首页 > 最新文献

Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society最新文献

英文 中文
Timed revocation of user data: long expiration times from existing infrastructure 定时撤销用户数据:现有基础架构的过期时间过长
Sirke Reimann, Markus Dürmuth
The way we deal with information has changed significantly over the last years. More and more private data is published on the Internet, and at the same time our capacity to store and process data has vastly increased. Systems to prevent a large-scale data collection by placing an "expiration date" on digital data have been proposed before, but either they only support very short expiration times of a few days (such as Vanish and EphPub), or they require additional infrastructure (such as FaceCloak and X-pire). We propose a system that (i) implements expiration times of several month and does this (ii) based on existing infrastructure only; to the best of our knowledge this is the first system to have both properties at the same time. We exploit the fact that many webpages continuously change over time: We extract several key-shares from random webpages and use a threshold secret sharing scheme to reconstruct the correct key if enough webpages have not yet changed. After several month, enough webpages have changed to completely hide the key. For almost a year, we have collected statistics about the changes of webpages on a large random sample of webpages and have shown that expiration times of several month can be implemented reliably.
在过去的几年里,我们处理信息的方式发生了巨大的变化。越来越多的私人数据被发布在互联网上,与此同时,我们存储和处理数据的能力也大大提高了。以前有人提出过通过在数字数据上设置“截止日期”来防止大规模数据收集的系统,但它们要么只支持很短的几天的截止时间(如Vanish和EphPub),要么需要额外的基础设施(如FaceCloak和X-pire)。我们建议一个系统(i)实现几个月的过期时间,并且(ii)仅基于现有基础设施;据我们所知,这是第一个同时具有这两种性质的系统。我们利用许多网页随时间不断变化的事实:我们从随机网页中提取几个密钥共享,并使用阈值秘密共享方案来重建正确的密钥,如果有足够的网页尚未更改。几个月后,足够多的网页发生了变化,完全隐藏了密钥。在近一年的时间里,我们收集了大量随机网页样本的网页变化统计数据,并表明几个月的过期时间可以可靠地实现。
{"title":"Timed revocation of user data: long expiration times from existing infrastructure","authors":"Sirke Reimann, Markus Dürmuth","doi":"10.1145/2381966.2381976","DOIUrl":"https://doi.org/10.1145/2381966.2381976","url":null,"abstract":"The way we deal with information has changed significantly over the last years. More and more private data is published on the Internet, and at the same time our capacity to store and process data has vastly increased. Systems to prevent a large-scale data collection by placing an \"expiration date\" on digital data have been proposed before, but either they only support very short expiration times of a few days (such as Vanish and EphPub), or they require additional infrastructure (such as FaceCloak and X-pire).\u0000 We propose a system that (i) implements expiration times of several month and does this (ii) based on existing infrastructure only; to the best of our knowledge this is the first system to have both properties at the same time. We exploit the fact that many webpages continuously change over time: We extract several key-shares from random webpages and use a threshold secret sharing scheme to reconstruct the correct key if enough webpages have not yet changed. After several month, enough webpages have changed to completely hide the key.\u0000 For almost a year, we have collected statistics about the changes of webpages on a large random sample of webpages and have shown that expiration times of several month can be implemented reliably.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"148 1","pages":"65-74"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88652261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Torchestra: reducing interactive traffic delays over tor Torchestra:减少交互式交通延迟
D. Gopal, N. Heninger
Tor is an onion routing network that protects users' privacy by relaying traffic through a series of nodes that run Tor software. As a consequence of the anonymity that it provides, Tor is used for many purposes. According to several measurement studies, a small fraction of users using Tor for bulk downloads account for the majority of traffic on the Tor network. These bulk downloads cause delays for interactive traffic, as many different circuits share bandwidth across each pair of nodes. The resulting delays discourage people from using Tor for normal web activity. We propose a potential solution to this problem: separate interactive and bulk traffic onto two different TCP connections between each pair of nodes. Previous proposals to improve Tor's performance for interactive traffic have focused on prioritizing traffic from less active circuits; however, these prioritization approaches are limited in the benefit they can provide, as they can only affect delays due to traffic processing in Tor itself. Our approach provides a simple way to reduce delays due to additional factors external to Tor, such as the effects of TCP congestion control and queuing of interactive traffic behind bulk traffic in buffers. We evaluate our proposal by simulating traffic using several methods and show that Torchestra provides up to 32% reduction in delays for interactive traffic compared to the Tor traffic prioritization scheme of Tang and Goldberg [18] and up to 40% decrease in delays when compared to vanilla Tor.
