14,732 research outputs found
End-to-End Privacy for Open Big Data Markets
The idea of an open data market envisions the creation of a data trading
model to facilitate exchange of data between different parties in the Internet
of Things (IoT) domain. The data collected by IoT products and solutions are
expected to be traded in these markets. Data owners will collect data using IoT
products and solutions. Data consumers who are interested will negotiate with
the data owners to get access to such data. Data captured by IoT products will
allow data consumers to further understand the preferences and behaviours of
data owners and to generate additional business value using different
techniques ranging from waste reduction to personalized service offerings. In
open data markets, data consumers will be able to give back part of the
additional value generated to the data owners. However, privacy becomes a
significant issue when data that can be used to derive extremely personal
information is being traded. This paper discusses why privacy matters in the
IoT domain in general and especially in open data markets and surveys existing
privacy-preserving strategies and design techniques that can be used to
facilitate end to end privacy for open data markets. We also highlight some of
the major research challenges that need to be address in order to make the
vision of open data markets a reality through ensuring the privacy of
stakeholders.Comment: Accepted to be published in IEEE Cloud Computing Magazine: Special
Issue Cloud Computing and the La
The Prom Problem: Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes
In the Prom Problem (TPP), Alice wishes to attend a school dance with Bob and needs a risk-free, privacy preserving way to find out whether Bob shares that same wish. If not, no one should know that she inquired about it, not even Bob. TPP represents a special class of matchmaking challenges, augmenting the properties of privacy-enhanced matchmaking, further requiring fairness and support for identity linked wishes (ILW) – wishes involving specific identities that are only valid if all involved parties have those same wishes.
The Horne-Nair (HN) protocol was proposed as a solution to TPP along with a sample pseudo-code embodiment leveraging an untrusted matchmaker. Neither identities nor pseudo-identities are included in any messages or stored in the matchmaker’s database. Privacy relevant data stay within user control. A security analysis and proof-of-concept implementation validated the approach, fairness was quantified, and a feasibility analysis demonstrated practicality in real-world networks and systems, thereby bounding risk prior to incurring the full costs of development.
The SecretMatchâ„¢ Prom app leverages one embodiment of the patented HN protocol to achieve privacy-enhanced and fair matchmaking with ILW. The endeavor led to practical lessons learned and recommendations for privacy engineering in an era of rapidly evolving privacy legislation. Next steps include design of SecretMatchâ„¢ apps for contexts like voting negotiations in legislative bodies and executive recruiting. The roadmap toward a quantum resistant SecretMatchâ„¢ began with design of a Hybrid Post-Quantum Horne-Nair (HPQHN) protocol. Future directions include enhancements to HPQHN, a fully Post Quantum HN protocol, and more
ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS
La pérdida de privacidad se está convirtiendo en uno de los mayores problemas
en el mundo de la informática. De hecho, la mayorÃa de los usuarios
de Internet (que hoy en dÃa alcanzan la cantidad de 2 billones de usuarios
en todo el mundo) están preocupados por su privacidad. Estas preocupaciones
también se trasladan a las nuevas ramas de la informática que están
emergiendo en los ultimos años. En concreto, en esta tesis nos centramos en
la privacidad en los Sistemas Multiagente. En estos sistemas, varios agentes
(que pueden ser inteligentes y/o autónomos) interactúan para resolver problemas.
Estos agentes suelen encapsular información personal de los usuarios
a los que representan (nombres, preferencias, tarjetas de crédito, roles, etc.).
Además, estos agentes suelen intercambiar dicha información cuando interactúan entre ellos. Todo esto puede resultar en pérdida de privacidad para
los usuarios, y por tanto, provocar que los usuarios se muestren adversos a
utilizar estas tecnologÃas.
En esta tesis nos centramos en evitar la colección y el procesado de información personal en Sistemas Multiagente. Para evitar la colección de información, proponemos un modelo para que un agente sea capaz de decidir
qué atributos (de la información personal que tiene sobre el usuario al que
representa) revelar a otros agentes. Además, proporcionamos una infraestructura
de agentes segura, para que una vez que un agente decide revelar
un atributo a otro, sólo este último sea capaz de tener acceso a ese atributo,
evitando que terceras partes puedan acceder a dicho atributo. Para evitar el
procesado de información personal proponemos un modelo de gestión de las
identidades de los agentes. Este modelo permite a los agentes la utilización
de diferentes identidades para reducir el riesgo del procesado de información. Además, también describimos en esta tesis la implementación de dicho
modelo en una plataforma de agentes.Such Aparicio, JM. (2011). ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/13023Palanci
- …