1 / 15

Survey on Privacy-Related Technologies

Survey on Privacy-Related Technologies. Presented by Richard Lin Zhou. Content. Overview of technologies Communication based technologies Policy based technologies Application specific technologies. Privacy Related Technologies. Communication Based Approaches. MIX Zone

dong
Download Presentation

Survey on Privacy-Related Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Survey on Privacy-Related Technologies Presented by Richard Lin Zhou

  2. Content • Overview of technologies • Communication based technologies • Policy based technologies • Application specific technologies

  3. Privacy Related Technologies

  4. Communication Based Approaches • MIX Zone • Mix zone vsApplication zone • Infrastructure based. • k-anonymity: • Basic principle: Make sure an user is not distinguishable from the other k-1 users in the same group. • ANODOR: • Anonymous On Demand Routing

  5. Communication Based Approaches MIX Zone • Mix Zone: A connected spatial region of maximum size in which none of the users has registered any application callback. • Application Zone: An area where a user has registered for a callback. • A new identity is issued when entering a new application zone. No way to track a person if new ID is used each time

  6. Communication Based Approaches k-anonymity based/related • A user is k-anonymous if and only if he is indistinguishable from at least k-1 other users. • Reduce the accuracy of disclosed location • Most popular privacy technology under development • Anonysense: k-anonymity by generalization • VMDAV: k-anonymity by microaggregation • Hybrid Methdologies

  7. Communication Based Approaches k-anonymity based/related • Anonysense • Blurring mechanism by tessellation and clustering to protect privacy while reporting. • k-anonymous report aggregation to improve the users’ privacy against applications receiving the context.

  8. Communication Based Approaches k-anonymity based/related • V-MDAV • Blurring Mechanism by Micro-aggregation • Creating sets of equivalence class with similar attributes. • Domingo-Ferrer • User select k-1 other users based on responses from peers. • Hybrid V-MDAV • Adaptively uses V-MDAV and Tessellation

  9. Communication Based Approaches ANODR • Anonymous On Demand Routing • A routing protocol • Make packets not traceable by any observing adversary. • Routing scheme provides unlinkability. • Impossible to judge a node is sending or just forwarding a packet

  10. Policy Based Approaches • Let user be informed and in control of private information usage • User must trust the system • P3P • Platform for Privacy Preference Project • Encoding of Privacy Policies into XML • Often impossible to enforce the human-readable policy

  11. Policy Based Approaches • Personal Location Privacy Policies • Tools allowing individuals to adjust the accuracy for his location, identity, time, and speed. • Confab • Client centered architecture • Data is sensed, stored and process on end-user’s devices, with better user-interface for sharing.

  12. Application Specific Models • Pseudonyms authentication for VANET (Vehicular Ad-hoc Networks) • Enables vehicle on-board units to generate their own pseudonyms without affecting the system security while enhancing privacy protection.

  13. Application Specific Models • Privacy Risk Models • Target for practical methods to create privacy sensitive applications. • Help designer to create applications that provides end-users with a reasonable level of privacy protection that is relevant to the domain of application. • A general method for refining privacy from an abstract concept into concrete application-specific issues.

  14. Application Specific Models • Hitchhiking – An example of Privacy Risk Models • Targets for application that treat location as primary entity of interest (e.g. available tables in a coffee shop) • Preserve the anonymity of reports without reducing the precision of location disclosures • Location identifiers generated by client. No “trusted” servers. Can be application specific (e.g. Bus No. for bus tracing applications)

  15. Conclusion • Three main categories of approaches • Communication/Information minimizing (reduction of data) • Policy based approaches • Application specific approaches (solve one problem at once)

More Related