Tor是一个洋葱路由网络,它通过一系列运行Tor软件的节点来传输流量,从而保护用户的隐私。由于它提供的匿名性,Tor被用于许多目的。根据几项测量研究,一小部分使用Tor进行批量下载的用户占据了Tor网络的大部分流量。这些批量下载导致交互流量延迟,因为许多不同的电路在每对节点之间共享带宽。由此造成的延迟阻碍了人们使用Tor进行正常的网络活动。我们对这个问题提出了一个潜在的解决方案:在每对节点之间的两个不同的TCP连接上分离交互和批量流量。以前提出的改进Tor在交互流量方面的性能的建议主要集中在优先考虑来自较少有源电路的流量;然而,这些优先排序方法所能提供的好处是有限的,因为它们只能影响由于Tor本身的流量处理而导致的延迟。我们的方法提供了一种简单的方法来减少由于Tor外部的其他因素造成的延迟,例如TCP拥塞控制的影响和缓冲区中批量流量后面的交互式流量排队。我们通过使用几种方法模拟流量来评估我们的提议,并表明与Tang和Goldberg[18]的Tor流量优先级方案相比,Torchestra提供的交互式流量延迟减少高达32%,与普通Tor相比,延迟减少高达40%。
{"title":"Torchestra: reducing interactive traffic delays over tor","authors":"D. Gopal, N. Heninger","doi":"10.1145/2381966.2381972","DOIUrl":"https://doi.org/10.1145/2381966.2381972","url":null,"abstract":"Tor is an onion routing network that protects users' privacy by relaying traffic through a series of nodes that run Tor software. As a consequence of the anonymity that it provides, Tor is used for many purposes. According to several measurement studies, a small fraction of users using Tor for bulk downloads account for the majority of traffic on the Tor network. These bulk downloads cause delays for interactive traffic, as many different circuits share bandwidth across each pair of nodes. The resulting delays discourage people from using Tor for normal web activity.\u0000 We propose a potential solution to this problem: separate interactive and bulk traffic onto two different TCP connections between each pair of nodes. Previous proposals to improve Tor's performance for interactive traffic have focused on prioritizing traffic from less active circuits; however, these prioritization approaches are limited in the benefit they can provide, as they can only affect delays due to traffic processing in Tor itself. Our approach provides a simple way to reduce delays due to additional factors external to Tor, such as the effects of TCP congestion control and queuing of interactive traffic behind bulk traffic in buffers. We evaluate our proposal by simulating traffic using several methods and show that Torchestra provides up to 32% reduction in delays for interactive traffic compared to the Tor traffic prioritization scheme of Tang and Goldberg [18] and up to 40% decrease in delays when compared to vanilla Tor.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"37 1","pages":"31-42"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88542014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
For human eyes only: security and usability evaluation 仅供人眼使用:安全性和可用性评估
A. Pashalidis, Nikos Mavrogiannopoulos, Xavier Ferrer Aran, Beñat Bermejo Olaizola
This paper presents 'For Human Eyes Only' (FHEO), our Firefox extension that enables one to conveniently post online messages, such as short emails, comments, and tweets in a form that discourages automatic processing of these messages. Similar to CAPTCHA systems, FHEO distorts the text to various extents. We provide a security analysis of its four default distortion profiles as well as a usability analysis that shows how these profiles affect response time and accurate understanding. Our results illustrate the security/usability tradeoffs that arise in the face of adversaries that use current, off-the-shelf optical character recognition technology in order to launch a variety of attacks. Two profiles, in particular, achieve a level of protection that seems to justify their respective usability degradation in many situations. The 'strongest' distortion profile, however, does not seem to provide a large additional security margin against the adversaries we considered.
