150 likes | 310 Views
Survey on Privacy-Related Technologies. Presented by Richard Lin Zhou. Content. Overview of technologies Communication based technologies Policy based technologies Application specific technologies. Privacy Related Technologies. Communication Based Approaches. MIX Zone
E N D
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou
Content • Overview of technologies • Communication based technologies • Policy based technologies • Application specific technologies
Communication Based Approaches • MIX Zone • Mix zone vsApplication zone • Infrastructure based. • k-anonymity: • Basic principle: Make sure an user is not distinguishable from the other k-1 users in the same group. • ANODOR: • Anonymous On Demand Routing
Communication Based Approaches MIX Zone • Mix Zone: A connected spatial region of maximum size in which none of the users has registered any application callback. • Application Zone: An area where a user has registered for a callback. • A new identity is issued when entering a new application zone. No way to track a person if new ID is used each time
Communication Based Approaches k-anonymity based/related • A user is k-anonymous if and only if he is indistinguishable from at least k-1 other users. • Reduce the accuracy of disclosed location • Most popular privacy technology under development • Anonysense: k-anonymity by generalization • VMDAV: k-anonymity by microaggregation • Hybrid Methdologies
Communication Based Approaches k-anonymity based/related • Anonysense • Blurring mechanism by tessellation and clustering to protect privacy while reporting. • k-anonymous report aggregation to improve the users’ privacy against applications receiving the context.
Communication Based Approaches k-anonymity based/related • V-MDAV • Blurring Mechanism by Micro-aggregation • Creating sets of equivalence class with similar attributes. • Domingo-Ferrer • User select k-1 other users based on responses from peers. • Hybrid V-MDAV • Adaptively uses V-MDAV and Tessellation
Communication Based Approaches ANODR • Anonymous On Demand Routing • A routing protocol • Make packets not traceable by any observing adversary. • Routing scheme provides unlinkability. • Impossible to judge a node is sending or just forwarding a packet
Policy Based Approaches • Let user be informed and in control of private information usage • User must trust the system • P3P • Platform for Privacy Preference Project • Encoding of Privacy Policies into XML • Often impossible to enforce the human-readable policy
Policy Based Approaches • Personal Location Privacy Policies • Tools allowing individuals to adjust the accuracy for his location, identity, time, and speed. • Confab • Client centered architecture • Data is sensed, stored and process on end-user’s devices, with better user-interface for sharing.
Application Specific Models • Pseudonyms authentication for VANET (Vehicular Ad-hoc Networks) • Enables vehicle on-board units to generate their own pseudonyms without affecting the system security while enhancing privacy protection.
Application Specific Models • Privacy Risk Models • Target for practical methods to create privacy sensitive applications. • Help designer to create applications that provides end-users with a reasonable level of privacy protection that is relevant to the domain of application. • A general method for refining privacy from an abstract concept into concrete application-specific issues.
Application Specific Models • Hitchhiking – An example of Privacy Risk Models • Targets for application that treat location as primary entity of interest (e.g. available tables in a coffee shop) • Preserve the anonymity of reports without reducing the precision of location disclosures • Location identifiers generated by client. No “trusted” servers. Can be application specific (e.g. Bus No. for bus tracing applications)
Conclusion • Three main categories of approaches • Communication/Information minimizing (reduction of data) • Policy based approaches • Application specific approaches (solve one problem at once)