首页 > 最新文献

Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society最新文献

英文 中文
Revisiting the uniqueness of simple demographics in the US population 重新审视美国人口结构的独特性
P. Golle
According to a famous study [10] of the 1990 census data, 87% of the US population can be uniquely identified by gender, ZIP code and full date of birth. This short paper revisits the uniqueness of simple demographics in the US population based on the most recent census data (the 2000 census). We offer a detailed, comprehensive and up-to-date picture of the threat to privacy posed by the disclosure of simple demographic information. Our results generally agree with the findings of [10], although we find that disclosing one's gender, ZIP code and full date of birth allows for unique identification of fewer individuals (63% of the US population) than reported in [10]. We hope that our study will be a useful reference for privacy researchers who need simple estimates of the comparative threat of disclosing various demographic data.
根据一项对1990年人口普查数据的著名研究[10],87%的美国人口可以通过性别、邮政编码和完整的出生日期进行唯一识别。这篇短文基于最近的人口普查数据(2000年人口普查),重新审视了美国人口中简单人口统计学的独特性。我们提供了一个详细的、全面的和最新的关于简单的人口统计信息泄露对隐私构成威胁的图片。我们的研究结果与[10]的研究结果基本一致,尽管我们发现,披露一个人的性别、邮政编码和完整的出生日期可以让更少的人(占美国人口的63%)获得独特的身份识别,而不是[10]的报道。我们希望我们的研究能为隐私研究者提供有用的参考,因为他们需要对披露各种人口统计数据的相对威胁进行简单的估计。
{"title":"Revisiting the uniqueness of simple demographics in the US population","authors":"P. Golle","doi":"10.1145/1179601.1179615","DOIUrl":"https://doi.org/10.1145/1179601.1179615","url":null,"abstract":"According to a famous study [10] of the 1990 census data, 87% of the US population can be uniquely identified by gender, ZIP code and full date of birth. This short paper revisits the uniqueness of simple demographics in the US population based on the most recent census data (the 2000 census). We offer a detailed, comprehensive and up-to-date picture of the threat to privacy posed by the disclosure of simple demographic information. Our results generally agree with the findings of [10], although we find that disclosing one's gender, ZIP code and full date of birth allows for unique identification of fewer individuals (63% of the US population) than reported in [10]. We hope that our study will be a useful reference for privacy researchers who need simple estimates of the comparative threat of disclosing various demographic data.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"4 1","pages":"77-80"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76376006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 338
Swing & swap: user-centric approaches towards maximizing location privacy Swing & swap:以用户为中心的最大化位置隐私的方法
Mingyan Li, K. Sampigethaya, Leping Huang, R. Poovendran
In wireless networks, the location tracking of devices and vehicles (nodes) based on their identifiable and locatable broadcasts, presents potential threats to the location privacy of their users. While the tracking of nodes can be mitigated to an extent by updating their identifiers to decorrelate their traversed locations, such an approach is still vulnerable to tracking methods that utilize the predictability of node movement to limit the location privacy provided by the identifier updates. On the other hand, since each user may need privacy at different locations and times, a user-centric approach is needed to enable the nodes to independently determine where/when to update their identifiers. However, mitigation of tracking with a user-centric approach is difficult due to the lack of synchronization between updating nodes. This paper addresses the challenges to providing location privacy by identifier updates due to the predictability of node locations and the asynchronous updates, and proposes a user-centric scheme called Swing that increases location privacy by enabling the nodes to loosely synchronize updates when changing their velocity. Further, since each identifier update inherently trades off network service for privacy, the paper also introduces an approach called Swap, which is an extension of Swing, that enables the nodes to exchange their identifiers to potentially maximize the location privacy provided by each update, hence reducing the number of updates needed to meet the desired privacy levels. The performance of the proposed schemes is evaluated under random and restricted pedestrian mobility.
