ON PRIVACY CLASSIFICATION IN UBIQUITOUS COMPUTING SYSTEMS

Authors

  • Dan Cvrcek
  • Vaclav Matyas
  • Marek Kumpost

DOI:

https://doi.org/10.47839/ijc.4.2.334

Keywords:

Anonymity, Common Criteria, PATS, Freiburg Privacy Diamond, unlinkability

Abstract

Many papers and articles attempt to define or even quantify privacy, typically with a major focus on anonymity. A related research exercise in the area of evidence-based trust models for ubiquitous computing environments has given us an impulse to take a closer look at the definition(s) of privacy in the Common Criteria, which we then transcribed in a bit more formal manner. This led us to a further review of unlinkability, and revision of another semi-formal model allowing for expression of anonymity and unlinkability – the Freiburg Privacy Diamond. We propose new means of describing (obviously only observable) characteristics of a system to reflect the role of contexts for profiling – and linking – users with actions in a system. We believe this approach should allow for evaluating privacy in large data sets.

References

A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. In Hawaii International Conference on System Sciences 33, pages 1769–1777. ACM, 2000.

J. Bacon, K. Moody, J. Bates, R. Hayton, C. Ma, A. McNeil, O. Seidel, and M. Spiteri. Generic support for distributed applications. IEEE Computer, pages 68–76, March 2000.

M. Bellare. A note on negligible functions. Technical Report CS97-529, Department of Computer Science and Engineering, UCSD, 1997.

V. Vahill et al. Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing Magazine, 2003 (July-September):52–61.

D. Cvrcek and V. Matyas. Pseudonymity in the light of evidence-based trust. In Proc. of the 12th Workshop on Security Protocols, LNCS (forthcoming), Cambridge, UK, April 2004. Springer-Verlag.

C. Diaz, S. Seys, J. Claessend, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. Syverson, editors, Proceeding of Privacy Enhancing Technologies Workshop (PET 2002), LNSC 2482. Springer-Verlag, April 2002.

J. Douceur. The Sybil attack. In 1st International Workshop on Peer-to-Peer Systems (IPTPS`02), LNCS 2429, pages 251–260. Springer-Verlag, 2002.

J. Y. Halpern and K. O`nelil. Anonymity and information hiding in multiagent systems. In Proceedings of the 16th IEEE Computer Security Foundations Workshop, pages 75–88, 2003.

D. Hughes and V. Shmatikov. Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security, special issue on selected papers of WITS 2002, 12(1):3–36, 2004.

D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In F. Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002), LNCS 2578. Springer-Verlag, October 2002.

M. Kinateder and S. Pearson. A privacy-enhanced peer-to-peer reputation system. In Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, EC-Web 2003, LNCS 2738, pages 206–215, Prague, Czech Republic, September 2003. Springer-Verlag.

A. Pfitzmann and M. Kohntopp. Anonymity, unobservability and pseudonymity – a proposal for terminology. In Designing Privacy Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, LNCS 2009, pages 1–9. Springer-Verlag, 2000.

K. Rannenberg and G. Iachello. Protection profiles for remailer mixes. In International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability, LNCS 2009, pages 181–230, Berkley, California, 2002. Springer-Verlag.

K. Rannenberg and G. Iachello. Protection profiles for remailer mixes – do the new evaluation criteria help? In 16th Annual Computer Security Applications Conference (AC-SAC`00), pages 107–118. IEEE, December 2000.

A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Privacy Enhancing Technologies (PET), LNCS 2482, pages 41–53. Springer-Verlag, April 2002.

S. Steinbrecher and S. Kopsell. Modelling unlinkability. In R. Dingledine, editor, Privacy Enhancing Technologies (PET), LNCS 2760, pages 32–47. Springer-Verlag, 2003.

The Common Criteria Project Sponsoring Organisations. Common Criteria for Information Technology Security Evaluation – part 2, version 2.1. August 1999.

A. Zugenmaier. Anonymity for Users of Mobile Devices through Location Addressing. RHOMBOS-Verlag, ISBN 3-930894-96-3, Berlin, 2003.

A. Zugenmaier, M. Kreutzer, and G. Muller. The Freiburg Privacy Diamond: An attacker model for a mobile computing environment. In Kommunikation in Verteilten Systemen (KiVS) `03, Leipzig, 2003.

Downloads

Published

2014-08-01

How to Cite

Cvrcek, D., Matyas, V., & Kumpost, M. (2014). ON PRIVACY CLASSIFICATION IN UBIQUITOUS COMPUTING SYSTEMS. International Journal of Computing, 4(2), 26-35. https://doi.org/10.47839/ijc.4.2.334

Issue

Section

Articles