priv_trust_cerias

priv_trust_cerias - PrivateandTrustedInteractions*

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Private and Trusted Interactions * Bharat Bhargava, Leszek Lilien, and Dongyan Xu  {bb, llilien,  dxu}@cs.purdue.edu ) Department of Computer Sciences, CERIAS  and CWSA Purdue University in collaboration with Ph.D. students and postdocs in the Raid Lab Computer Sciences Building, Room CS 145, phone: 765-494-6702 www.cs.purdue.edu/homes/bb *   Supported in part by NSF grants IIS-0209059, IIS-0242840, ANI-0219110, and Cisco URP grant.   More  grants are welcomed! Center for Education and Research in Information Assurance and Security (Executive Director: Eugene Spafford) Center for Wireless Systems and Applications (Director: Catherine P. Rosenberg)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
3/23/04 2 Motivation Sensitivity of personal data                       [Ackerman  et al. ‘99 ] 82% willing to reveal their favorite TV show Only 1% willing to reveal their SSN Business losses due to privacy violations Online consumers worry about revealing personal data This fear held back $15 billion in online revenue in 2001 Federal Privacy Acts to protect privacy E.g., Privacy Act of 1974 for federal agencies Still many examples of privacy violations even by federal agencies JetBlue Airways revealed travellers’ data to federal gov’t E.g., Health Insurance Portability and Accountability Act of  1996 (HIPAA)
Background image of page 2
3/23/04 3 Privacy and Trust Privacy Problem Consider computer-based interactions From a simple transaction to a complex collaboration Interactions involve  dissemination of private data It is voluntary, “pseudo-voluntary,” or required by law Threats of privacy violations result in lower trust Lower trust leads to isolation and lack of collaboration Trust must be established Data – provide quality an integrity End-to-end communication – sender authentication,  message integrity Network routing algorithms – deal with malicious peers,  intruders, security attacks
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
3/23/04 4 Fundamental Contributions Provide measures of privacy and trust Empower users (peers, nodes) to control privacy in  ad hoc environments Privacy of user identification Privacy of user movement Provide privacy in data dissemination Collaboration Data warehousing Location-based services Tradeoff between privacy and trust Minimal  privacy disclosures Disclose private data absolutely necessary to gain a level of trust  required by the partner system  
Background image of page 4
3/23/04 5 Proposals and Publications Submitted NSF proposals “Private and Trusted Interactions,” by B. Bhargava (PI) and L. Lilien (co-PI), March 2004. “Quality Healthcare Through Pervasive Data Access,” by D. Xu (PI), B. Bhargava, C.-K.K. Chang, 
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 67

priv_trust_cerias - PrivateandTrustedInteractions*

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online