在无线网络中,基于可识别和可定位广播的设备和车辆(节点)的位置跟踪对其用户的位置隐私构成了潜在的威胁。虽然可以通过更新节点的标识符来解除其遍历位置的相关性,从而在一定程度上减轻节点的跟踪,但这种方法仍然容易受到利用节点移动的可预测性来限制标识符更新提供的位置隐私的跟踪方法的攻击。另一方面,由于每个用户可能在不同的地点和时间需要隐私,因此需要一种以用户为中心的方法,使节点能够独立地确定在何处/何时更新其标识符。然而,由于更新节点之间缺乏同步,以用户为中心的方法很难缓解跟踪问题。由于节点位置的可预测性和异步更新,本文解决了通过标识符更新提供位置隐私的挑战,并提出了一个名为Swing的以用户为中心的方案,该方案通过允许节点在改变其速度时松散同步更新来增加位置隐私。此外,由于每次标识符更新本质上是为了隐私而牺牲网络服务,因此本文还介绍了一种称为Swap的方法,这是Swing的扩展,它使节点能够交换它们的标识符,从而最大限度地提高每次更新所提供的位置隐私,从而减少满足所需隐私级别所需的更新次数。在随机和限制行人移动的情况下,对所提出方案的性能进行了评估。
{"title":"Swing & swap: user-centric approaches towards maximizing location privacy","authors":"Mingyan Li, K. Sampigethaya, Leping Huang, R. Poovendran","doi":"10.1145/1179601.1179605","DOIUrl":"https://doi.org/10.1145/1179601.1179605","url":null,"abstract":"In wireless networks, the location tracking of devices and vehicles (nodes) based on their identifiable and locatable broadcasts, presents potential threats to the location privacy of their users. While the tracking of nodes can be mitigated to an extent by updating their identifiers to decorrelate their traversed locations, such an approach is still vulnerable to tracking methods that utilize the predictability of node movement to limit the location privacy provided by the identifier updates. On the other hand, since each user may need privacy at different locations and times, a user-centric approach is needed to enable the nodes to independently determine where/when to update their identifiers. However, mitigation of tracking with a user-centric approach is difficult due to the lack of synchronization between updating nodes. This paper addresses the challenges to providing location privacy by identifier updates due to the predictability of node locations and the asynchronous updates, and proposes a user-centric scheme called Swing that increases location privacy by enabling the nodes to loosely synchronize updates when changing their velocity. Further, since each identifier update inherently trades off network service for privacy, the paper also introduces an approach called Swap, which is an extension of Swing, that enables the nodes to exchange their identifiers to potentially maximize the location privacy provided by each update, hence reducing the number of updates needed to meet the desired privacy levels. The performance of the proposed schemes is evaluated under random and restricted pedestrian mobility.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"38 1","pages":"19-28"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88371284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 195
Randomization as a strategy for sellers during price discrimination, and impact on bidders' privacy 随机化作为卖方在价格歧视中的策略,以及对投标人隐私的影响
Sumit Joshi, Yu-An Sun, P. Vora
A previous paper demonstrates that if a seller always uses auction bids to later price discriminate against losing bidders, his revenue decreases dramatically. In this paper, we examine whether the seller obtains an advantage if he randomizes his strategy -- that is, if he does not use privacy-infringing information all the time, but only with probability ?;. Using both Bayesian techniques and genetic algorithm experiments, we determine optimal strategies for bidders and sellers in a two stage game: Stage I is a first price auction used to elicit information on a bidder's valuation; Stage II is, with probability ?;, a price discrimination offer, and, a fixed price offer P; else. Our results show that the seller does not benefit from randomized price discrimination. Further, low valuation bidders benefit more from the seller's use of privacy-infringing information than do the high valuation ones, as they may wish to signal that they cannot afford a high second-stage offer. To our knowledge, our use of genetic algorithm simulations is unique in the privacy literature.
