Basics of Privacy Flashcards
Privacy compared to other security goals?
§ Privacy often relates to what others actually do with the data
§ Privacy in many cases is something that can hardly be controlled by the individual whose data is to be kept private
Anonymity on the Internet pro and con?
§ Positive aspects - Avoiding detection, retribution and embarrassment - Freedom of expression - Whistle-blowing § Negative aspects (Illegal activity) - Anonymous bribery - Copyright infringement - Harassment and financial scams
Anonymity vs. Privacy
§ Privacy
- claim of an entity to determine for themselves when, how, and to what extend information about them is communicated to others
§ Anonymity
- not being identifiable in a set of subjects
§ Privacy != Anonymity
- anonymity is a way to maintain privacy, but not always necessary to achieve privacy
Anonymous communication: VPN/Proxy
§ Idea: use intermediate server to serve as proxy for a user’s actions
§ Problem:
-requires trust in proxy server
- ISP could figure out with timing-collision
Towards Onion Routing
§ Similar to proxy, but use multiple servers
§ Problem: single compromised proxy breaks anonymity
- first proxy knows the recipient, payload, and original sender
Onion Routing - Circuit Construction
§ Establish symmetric keys between the sender and proxy nodes such that
- only the sender and a proxy node knows the key, and
- a proxy node does not know entities other than its neighbours on the path (or circuit)
§ Sender creates layered encryption of message (onion) and sends it to the first node in selected circuit
- sender uses public key of node for each layer
§ Each proxy decrypts one layer of the onion and forwards to the next proxy
K-Anonymity (Intuitive Idea)
- Privacy means that one can hide within a set of (at least) K - 1 other people with the same quasi-identifiers.
Achieving K-Anonymity
- Reduce the information such that the data collapses
Attacks on K-Anonymity
Homogeneity
- One may learn a lot of information about an individual, if there are k people with this information
Background Knowledge
- Background knowledge that might look unsuspicious or not too privacy critical may lead to privacy breaches
L-Diversity
§ There have to be L different, “representative” results for each set of quasi identifiers.
-> homogeneity attacks no longer possible
Attack on L-Diversity
Lots of knowledge in a scenario