本文介绍了“For Human Eyes Only”(FHEO),我们的Firefox扩展,它使人们能够方便地发布在线消息,如短邮件,评论和推文,以一种不鼓励自动处理这些消息的形式。与CAPTCHA系统类似,FHEO会在不同程度上扭曲文本。我们提供了四种默认失真配置文件的安全性分析,以及显示这些配置文件如何影响响应时间和准确理解的可用性分析。我们的结果说明了在面对使用当前现成的光学字符识别技术以发起各种攻击的对手时出现的安全性/可用性权衡。特别是两个概要文件,它们实现了一定程度的保护,这似乎证明了它们在许多情况下各自的可用性退化是合理的。然而,对于我们所考虑的对手,“最强”失真配置文件似乎并没有提供很大的额外安全裕度。
{"title":"For human eyes only: security and usability evaluation","authors":"A. Pashalidis, Nikos Mavrogiannopoulos, Xavier Ferrer Aran, Beñat Bermejo Olaizola","doi":"10.1145/2381966.2381984","DOIUrl":"https://doi.org/10.1145/2381966.2381984","url":null,"abstract":"This paper presents 'For Human Eyes Only' (FHEO), our Firefox extension that enables one to conveniently post online messages, such as short emails, comments, and tweets in a form that discourages automatic processing of these messages. Similar to CAPTCHA systems, FHEO distorts the text to various extents. We provide a security analysis of its four default distortion profiles as well as a usability analysis that shows how these profiles affect response time and accurate understanding. Our results illustrate the security/usability tradeoffs that arise in the face of adversaries that use current, off-the-shelf optical character recognition technology in order to launch a variety of attacks. Two profiles, in particular, achieve a level of protection that seems to justify their respective usability degradation in many situations. The 'strongest' distortion profile, however, does not seem to provide a large additional security margin against the adversaries we considered.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"84 1","pages":"129-140"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74224436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Understanding sharing preferences and behavior for mHealth devices 了解移动医疗设备的共享偏好和行为
Aarathi Prasad, Jacob M. Sorber, Timothy Stablein, D. Anthony, D. Kotz
If people are not in control of the collection and sharing of their personal health information collected using mobile health (mHealth) devices and applications, privacy concerns could limit their willingness to use and reduce potential benefits provided via mHealth. We investigated users' willingness to share their personal information, collected using mHealth sensing devices, with their family, friends, third parties, and the public. Previous work employed hypothetical scenarios, surveys and interviews to understand people's information-sharing behavior; to the best of our knowledge, ours is the first privacy study where participants actually have the option to share their own information with real people. We expect our results can guide the development of privacy controls for mobile devices and applications that collect any personal and activity information, not restricted to health or fitness information. Our study revealed three interesting findings about people's privacy concerns regarding their sensed health information: 1) We found that people share certain health information less with friends and family than with strangers, but more with specific third parties than the public. 2) Information that people were less willing to share could be information that is indirectly collected by the mobile devices. 3) We confirmed that privacy concerns are not static; mHealth device users may change their sharing decisions over time. Based on our findings, we emphasize the need for sensible default settings and flexible privacy controls to allow people to choose different settings for different recipients, and to change their sharing settings at any time.
