12
Anonymity - Background R. Newman

Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Embed Size (px)

DESCRIPTION

Topics Defining anonymity Defining privacy Need for anonymity Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology

Citation preview

Page 1: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Anonymity - Background

R. Newman

Page 2: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Traffic analysis an issue prior to computers (e.g., Bodyguard of Lies)

Computer TAP solvable with cryptography With public-key cryptography, theoretical

possibility for anonymity and pseudonymity

Anonymity - Beginnings

Page 3: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Topics

Defining anonymity Defining privacy Need for anonymity Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology

Page 4: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Privacy/Anonymity Threats

Available surveillance technology Identification technology Increasing use of databases Data mining Identity theft Increasing requirements for I&A Increasing governmental desire for surveillance

Page 5: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Surveillance Facts

1.5 million CCTV cameras installed in UK post 911 – Londoner on camera ~300 times a day http://epic.org/privacy/surveillance/

Face recognition software used in Tampa for Superbowl

5000 public surveillance cameras known in DC Home and work zipcodes give identity in 5% of

cases in US http://33bits.org/tag/anonymity/

Page 6: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Homework

Count number of video cameras you encounter all day for one day.

Record locations, submit when Canvas up. Tally total, share total with class Friday.

Page 7: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Data Reidentification

Even ”scrubbed” data can be re-identified Characteristics within the data (e.g., word

usage in documents) Intersection attacks on k-anonymized database

set releases Use of known outside data in combination with

released data Data mining – higher dimensional space gives

greater specificity!

Page 8: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Exercise

What are legitmate limitations on anonymity? Write down 1-2 of these Share with neighbor Share with class

Page 9: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Limitations on Anonymity

Accountability Legal/criminal issues Social expectations Competing need for trust

Others?

Page 10: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Forms of Anonymity

Traffic Analysis Prevention Sender, Recipient, Message Anonymity Voter Anonymity Pseudonymity Revokable anonymity Data anonymity

Page 11: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Topics

Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology

Page 12: Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)

Anonymity Mechanisms

Cryptography Steganography Traffic Analysis Prevention (TAP) Mixes, crowds Data sanitization/scrubbing k-anonymity