120 likes | 250 Views
Technical Aspects of Privacy . Prof. Dr. Michael Waidner Director, Fraunhofer SIT and CASED Professor, TU Darmstadt, CSc /CASED/Security in IT. Conference on Security of eGovernment Brussels, European Parliament, February 19, 2013. Other services. Five Technical Privacy Challenges.
E N D
Technical Aspects of Privacy Prof. Dr. Michael Waidner Director, Fraunhofer SIT and CASEDProfessor, TU Darmstadt, CSc/CASED/Security in IT Conference on Security of eGovernment Brussels, European Parliament, February 19, 2013
Other services Five Technical Privacy Challenges 2. Purpose Purpose violation User Network • 3. Control • Lack of knowledge • Incorrect data • Unauthorized data • Persistency Service 1. Data Minimization Avoidable digital traces vis-à-vis Service and vis-à-vis Network 5. Anonymous aggregated and inferred data (Re-)identification, continuum of personal date – anonymous data 4. Context Context violation http://www.sit.cased.de/fileadmin/user_upload/Group_SIT/Publications/120227a_GhSW_12.pdf Other users
Crypto 1: Encryption for Confidentiality and Erasure Ready, widely deployed (but not always used and understood correctly) Backup User Service Data encrypted on disk/tape Deleting key = Erasing data http://www.sit.fraunhofer.de/en/fields-of-expertise/projects/omnicloud.html
Crypto 2: Privacy-preserving Attribute-Based Credentials (ABC) Issuer • Efficient • Mature (>10 years) • Smartcard-ready • Limited commercialavailability Ready for commercial use Relying Party User IBM Identity Mixer (Damgård ... Camenisch, Lysyanskaya 2001) Microsoft UProve(Chaum ... Brands 1999)
Crypto 3: Crypto + HW for Privacy-preserving Computations Ready for prototyping ObliviAd(Backes, Kate, Maffei, Pecina, 2013)
Crypto 4: Extending Control “Into the Cloud” Computes enc(F(data)) without the ability to decrypt enc(data). enc(data) enc(F(data)) Ready for small and special cases Needs more research Most recent breakthrough: Fully Homomorphic Encryption (Gentry, 2008)
Proposed EU Regulation is an Important Step Forward • 1. Demonstrate positive impact on innovation and prosperity • Inventory of business ideas and capabilities supporting privacy • 4. Privacy by Design needs specificity • Use cases, ref architectures, design tools • 2. Mandate and enable informed consent • Automation: Privacy Agents • Transparency: personal data management, automated analysis and nutrition labels, incident disclosure • Fair and demonstrably justified preauthorization • 3. Eroding difference between personal & anonymized data • Consider final impact on individual http://www.zeit.de/digital/datenschutz/2013-02/stellungnahme-datenschutz-professoren/komplettansicht
Other services Many Open Questions in Need of Research and Development 2. Purpose Purpose violation User Network • 3. Control • Lack of knowledge • Incorrect data • Unauthorized data • Persistency Service 1. Data Minimization Avoidable digital traces vis-à-vis Service and vis-à-vis Network 5. Anonymous aggregated and inferred data (Re-)identification, continuum of personal date – anonymous data 4. Context Context violation Other users
Prof. Dr. Michael Waidner michael.waidner@sit.fraunhofer.de Fraunhofer Institute forSecure Information Technology (SIT) Rheinstrasse 75 • 64295 Darmstadt • www.sit.fraunhofer.de Technical University of Darmstadt Department of Computer Science (FB20),Chair for Security in IT (FG SIT) Mornewegstrasse30 • 64289 Darmstadt • www.sit.tu-darmstadt.de