如果人们无法控制使用移动医疗(mHealth)设备和应用程序收集和分享他们的个人健康信息,隐私问题可能会限制他们使用移动医疗的意愿,并降低移动医疗提供的潜在好处。我们调查了用户与家人、朋友、第三方和公众分享他们使用移动健康传感设备收集的个人信息的意愿。以前的工作采用假设情景、调查和访谈来了解人们的信息共享行为;据我们所知,我们的研究是第一个让参与者可以选择与真人分享自己信息的隐私研究。我们希望我们的研究结果可以指导移动设备和应用程序隐私控制的发展,这些设备和应用程序可以收集任何个人和活动信息,而不仅仅是健康或健身信息。我们的研究揭示了三个有趣的发现,关于人们对自己感知到的健康信息的隐私担忧:1)我们发现,人们与朋友和家人分享某些健康信息的次数少于与陌生人分享,但与特定的第三方分享的次数多于与公众分享。2)人们不太愿意分享的信息可能是移动设备间接收集的信息。3)我们确认隐私问题不是静态的;随着时间的推移,移动医疗设备用户可能会改变他们的共享决定。根据我们的研究结果,我们强调需要合理的默认设置和灵活的隐私控制,以允许人们为不同的收件人选择不同的设置,并随时更改他们的共享设置。
{"title":"Understanding sharing preferences and behavior for mHealth devices","authors":"Aarathi Prasad, Jacob M. Sorber, Timothy Stablein, D. Anthony, D. Kotz","doi":"10.1145/2381966.2381983","DOIUrl":"https://doi.org/10.1145/2381966.2381983","url":null,"abstract":"If people are not in control of the collection and sharing of their personal health information collected using mobile health (mHealth) devices and applications, privacy concerns could limit their willingness to use and reduce potential benefits provided via mHealth. We investigated users' willingness to share their personal information, collected using mHealth sensing devices, with their family, friends, third parties, and the public. Previous work employed hypothetical scenarios, surveys and interviews to understand people's information-sharing behavior; to the best of our knowledge, ours is the first privacy study where participants actually have the option to share their own information with real people. We expect our results can guide the development of privacy controls for mobile devices and applications that collect any personal and activity information, not restricted to health or fitness information.\u0000 Our study revealed three interesting findings about people's privacy concerns regarding their sensed health information: 1) We found that people share certain health information less with friends and family than with strangers, but more with specific third parties than the public. 2) Information that people were less willing to share could be information that is indirectly collected by the mobile devices. 3) We confirmed that privacy concerns are not static; mHealth device users may change their sharing decisions over time. Based on our findings, we emphasize the need for sensible default settings and flexible privacy controls to allow people to choose different settings for different recipients, and to change their sharing settings at any time.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"14 3 1","pages":"117-128"},"PeriodicalIF":0.0,"publicationDate":"2012-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89150873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Experiences in the logical specification of the HIPAA and GLBA privacy laws HIPAA和GLBA隐私法逻辑规范方面的经验
Henry Deyoung, D. Garg, Limin Jia, D. Kaynar, Anupam Datta
Despite the wide array of frameworks proposed for the formal specification and analysis of privacy laws, there has been comparatively little work on expressing large fragments of actual privacy laws in these frameworks. We attempt to bridge this gap by giving complete logical formalizations of the transmission-related portions of the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm-Leach-Bliley Act (GLBA). To this end, we develop the PrivacyLFP logic, whose features include support for disclosure purposes, real-time constructs, and self-reference via fixed points. To illustrate these features and demonstrate PrivacyLFP's utility, we present formalizations of a collection of clauses from these laws. Due to their size, our full formalizations of HIPAA and GLBA appear in a companion technical report. We discuss ambiguities in the laws that our formalizations revealed and sketch preliminary ideas for computer-assisted enforcement of such privacy policies.
尽管为隐私法的正式规范和分析提出了各种框架,但在这些框架中表达实际隐私法的大块内容的工作相对较少。我们试图通过对《健康保险流通与责任法案》(HIPAA)和《格雷姆-里奇-比利利法案》(GLBA)中与传输相关的部分给出完整的逻辑形式化来弥合这一差距。为此,我们开发了PrivacyLFP逻辑,其特性包括支持公开目的、实时结构和通过固定点的自引用。为了说明这些特性并演示PrivacyLFP的实用程序,我们给出了这些法律条款集合的形式化形式。由于它们的大小,我们对HIPAA和GLBA的完整形式化将出现在配套的技术报告中。我们讨论了我们的形式化揭示的法律中的模糊性,并概述了计算机辅助执行此类隐私政策的初步想法。
{"title":"Experiences in the logical specification of the HIPAA and GLBA privacy laws","authors":"Henry Deyoung, D. Garg, Limin Jia, D. Kaynar, Anupam Datta","doi":"10.1145/1866919.1866930","DOIUrl":"https://doi.org/10.1145/1866919.1866930","url":null,"abstract":"Despite the wide array of frameworks proposed for the formal specification and analysis of privacy laws, there has been comparatively little work on expressing large fragments of actual privacy laws in these frameworks. We attempt to bridge this gap by giving complete logical formalizations of the transmission-related portions of the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm-Leach-Bliley Act (GLBA). To this end, we develop the PrivacyLFP logic, whose features include support for disclosure purposes, real-time constructs, and self-reference via fixed points. To illustrate these features and demonstrate PrivacyLFP's utility, we present formalizations of a collection of clauses from these laws. Due to their size, our full formalizations of HIPAA and GLBA appear in a companion technical report. We discuss ambiguities in the laws that our formalizations revealed and sketch preliminary ideas for computer-assisted enforcement of such privacy policies.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"15 1","pages":"73-82"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82037486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Jack: scalable accumulator-based nymble system 杰克:可扩展的基于蓄能器的符号系统