先前的一篇论文表明,如果卖方总是使用拍卖出价来对失败的投标人进行价格歧视,他的收入会急剧下降。在本文中,我们考察了如果卖方随机化他的策略——即他不总是使用侵犯隐私的信息,而只是有概率地使用侵犯隐私的信息——是否会获得优势。利用贝叶斯技术和遗传算法实验,我们确定了竞买双方在两阶段博弈中的最优策略:第一阶段是首次价格拍卖,用于获取竞买方估值信息;阶段II是,概率为?;,价格歧视报价,固定价格报价P;其他的事情。我们的研究结果表明,卖方不会从随机价格歧视中获益。此外,低估值的竞标者比高估值的竞标者从卖方使用侵犯隐私的信息中获益更多,因为他们可能希望表明他们无法承受第二阶段的高报价。据我们所知,我们对遗传算法模拟的使用在隐私文献中是独一无二的。
{"title":"Randomization as a strategy for sellers during price discrimination, and impact on bidders' privacy","authors":"Sumit Joshi, Yu-An Sun, P. Vora","doi":"10.1145/1179601.1179614","DOIUrl":"https://doi.org/10.1145/1179601.1179614","url":null,"abstract":"A previous paper demonstrates that if a seller always uses auction bids to later price discriminate against losing bidders, his revenue decreases dramatically. In this paper, we examine whether the seller obtains an advantage if he randomizes his strategy -- that is, if he does not use privacy-infringing information all the time, but only with probability ?;. Using both Bayesian techniques and genetic algorithm experiments, we determine optimal strategies for bidders and sellers in a two stage game: Stage I is a first price auction used to elicit information on a bidder's valuation; Stage II is, with probability ?;, a price discrimination offer, and, a fixed price offer P; else. Our results show that the seller does not benefit from randomized price discrimination. Further, low valuation bidders benefit more from the seller's use of privacy-infringing information than do the high valuation ones, as they may wish to signal that they cannot afford a high second-stage offer. To our knowledge, our use of genetic algorithm simulations is unique in the privacy literature.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"55 1","pages":"73-76"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86552576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Nonesuch: a mix network with sender unobservability 非此类:具有发送方不可观察性的混合网络
T. S. Benjamin, A. Serjantov, Benessa Defend
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may determine that a valid message has been sent. We present Nonesuch: a mix network with steganographic submission and probabilistic identification and attenuation of cover traffic. In our system messages are submitted as stegotext hidden inside Usenet postings. The steganographic extraction mechanism is such that the the vast majority of the Usenet postings which do not contain keyed stegotext will produce meaningless output which serves as cover traffic, thus increasing the anonymity of the real messages. This cover traffic is subject to probabilistic attenuation in which nodes have only a small probability of distinguishing cover messages from "real" messages. This attenuation prevents cover traffic from travelling through the network in an infinite loop, while making it infeasible for an entrance node to distinguish senders.
匿名系统的遗忘提交是一个过程,通过该过程,消息可以以这样一种方式提交,即匿名网络和全局被动对手都无法确定已发送了有效消息。我们提出nonessuch:一个混合网络与隐写提交和概率识别和衰减的覆盖流量。在我们的系统中,消息以隐藏在Usenet帖子中的密文形式提交。隐写提取机制使得绝大多数不包含密钥隐写的Usenet帖子将产生无意义的输出,作为覆盖流量,从而增加了真实消息的匿名性。这种掩蔽流量受到概率衰减的影响,其中节点只有很小的概率将掩蔽消息与“真实”消息区分开来。这种衰减可以防止覆盖流量在无限循环中通过网络,同时使入口节点无法区分发送者。
{"title":"Nonesuch: a mix network with sender unobservability","authors":"T. S. Benjamin, A. Serjantov, Benessa Defend","doi":"10.1145/1179601.1179603","DOIUrl":"https://doi.org/10.1145/1179601.1179603","url":null,"abstract":"Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may determine that a valid message has been sent. We present Nonesuch: a mix network with steganographic submission and probabilistic identification and attenuation of cover traffic. In our system messages are submitted as stegotext hidden inside Usenet postings. The steganographic extraction mechanism is such that the the vast majority of the Usenet postings which do not contain keyed stegotext will produce meaningless output which serves as cover traffic, thus increasing the anonymity of the real messages. This cover traffic is subject to probabilistic attenuation in which nodes have only a small probability of distinguishing cover messages from \"real\" messages. This attenuation prevents cover traffic from travelling through the network in an infinite loop, while making it infeasible for an entrance node to distinguish senders.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"27 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82704336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A study on the value of location privacy 位置隐私的价值研究
Daniel Cvrcek, Marek Kumpost, Vashek Matyás, G. Danezis
This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countries, and used tools from experimental psychology and economics to extract from them the value they attach to their location data. We compare this value across national groups, gender and technical awareness, but also the perceived difference between academic use and commercial exploitation. We provide some analysis of the self-selection bias of such a study, and look further at the valuation of location data over time using data from another experiment.
