ON PRIVACY CLASSIFICATION IN UBIQUITOUS COMPUTING SYSTEMS
DOI:
https://doi.org/10.47839/ijc.4.2.334Keywords:
Anonymity, Common Criteria, PATS, Freiburg Privacy Diamond, unlinkabilityAbstract
Many papers and articles attempt to define or even quantify privacy, typically with a major focus on anonymity. A related research exercise in the area of evidence-based trust models for ubiquitous computing environments has given us an impulse to take a closer look at the definition(s) of privacy in the Common Criteria, which we then transcribed in a bit more formal manner. This led us to a further review of unlinkability, and revision of another semi-formal model allowing for expression of anonymity and unlinkability – the Freiburg Privacy Diamond. We propose new means of describing (obviously only observable) characteristics of a system to reflect the role of contexts for profiling – and linking – users with actions in a system. We believe this approach should allow for evaluating privacy in large data sets.References
A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. In Hawaii International Conference on System Sciences 33, pages 1769–1777. ACM, 2000.
J. Bacon, K. Moody, J. Bates, R. Hayton, C. Ma, A. McNeil, O. Seidel, and M. Spiteri. Generic support for distributed applications. IEEE Computer, pages 68–76, March 2000.
M. Bellare. A note on negligible functions. Technical Report CS97-529, Department of Computer Science and Engineering, UCSD, 1997.
V. Vahill et al. Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing Magazine, 2003 (July-September):52–61.
D. Cvrcek and V. Matyas. Pseudonymity in the light of evidence-based trust. In Proc. of the 12th Workshop on Security Protocols, LNCS (forthcoming), Cambridge, UK, April 2004. Springer-Verlag.
C. Diaz, S. Seys, J. Claessend, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. Syverson, editors, Proceeding of Privacy Enhancing Technologies Workshop (PET 2002), LNSC 2482. Springer-Verlag, April 2002.
J. Douceur. The Sybil attack. In 1st International Workshop on Peer-to-Peer Systems (IPTPS`02), LNCS 2429, pages 251–260. Springer-Verlag, 2002.
J. Y. Halpern and K. O`nelil. Anonymity and information hiding in multiagent systems. In Proceedings of the 16th IEEE Computer Security Foundations Workshop, pages 75–88, 2003.
D. Hughes and V. Shmatikov. Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security, special issue on selected papers of WITS 2002, 12(1):3–36, 2004.
D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In F. Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002), LNCS 2578. Springer-Verlag, October 2002.
M. Kinateder and S. Pearson. A privacy-enhanced peer-to-peer reputation system. In Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, EC-Web 2003, LNCS 2738, pages 206–215, Prague, Czech Republic, September 2003. Springer-Verlag.
A. Pfitzmann and M. Kohntopp. Anonymity, unobservability and pseudonymity – a proposal for terminology. In Designing Privacy Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, LNCS 2009, pages 1–9. Springer-Verlag, 2000.
K. Rannenberg and G. Iachello. Protection profiles for remailer mixes. In International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability, LNCS 2009, pages 181–230, Berkley, California, 2002. Springer-Verlag.
K. Rannenberg and G. Iachello. Protection profiles for remailer mixes – do the new evaluation criteria help? In 16th Annual Computer Security Applications Conference (AC-SAC`00), pages 107–118. IEEE, December 2000.
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Privacy Enhancing Technologies (PET), LNCS 2482, pages 41–53. Springer-Verlag, April 2002.
S. Steinbrecher and S. Kopsell. Modelling unlinkability. In R. Dingledine, editor, Privacy Enhancing Technologies (PET), LNCS 2760, pages 32–47. Springer-Verlag, 2003.
The Common Criteria Project Sponsoring Organisations. Common Criteria for Information Technology Security Evaluation – part 2, version 2.1. August 1999.
A. Zugenmaier. Anonymity for Users of Mobile Devices through Location Addressing. RHOMBOS-Verlag, ISBN 3-930894-96-3, Berlin, 2003.
A. Zugenmaier, M. Kreutzer, and G. Muller. The Freiburg Privacy Diamond: An attacker model for a mobile computing environment. In Kommunikation in Verteilten Systemen (KiVS) `03, Leipzig, 2003.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.