Zi Lin, Nicholas Hopper
Anonymous blacklisting schemes enable online service providers to block future accesses from abusive users behind anonymizing networks, such as Tor, while preserving the privacy of all users, both abusive and non-abusive. Several such schemes exist in the literature, but all suffer from one of several faults: they rely on trusted parties that can collude to de-anonymize users, they scale poorly with the number of blacklisted users, or they place a very high computational load on the trusted parties. We introduce Jack, an efficient, scalable anonymous blacklisting scheme based on cryptographic accumulators. Compared to the previous efficient schemes, Jack significantly reduces the communication and computation costs required of trusted parties while also weakening the trust placed in these parties. Compared with schemes with no trusted parties, Jack enjoys constant scaling with respect to the number of blacklisted users, imposing dramatically reduced computation and communication costs for service providers. Jack is provably secure in the random oracle model, and we demonstrate its efficiency both analytically and experimentally.
匿名黑名单计划使在线服务提供商能够阻止匿名网络(如Tor)背后的滥用用户未来的访问,同时保护所有用户的隐私,包括滥用和非滥用。文献中存在一些这样的方案,但它们都存在以下几个缺点之一:它们依赖于可以串通起来对用户进行去匿名化的可信方,它们与黑名单用户数量的比例很差,或者它们对可信方施加了非常高的计算负荷。本文介绍了一种基于密码累加器的高效、可扩展匿名黑名单方案Jack。与之前的高效方案相比,Jack大大降低了可信各方所需的通信和计算成本,同时也削弱了对这些各方的信任。与没有可信方的方案相比,Jack在黑名单用户数量方面具有恒定的扩展性,从而大大降低了服务提供商的计算和通信成本。Jack在随机oracle模型下是安全的,并通过分析和实验证明了它的有效性。
{"title":"Jack: scalable accumulator-based nymble system","authors":"Zi Lin, Nicholas Hopper","doi":"10.1145/1866919.1866927","DOIUrl":"https://doi.org/10.1145/1866919.1866927","url":null,"abstract":"Anonymous blacklisting schemes enable online service providers to block future accesses from abusive users behind anonymizing networks, such as Tor, while preserving the privacy of all users, both abusive and non-abusive. Several such schemes exist in the literature, but all suffer from one of several faults: they rely on trusted parties that can collude to de-anonymize users, they scale poorly with the number of blacklisted users, or they place a very high computational load on the trusted parties.\u0000 We introduce Jack, an efficient, scalable anonymous blacklisting scheme based on cryptographic accumulators. Compared to the previous efficient schemes, Jack significantly reduces the communication and computation costs required of trusted parties while also weakening the trust placed in these parties. Compared with schemes with no trusted parties, Jack enjoys constant scaling with respect to the number of blacklisted users, imposing dramatically reduced computation and communication costs for service providers. Jack is provably secure in the random oracle model, and we demonstrate its efficiency both analytically and experimentally.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"46 1","pages":"53-62"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83057140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Americans' attitudes about internet behavioral advertising practices 美国人对网络广告行为的态度
Aleecia M. McDonald, L. Cranor
This paper presents empirical data on American Internet users' knowledge about and perceptions of Internet advertising techniques. We present the results of in-depth interviews and an online survey focusing on participants' views of online advertising and their ability to make decisions about privacy tradeoffs. We find users hold misconceptions about the purpose of cookies and the effects of clearing them. Only 11% of respondents understood the text description of NAI opt-out cookies, which are a self-help mechanism that enables user choice. 86% believe ads are tailored to websites they have visited in the past, but only 39% believe there are currently ads based on email content, and only 9% think it is ok to see ads based on email content as long as their email service is free. About 20% of participants want the benefits of targeted advertising, but 64% find the idea invasive, and we see signs of a possible chilling effect with 40% self-reporting they would change their online behavior if advertisers were collecting data. We find a gap between people's willingness to pay to protect their privacy and their willingness to accept discounts in exchange for private information. 69% believe privacy is a right and 61% think it is "extortion" to pay to keep their data private. Only 11% say they would pay to avoid ads. We find participants are comfortable with the idea that advertising supports free online content, but they do not believe their data are part of that exchange.