本文介绍了一项关于使用移动设备的个人位置隐私价值的研究结果。我们对来自五个欧盟国家的1200多人进行了抽样调查,并使用实验心理学和经济学的工具从他们身上提取出他们对位置数据的价值。我们比较了不同国家群体、性别和技术意识之间的价值,也比较了学术使用和商业利用之间的感知差异。我们对此类研究的自我选择偏差进行了一些分析,并使用另一个实验的数据进一步研究了位置数据随时间的估值。
{"title":"A study on the value of location privacy","authors":"Daniel Cvrcek, Marek Kumpost, Vashek Matyás, G. Danezis","doi":"10.1145/1179601.1179621","DOIUrl":"https://doi.org/10.1145/1179601.1179621","url":null,"abstract":"This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countries, and used tools from experimental psychology and economics to extract from them the value they attach to their location data. We compare this value across national groups, gender and technical awareness, but also the perceived difference between academic use and commercial exploitation. We provide some analysis of the self-selection bias of such a study, and look further at the valuation of location data over time using data from another experiment.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"58 2","pages":"109-118"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91490428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 179
Super-sticky and declassifiable release policies for flexible information dissemination control 超粘解密发布策略,灵活控制信息传播
Sruthi Bandhakavi, Charles C. Zhang, M. Winslett
Over the years, many aspects of the transfer of information from one party to another have commanded the attention of the security and privacy community. Released information can have various levels of sensitivity: facts that are pub-lic, sensitive private information that requires its original owner's permission for its future dissemination, or even in-formation that requires control over the release of the con-clusions reached using that information. Some situations also call for declassification of information, which requires a two-pronged approach: the original owner retains control over the dissemination of sensitive information and sensitive conclusions reached using that information, but when the in-formation is used to reach conclusions that are sufficiently non-sensitive, the original owner's control can be removed for the dissemination of those conclusions. In this paper, we define such a logic to specify information dissemination con-trol policies and reason about release and declassification, and give case studies of the use of our language to control the release of aggregated open source software, multimedia content and medical information.
多年来,信息从一方转移到另一方的许多方面引起了安全和隐私社区的注意。发布的信息可以具有不同程度的敏感性:公开的事实,需要其原始所有者允许其未来传播的敏感私人信息,甚至需要控制使用该信息得出结论的发布的信息。在某些情况下,还需要对信息进行解密,这需要采取双管齐下的方法:原始所有者保留对敏感信息的传播和使用该信息得出的敏感结论的控制,但当信息被用于得出足够不敏感的结论时,可以取消原始所有者的控制以传播这些结论。在本文中,我们定义了这样一种逻辑来指定信息传播控制策略和发布和解密的原因,并给出了使用我们的语言来控制聚合开源软件、多媒体内容和医疗信息的发布的案例研究。
{"title":"Super-sticky and declassifiable release policies for flexible information dissemination control","authors":"Sruthi Bandhakavi, Charles C. Zhang, M. Winslett","doi":"10.1145/1179601.1179609","DOIUrl":"https://doi.org/10.1145/1179601.1179609","url":null,"abstract":"Over the years, many aspects of the transfer of information from one party to another have commanded the attention of the security and privacy community. Released information can have various levels of sensitivity: facts that are pub-lic, sensitive private information that requires its original owner's permission for its future dissemination, or even in-formation that requires control over the release of the con-clusions reached using that information. Some situations also call for declassification of information, which requires a two-pronged approach: the original owner retains control over the dissemination of sensitive information and sensitive conclusions reached using that information, but when the in-formation is used to reach conclusions that are sufficiently non-sensitive, the original owner's control can be removed for the dissemination of those conclusions. In this paper, we define such a logic to specify information dissemination con-trol policies and reason about release and declassification, and give case studies of the use of our language to control the release of aggregated open source software, multimedia content and medical information.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"23 1","pages":"51-58"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89505059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Reasoning about obfuscated private information: who have lied and how to lie 关于模糊的私人信息的推理:谁撒谎了,如何撒谎
X. An, D. Jutla, N. Cercone
In ubiquitous environments, context sharing among agents should be made privacy-conscious. Privacy preferences are generally specified to govern the context exchanging among agents. Besides who has rights to see what information, a user's privacy preference could also designate who has rights to have what obfuscated information. By obfuscation, people could present their private information in a coarser granularity, or simply in a falsified manner, depending on the specific situations. Nevertheless, people cannot randomly obfuscate their private information because by reasoning the recipients could detect the obfuscation. In this paper, we present a Bayesian network-based method to reason about the obfuscation. On the one hand, it can be used to find if the received information has been obfuscated, and if so, what the true information could be; on the other hand, it can be used to help the obfuscators reasonably obfuscate their private information.
