230 likes | 476 Views
Privacy Enhancing Technology for Web. Meng Yan. Introduction. In fact, your online actions may be monitored by unauthorized parties logged and preserved for future access years later. Principles. Controlling Over Data Collection Limitation Inform Data Security Access Right.
E N D
Privacy Enhancing Technology for Web Meng Yan
Introduction • In fact, • your online actions may be • monitored by unauthorized parties • logged and preserved for future access years later
Principles • Controlling Over Data • Collection Limitation • Inform • Data Security • Access Right
Principles • Protecting Anonymity • Anonymity • Pseudonymity • Unobservability • Unlinkablity • Deniability
Principles • Separating User from Unwanted Data
Classification Based on Application Area: • Privacy Policy Language • Anonymity Technology • Authentication Management
ClassificationPrivacy Policy Language • Application Area • Formalize privacy policies • Help surfers understand privacy policies • Help websites express privacy policies • Representative PPL • P3P • EPAL • XACML
ClassificationPrivacy Policy LanguageP3P • Give a standard format of privacy policy • User agent of P3P interprets privacy policy to users • User need not to read privacy policy at every website they visit
ClassificationPrivacy Policy LanguageEPAL • The first language that allows websites to express privacy policies of rule-based complexity directly in a standards-based markup language
ClassificationPrivacy Policy LanguageeXtensible Access Control Markup Language (XACML) • Describe privacy policy • Describe request/response
ClassificationAnonymity Technology • Application Area • Anonymous browsing and publishing • Classification (based on implementation_method) • Remove user’s information • Anonymous HTTP proxy server • Mark-up user’s information • Mix-based System • Crowd
HTTP Server HTTP Proxy Server N Modified HTTP Request HTTP Proxy Server 1 HTTP Request User ClassificationAnonymity TechnologyAnonymous HTTP proxy server
Server Onion Router Onion Router Onion Router Onion Router Onion Router Onion Router Exit Entry Onion Router Onion Proxy User ClassificationAnonymity TechnologyMix-based System
ClassificationAuthentication Management • Application Area • Protect Identity • Authenticating Information (AI) • What user knows (password) • What user has (fingerprints, credit card number) • What user does (signature) • Classification • Two-factor authentication (relies on two AI) • Multi-factor authentication (relies on more than two AI)
ComparisonCrowd vs. mix-based system • Common Mix-based Systems • message delivery paths are fixed and messages are encrypted. • Crowd • paths are dynamically configured as a message traverses the network and each crowd member encrypts the message for the next member of the path.
Conclusion P3P Privacy Policy Language (PPL) EPAL & XACML PET HTTP proxy server Anonymity Technology Mix-based system &(Crowd) Two-factor Authentication Management Multi-factor