本文提供了美国互联网用户对互联网广告技术的认知和认知的实证数据。我们介绍了深度访谈和在线调查的结果,重点关注参与者对在线广告的看法以及他们对隐私权衡做出决定的能力。我们发现用户对cookie的用途和清除cookie的效果存在误解。只有11%的受访者理解NAI选择退出cookie的文本描述,这是一种使用户能够选择的自助机制。86%的人认为广告是针对他们过去访问过的网站量身定制的,但只有39%的人认为目前存在基于电子邮件内容的广告,只有9%的人认为只要他们的电子邮件服务是免费的,就可以看到基于电子邮件内容的广告。大约20%的参与者希望从定向广告中获益,但64%的人认为这种想法具有攻击性,我们看到了可能产生寒蝉效应的迹象,40%的人自我报告说,如果广告商收集数据,他们会改变自己的在线行为。我们发现,人们愿意为保护自己的隐私而付费,与愿意接受折扣以换取私人信息之间存在差距。69%的人认为隐私是一项权利,61%的人认为付费保护数据隐私是“勒索”。只有11%的人表示,他们愿意为避免广告而付费。我们发现,参与者对广告支持免费在线内容的想法感到满意,但他们不认为自己的数据是这种交换的一部分。
{"title":"Americans' attitudes about internet behavioral advertising practices","authors":"Aleecia M. McDonald, L. Cranor","doi":"10.1145/1866919.1866929","DOIUrl":"https://doi.org/10.1145/1866919.1866929","url":null,"abstract":"This paper presents empirical data on American Internet users' knowledge about and perceptions of Internet advertising techniques. We present the results of in-depth interviews and an online survey focusing on participants' views of online advertising and their ability to make decisions about privacy tradeoffs. We find users hold misconceptions about the purpose of cookies and the effects of clearing them. Only 11% of respondents understood the text description of NAI opt-out cookies, which are a self-help mechanism that enables user choice. 86% believe ads are tailored to websites they have visited in the past, but only 39% believe there are currently ads based on email content, and only 9% think it is ok to see ads based on email content as long as their email service is free. About 20% of participants want the benefits of targeted advertising, but 64% find the idea invasive, and we see signs of a possible chilling effect with 40% self-reporting they would change their online behavior if advertisers were collecting data. We find a gap between people's willingness to pay to protect their privacy and their willingness to accept discounts in exchange for private information. 69% believe privacy is a right and 61% think it is \"extortion\" to pay to keep their data private. Only 11% say they would pay to avoid ads. We find participants are comfortable with the idea that advertising supports free online content, but they do not believe their data are part of that exchange.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"17 1","pages":"63-72"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88023268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 162
Clearvote: an end-to-end voting system that distributes privacy between printers Clearvote:一个端到端投票系统,在打印机之间分配隐私
Stefan Popoveniuc, R. Carback
In many end-to-end voting systems there is a single entity that produces each ballot. This entity can be the printer in the case of paper ballots, or the voting machine in the case of an electronic interface. While not able to change election results, this powerful entity has access to confidential information and can reveal selections made by the voters which, along with the voter's identities, can compromise the secrecy of the ballot. We propose ClearVote, a new end-to-end voting system that has no single entity that can reveal ballot selections. The ClearVote ballot has three sheets of transparent plastic, each sheet coming from a different printer. Assuming no two printers collude, there is no single entity with enough knowledge to reveal ballot selections.
