advanced technologies in one product: • Agent technology, for intelligent search and matching; • Data mining or comparable techniques to construct profiles and make predictions; • Cryptography for the protection of personal data, as well as the confidentiality of transactions. In particular, with regard to WP5, the project involves: • Research into the better known network approaches for privacy; • Assessment of PET developed in PISA regarding their network scalability; • Research and development of approaches for trustworthy user interfaces for privacy preference specification and privacy reported for agent-based systems. Additionally the project involves: • Legal expertise to implement the European privacy legislation and the needed development of new rules and norms; • System design knowledge to turn legal boundary condition into technical specifications; • Advanced software-programming skills to implement the privacy boundary conditions. In order to prove the capability of the PISA-model, we propose to test it in a model environment in two cases in e-commerce that closely resembles a real-life situation 1 In E-commerce, “Bots” will slug It Out for Us; International Herald Tribune, 21 August 2000 D 22: PISA system scalability Page 4 / 66 PISA Project consortium • TNO-FEL Physics and Electronics Laboratory Oude Waalsdorperweg 63 P.O. Box 96864, 2509 JG The Hague, The Netherlands Project co-ordination, Privacy Enhanced Technologies TNO-TPD Institute of Applied Physics Stieltjesweg 1 P.O.Box 155, 2600 AD Delft, The Netherlands Intelligent Software Agents Platform and PISA-demonstrator • Netherlands Data Protection Authority Prins Clauslaan 20 Postbus 93374, 2509 AJ The Hague, The Netherlands Privacy Protection and Legal Issues • Delft University of Technology, Faculty of Information Technology and Systems, Information Theory Group Mekelweg 4 P.O. Box 5031, 2600 GA Delft, The Netherlands Cryptography • Sentient Machine Research Singel 16

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بررسی ابزارها و روش‌های ایجاد محرمیت در خانه‎ی زینت‌الملک شیراز منطبق بر آیات و روایات اسلامی

Introduction Privacy is known as one of the most basic features of Islamic architecture. Home is the most private places for the person so it is essential to provide confidentiality and privacy in it. Islam, Quran Verses and Hadiths of Prophet Mohammad and imams have focused on creating privacy in the houses. In this way, the privacy has been the basic principle on traditional architectures ...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

An Investigation of Sick Building Syndrome (SBS) in Workplaces, (Case Study: Engineering Organization Building of Urmia).

Background and objectives: Undoubtfuly, people spend a significant portion of their time in workplaces. Many factors affect the health and well-being of employees. The present study aimed to identify the architectural problems of the environment by examining the symptoms of Sick Building Syndrome and ranking the parameters influenced by five physical factors (thermal comfort, noise, lighting, l...

متن کامل

Adjustment Mechanisms of Privacy in extroverted homes of Gilan (Case Study: Rural Homes)

Privacy as a human need, is the result of adjustment of the interaction between human environment, which under the influence of current patterns of activity and cultural background, leads to a favorable atmosphere. Adjusting the privacy in Iranian homes is one of the fundamental features of Iranian architecture, which has had a profound effect on the formation of the spatial organization and th...

متن کامل

The Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review

Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002