TAILIEUCHUNG - Private and Trusted Interactions
Private and Trusted Interactions presents about Privacy and Trust, Fundamental Contributions, Proposals and Publications, Privacy in Data Dissemination, Problem of Privacy Preservation, Notification in Self-descriptive Objects, Optimization of Object Transmission. | Private and Trusted Interactions* Bharat Bhargava, Leszek Lilien, and Dongyan Xu {bb, llilien, dxu}@) Department of Computer Sciences, CERIAS† and CWSA‡ Purdue University in collaboration with . students and postdocs in the Raid Lab Computer Sciences Building, Room CS 145, phone: 765-494-6702 * Supported in part by NSF grants IIS-0209059, IIS-0242840, ANI-0219110, and Cisco URP grant. More grants are welcomed! † Center for Education and Research in Information Assurance and Security (Executive Director: Eugene Spafford) ‡ Center for Wireless Systems and Applications (Director: Catherine P. Rosenberg) Motivation Sensitivity of personal data [Ackerman et al. ‘99] 82% willing to reveal their favorite TV show Only 1% willing to reveal their SSN Business losses due to privacy violations Online consumers worry about revealing personal data This fear held back $15 billion in online revenue in 2001 Federal Privacy Acts to protect privacy ., Privacy Act of 1974 for federal agencies Still many examples of privacy violations even by federal agencies JetBlue Airways revealed travellers’ data to federal gov’t ., Health Insurance Portability and Accountability Act of 1996 (HIPAA) 3/23/04 Privacy and Trust Privacy Problem Consider computer-based interactions From a simple transaction to a complex collaboration Interactions involve dissemination of private data It is voluntary, “pseudo-voluntary,” or required by law Threats of privacy violations result in lower trust Lower trust leads to isolation and lack of collaboration Trust must be established Data – provide quality an integrity End-to-end communication – sender authentication, message integrity Network routing algorithms – deal with malicious peers, intruders, security attacks 3/23/04 Fundamental Contributions Provide measures of privacy and trust Empower users (peers, nodes) to control privacy in ad hoc environments Privacy of user identification Privacy of user .
đang nạp các trang xem trước