在许多端到端投票系统中,每一张选票都由一个实体产生。如果是纸质选票,这个实体可以是打印机,如果是电子接口,这个实体可以是投票机。虽然不能改变选举结果,但这个强大的实体可以接触到机密信息,并可以揭露选民的选择,这与选民的身份一起,可能损害选票的保密性。我们提出ClearVote,这是一个新的端到端投票系统,没有可以显示选票选择的单一实体。ClearVote的选票有三张透明塑料,每张都来自不同的打印机。假设没有两个印刷商串通,就没有一个实体有足够的信息来透露选票选择。
{"title":"Clearvote: an end-to-end voting system that distributes privacy between printers","authors":"Stefan Popoveniuc, R. Carback","doi":"10.1145/1866919.1866937","DOIUrl":"https://doi.org/10.1145/1866919.1866937","url":null,"abstract":"In many end-to-end voting systems there is a single entity that produces each ballot. This entity can be the printer in the case of paper ballots, or the voting machine in the case of an electronic interface. While not able to change election results, this powerful entity has access to confidential information and can reveal selections made by the voters which, along with the voter's identities, can compromise the secrecy of the ballot.\u0000 We propose ClearVote, a new end-to-end voting system that has no single entity that can reveal ballot selections. The ClearVote ballot has three sheets of transparent plastic, each sheet coming from a different printer. Assuming no two printers collude, there is no single entity with enough knowledge to reveal ballot selections.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"12 1","pages":"119-122"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85733384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using social networks to harvest email addresses 利用社交网络获取电子邮件地址
Iasonas Polakis, Georgios Kontaxis, S. Antonatos, Eleni Gessiou, Thanasis Petsas, E. Markatos
Social networking is one of the most popular Internet activities with millions of members from around the world. However, users are unaware of the privacy risks involved. Even if they protect their private information, their name is enough to be used for malicious purposes. In this paper we demonstrate and evaluate how names extracted from social networks can be used to harvest email addresses as a first step for personalized phishing campaigns. Our blind harvesting technique uses names collected from the Facebook and Twitter networks as query terms for the Google search engine, and was able to harvest almost 9 million unique email addresses. We compare our technique with other harvesting methodologies, such as crawling the World Wide Web and dictionary attacks, and show that our approach is more scalable and efficient than the other techniques. We also present three targeted harvesting, techniques that aim to collect email addresses coupled with personal information for the creation of personalized phishing emails. By using information available in Twitter to narrow down the search space and, by utilizing the Facebook email search functionality, we are able to successfully map 43.4% of the user profiles to their actual email address. Furthermore, we harvest profiles from Google Buzz, 40% of whom provide a direct mapping to valid Gmail addresses.
社交网络是最受欢迎的互联网活动之一,拥有来自世界各地的数百万成员。然而,用户并没有意识到其中涉及的隐私风险。即使他们保护自己的私人信息,他们的名字也足以被用于恶意目的。在本文中,我们演示并评估了如何从社交网络中提取姓名来收集电子邮件地址,作为个性化网络钓鱼活动的第一步。我们的盲目收集技术使用从Facebook和Twitter网络收集的名字作为Google搜索引擎的查询条件,并能够收集近900万个唯一的电子邮件地址。我们将我们的技术与其他收集方法(如爬行万维网和字典攻击)进行了比较,并表明我们的方法比其他技术更具可扩展性和效率。我们还介绍了三种有针对性的收集技术,旨在收集电子邮件地址和个人信息,以创建个性化的网络钓鱼邮件。通过使用Twitter上的可用信息来缩小搜索空间,并利用Facebook的电子邮件搜索功能,我们能够成功地将43.4%的用户资料映射到他们的实际电子邮件地址。此外,我们从Google Buzz获取个人资料,其中40%的用户提供有效Gmail地址的直接映射。
{"title":"Using social networks to harvest email addresses","authors":"Iasonas Polakis, Georgios Kontaxis, S. Antonatos, Eleni Gessiou, Thanasis Petsas, E. Markatos","doi":"10.1145/1866919.1866922","DOIUrl":"https://doi.org/10.1145/1866919.1866922","url":null,"abstract":"Social networking is one of the most popular Internet activities with millions of members from around the world. However, users are unaware of the privacy risks involved. Even if they protect their private information, their name is enough to be used for malicious purposes. In this paper we demonstrate and evaluate how names extracted from social networks can be used to harvest email addresses as a first step for personalized phishing campaigns. Our blind harvesting technique uses names collected from the Facebook and Twitter networks as query terms for the Google search engine, and was able to harvest almost 9 