在无处不在的环境中,代理之间的上下文共享应该具有隐私意识。通常指定隐私偏好来管理代理之间的上下文交换。除了谁有权查看哪些信息之外,用户的隐私偏好还可以指定谁有权拥有哪些被混淆的信息。通过混淆,人们可以根据具体情况以更粗的粒度或简单地以伪造的方式呈现他们的私人信息。然而,人们不能随意混淆他们的私人信息,因为通过推理,收件人可以检测到这种混淆。本文提出了一种基于贝叶斯网络的模糊推理方法。一方面,它可以用来发现接收到的信息是否被混淆了,如果是,真实的信息可能是什么;另一方面,它可以用来帮助混淆者合理地混淆他们的私人信息。
{"title":"Reasoning about obfuscated private information: who have lied and how to lie","authors":"X. An, D. Jutla, N. Cercone","doi":"10.1145/1179601.1179617","DOIUrl":"https://doi.org/10.1145/1179601.1179617","url":null,"abstract":"In ubiquitous environments, context sharing among agents should be made privacy-conscious. Privacy preferences are generally specified to govern the context exchanging among agents. Besides who has rights to see what information, a user's privacy preference could also designate who has rights to have what obfuscated information. By obfuscation, people could present their private information in a coarser granularity, or simply in a falsified manner, depending on the specific situations. Nevertheless, people cannot randomly obfuscate their private information because by reasoning the recipients could detect the obfuscation. In this paper, we present a Bayesian network-based method to reason about the obfuscation. On the one hand, it can be used to find if the received information has been obfuscated, and if so, what the true information could be; on the other hand, it can be used to help the obfuscators reasonably obfuscate their private information.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"58 1","pages":"85-88"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87573681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A privacy-preserving interdomain audit framework 一个保护隐私的域间审计框架
Adam J. Lee, Parisa Tabriz, N. Borisov
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborative research environments like PlanetLab. Unfortunately, when it comes to the security analysis of these systems, the whole is certainly greater than the sum of its parts. That is, local intrusion detection and audit practices are insufficient for detecting distributed attacks such as coordinated network reconnaissance, stepping-stone attacks, and violations of application-level trust constraints between security domains. A distributed process that coordinates information from each member could detect these types of violations, but privacy concerns between member organizations or safety concerns about centralizing sensitive information often restrict this level of information flow. In this paper, we propose a privacy-preserving framework for distributed audit that allows member organizations to detect distributed attacks without requiring the release of excessive private information. We discuss both the architecture and mechanisms used in our approach and comment on the performance of a prototype implementation.
