89,022 research outputs found
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Search engines are the prevalently used tools to collect information about
individuals on the Internet. Search results typically comprise a variety of
sources that contain personal information -- either intentionally released by
the person herself, or unintentionally leaked or published by third parties,
often with detrimental effects on the individual's privacy. To grant
individuals the ability to regain control over their disseminated personal
information, the European Court of Justice recently ruled that EU citizens have
a right to be forgotten in the sense that indexing systems, must offer them
technical means to request removal of links from search results that point to
sources violating their data protection rights. As of now, these technical
means consist of a web form that requires a user to manually identify all
relevant links upfront and to insert them into the web form, followed by a
manual evaluation by employees of the indexing system to assess if the request
is eligible and lawful.
We propose a universal framework Oblivion to support the automation of the
right to be forgotten in a scalable, provable and privacy-preserving manner.
First, Oblivion enables a user to automatically find and tag her disseminated
personal information using natural language processing and image recognition
techniques and file a request in a privacy-preserving manner. Second, Oblivion
provides indexing systems with an automated and provable eligibility mechanism,
asserting that the author of a request is indeed affected by an online
resource. The automated ligibility proof ensures censorship-resistance so that
only legitimately affected individuals can request the removal of corresponding
links from search results. We have conducted comprehensive evaluations, showing
that Oblivion is capable of handling 278 removal requests per second, and is
hence suitable for large-scale deployment
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in
security protocols. A protocol is described by a collection of rules
constraining the propagation of knowledge amongst principals. Because this
characterization corresponds closely to informal descriptions of protocols, it
allows a succinct and natural formalization; because it abstracts away message
ordering, and handles communications between principals and applications of
cryptographic primitives uniformly, it is readily represented in a standard
logic. A generic framework in the Alloy modelling language is presented, and
instantiated for two standard protocols, and a new key management scheme.Comment: 20 page
Autonomous detection and anticipation of jam fronts from messages propagated by inter-vehicle communication
In this paper, a minimalist, completely distributed freeway traffic
information system is introduced. It involves an autonomous, vehicle-based jam
front detection, the information transmission via inter-vehicle communication,
and the forecast of the spatial position of jam fronts by reconstructing the
spatiotemporal traffic situation based on the transmitted information. The
whole system is simulated with an integrated traffic simulator, that is based
on a realistic microscopic traffic model for longitudinal movements and lane
changes. The function of its communication module has been explicitly validated
by comparing the simulation results with analytical calculations. By means of
simulations, we show that the algorithms for a congestion-front recognition,
message transmission, and processing predict reliably the existence and
position of jam fronts for vehicle equipment rates as low as 3%. A reliable
mode of operation already for small market penetrations is crucial for the
successful introduction of inter-vehicle communication. The short-term
prediction of jam fronts is not only useful for the driver, but is essential
for enhancing road safety and road capacity by intelligent adaptive cruise
control systems.Comment: Published in the Proceedings of the Annual Meeting of the
Transportation Research Board 200
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes
With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of practical privacy concerns such as identity privacy and transaction anonymity, which have not been formally considered in the literature. In addition, we propose a general biometric-based remote authentication scheme and prove its security in our security model
- âŠ