million unique email addresses. We compare our technique with other harvesting methodologies, such as crawling the World Wide Web and dictionary attacks, and show that our approach is more scalable and efficient than the other techniques. We also present three targeted harvesting, techniques that aim to collect email addresses coupled with personal information for the creation of personalized phishing emails. By using information available in Twitter to narrow down the search space and, by utilizing the Facebook email search functionality, we are able to successfully map 43.4% of the user profiles to their actual email address. Furthermore, we harvest profiles from Google Buzz, 40% of whom provide a direct mapping to valid Gmail addresses.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"30 1","pages":"11-20"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74535069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
On securing untrusted clouds with cryptography 关于使用加密技术保护不受信任的云
Yao Chen, R. Sion
In a recent interview, Whitfield Diffie argued that "the whole point of cloud computing is economy" and while it is possible in principle for "computation to be done on encrypted data, [...] current techniques would more than undo the economy gained by the outsourcing and show little sign of becoming practical". Here we explore whether this is truly the case and quantify just how expensive it is to secure computing in untrusted, potentially curious clouds. We start by looking at the economics of computing in general and clouds in particular. Specifically, we derive the end-to-end cost of a CPU cycle in various environments and show that its cost lies between 0.5 picocents in efficient clouds and nearly 27 picocents for small enterprises (1 picocent = $1 x 10-14), values validated against current pricing. We then explore the cost of common cryptography primitives as well as the viability of their deployment for cloud security purposes. We conclude that Diffie was correct. Securing outsourced data and computation against untrusted clouds is indeed costlier than the associated savings, with outsourcing mechanisms up to several orders of magnitudes costlier than their non-outsourced locally run alternatives.
在最近的一次采访中,Whitfield Diffie认为“云计算的全部意义在于经济”,虽然原则上“在加密数据上进行计算”是可能的,但……目前的技术不仅会抵消外包所带来的经济效益,而且几乎没有迹象表明它将变得实用。”在这里,我们将探讨这种情况是否属实,并量化在不可信的、可能令人好奇的云中保护计算的成本。我们从总体上看计算经济,特别是云计算经济开始。具体来说,我们得出了各种环境中CPU周期的端到端成本,并表明其成本在高效云中为0.5皮cent,在小型企业中为近27皮cent(1皮cent = 1 x 10-14美元),这些值根据当前定价进行了验证。然后,我们将探讨通用加密原语的成本以及部署它们用于云安全目的的可行性。我们的结论是迪菲是正确的。保护外包数据和计算免受不可信云的影响的成本确实比相关的节省要高,外包机制比非外包的本地运行替代方案的成本要高几个数量级。
{"title":"On securing untrusted clouds with cryptography","authors":"Yao Chen, R. Sion","doi":"10.1145/1866919.1866935","DOIUrl":"https://doi.org/10.1145/1866919.1866935","url":null,"abstract":"In a recent interview, Whitfield Diffie argued that \"the whole point of cloud computing is economy\" and while it is possible in principle for \"computation to be done on encrypted data, [...] current techniques would more than undo the economy gained by the outsourcing and show little sign of becoming practical\". Here we explore whether this is truly the case and quantify just how expensive it is to secure computing in untrusted, potentially curious clouds.\u0000 We start by looking at the economics of computing in general and clouds in particular. Specifically, we derive the end-to-end cost of a CPU cycle in various environments and show that its cost lies between 0.5 picocents in efficient clouds and nearly 27 picocents for small enterprises (1 picocent = $1 x 10-14), values validated against current pricing.\u0000 We then explore the cost of common cryptography primitives as well as the viability of their deployment for cloud security purposes. We conclude that Diffie was correct. Securing outsourced data and computation against untrusted clouds is indeed costlier than the associated savings, with outsourcing mechanisms up to several orders of magnitudes costlier than their non-outsourced locally run alternatives.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"331 1","pages":"109-114"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87874686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
期刊
Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1