互联网计算的最新趋势导致了多种形式的虚拟组织的普及。例子包括供应链管理、网格计算和像PlanetLab这样的协作研究环境。不幸的是,当涉及到这些系统的安全性分析时,整体肯定大于部分的总和。也就是说,本地入侵检测和审计实践不足以检测分布式攻击,例如协调网络侦察、踏脚石攻击和违反安全域之间的应用程序级信任约束。协调来自每个成员的信息的分布式流程可以检测到这些类型的违规,但是成员组织之间的隐私问题或集中敏感信息的安全问题通常会限制这种级别的信息流。在本文中,我们提出了一种用于分布式审计的隐私保护框架,该框架允许成员组织在不需要发布过多私人信息的情况下检测分布式攻击。我们讨论了我们的方法中使用的体系结构和机制,并对原型实现的性能进行了评论。
{"title":"A privacy-preserving interdomain audit framework","authors":"Adam J. Lee, Parisa Tabriz, N. Borisov","doi":"10.1145/1179601.1179620","DOIUrl":"https://doi.org/10.1145/1179601.1179620","url":null,"abstract":"Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborative research environments like PlanetLab. Unfortunately, when it comes to the security analysis of these systems, the whole is certainly greater than the sum of its parts. That is, local intrusion detection and audit practices are insufficient for detecting distributed attacks such as coordinated network reconnaissance, stepping-stone attacks, and violations of application-level trust constraints between security domains. A distributed process that coordinates information from each member could detect these types of violations, but privacy concerns between member organizations or safety concerns about centralizing sensitive information often restrict this level of information flow. In this paper, we propose a privacy-preserving framework for distributed audit that allows member organizations to detect distributed attacks without requiring the release of excessive private information. We discuss both the architecture and mechanisms used in our approach and comment on the performance of a prototype implementation.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"89 1","pages":"99-108"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85797697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
On the effectiveness of k;-anonymity against traffic analysis and surveillance 浅谈k -匿名对流量分析和监控的有效性
Nicholas Hopper, Eugene Y. Vasserman
The goal of most research on anonymity, including all currently used systems for anonymity, is to achieve anonymity through unlinkability: an adversary should not be able to determine the correspondence between the input and output messages of the system. An alternative anonymity goal is unobservability: an adversary should not be able to determine who sends and who receives messages. We study the effect of k-anonymity, a weak form of unobservability, on two types of attacks against systems that provide only unlinkability.
大多数匿名研究的目标,包括目前使用的所有匿名系统,都是通过不可链接性来实现匿名:攻击者不应该能够确定系统输入和输出消息之间的对应关系。另一个匿名目标是不可观察性:攻击者不应该能够确定谁发送和谁接收消息。我们研究了k-匿名(一种弱形式的不可观察性)对两种仅提供不可链接性的系统的攻击的影响。
{"title":"On the effectiveness of k;-anonymity against traffic analysis and surveillance","authors":"Nicholas Hopper, Eugene Y. Vasserman","doi":"10.1145/1179601.1179604","DOIUrl":"https://doi.org/10.1145/1179601.1179604","url":null,"abstract":"The goal of most research on anonymity, including all currently used systems for anonymity, is to achieve anonymity through unlinkability: an adversary should not be able to determine the correspondence between the input and output messages of the system. An alternative anonymity goal is unobservability: an adversary should not be able to determine who sends and who receives messages. We study the effect of k-anonymity, a weak form of unobservability, on two types of attacks against systems that provide only unlinkability.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"79 5 Pt 1 1","pages":"9-18"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74586388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Probabilistic privacy analysis of published views 已发布视图的概率隐私分析
Wendy Hui Wang, L. Lakshmanan
Among techniques for ensuring privacy in data publishing, k-anonymity and publishing of views on private data are quite popular. In this paper, we consider data publishing by views and develop a probability framework for the analysis of privacy breach. We propose two attack models and derive the probability of privacy breach for each model.
在确保数据发布隐私的技术中,k-匿名和发布对私有数据的看法是非常受欢迎的。在本文中,我们考虑了数据发布的观点,并建立了一个概率框架来分析隐私泄露。我们提出了两种攻击模型,并推导了每种模型的隐私泄露概率。
{"title":"Probabilistic privacy analysis of published views","authors":"Wendy Hui Wang, L. Lakshmanan","doi":"10.1145/1179601.1179616","DOIUrl":"https://doi.org/10.1145/1179601.1179616","url":null,"abstract":"Among techniques for ensuring privacy in data publishing, k-anonymity and publishing of views on private data are quite popular. In this paper, we consider data publishing by views and develop a probability framework for the analysis of privacy breach. We propose two attack models and derive the probability of privacy breach for each model.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"46 1","pages":"81-84"},"PeriodicalIF":0.0,"publicationDate":"2006-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80009873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1