65
Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universit ` a di Napoli “Federico II”, Italy Leuven, 14/9/2011 ESORICS’11 – 14/9/2011

Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

  • Upload
    lytuong

  • View
    231

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Towards a mechanism for incentivating privacy

Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro

Universita di Napoli “Federico II”, Italy

Leuven, 14/9/2011

ESORICS’11 – 14/9/2011

Page 2: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

IntroductionThe economic value of user profiles

Rich user profiles = Money

An incentive for providers to collect lots of personal (sensitive)information (and sell it!)

user name, birth date, gender, detailed address, credit cardinformation

lots of quasi-identifierseven sex preferences, and political and religious views

ESORICS’11 – 14/9/2011

Page 3: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

IntroductionThe economic value of user profiles

Rich user profiles = Money

An incentive for providers to collect lots of personal (sensitive)information (and sell it!)

user name, birth date, gender, detailed address, credit cardinformationlots of quasi-identifiers

even sex preferences, and political and religious views

ESORICS’11 – 14/9/2011

Page 4: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

IntroductionThe economic value of user profiles

Rich user profiles = Money

An incentive for providers to collect lots of personal (sensitive)information (and sell it!)

user name, birth date, gender, detailed address, credit cardinformationlots of quasi-identifierseven sex preferences, and political and religious views

ESORICS’11 – 14/9/2011

Page 5: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

IntroductionPrivacy-related questions

Is all of the profile necessary for deploying services effectivelyand securely ?

Is anything preventing providers from collecting more andmore information ?

Is there any mechanism for minimizing provider requests?

ESORICS’11 – 14/9/2011

Page 6: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

IntroductionPrivacy-related questions

Is all of the profile necessary for deploying services effectivelyand securely ?

Is anything preventing providers from collecting more andmore information ?

Is there any mechanism for minimizing provider requests?

ESORICS’11 – 14/9/2011

Page 7: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

IntroductionPrivacy-related questions

Is all of the profile necessary for deploying services effectivelyand securely ?

Is anything preventing providers from collecting more andmore information ?

Is there any mechanism for minimizing provider requests?

ESORICS’11 – 14/9/2011

Page 8: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

IntroductionPrivacy through competition

Many people do care about privacylarge groups of Facebook users threatened to leave and joinother networks several timesFacebook had to stop and reshape some of its new services

Several analysts say that privacy may become a factor ofcompetition

Our ultimate goal:developing mechanisms that moderate profile collectionthrough provider competition

ESORICS’11 – 14/9/2011

Page 9: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

IntroductionPrivacy through competition

Many people do care about privacylarge groups of Facebook users threatened to leave and joinother networks several timesFacebook had to stop and reshape some of its new services

Several analysts say that privacy may become a factor ofcompetition

Our ultimate goal:developing mechanisms that moderate profile collectionthrough provider competition

ESORICS’11 – 14/9/2011

Page 10: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

IntroductionPrivacy through competition

Many people do care about privacylarge groups of Facebook users threatened to leave and joinother networks several timesFacebook had to stop and reshape some of its new services

Several analysts say that privacy may become a factor ofcompetition

Our ultimate goal:developing mechanisms that moderate profile collectionthrough provider competition

ESORICS’11 – 14/9/2011

Page 11: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The first step(this paper)

Truthful mechanismsi.e. providers ask for the user information they really needbecause that’s the best strategy

Second-price auctions (a.k.a. Vickrey’s auctions)perhaps the most popular truthful mechanism

Technical problemsour “currency” (profiles) is only partially orderedthere is no “second price”

First technical investigationIs there any truthful mechanism compatible with the structureof our scenarios ?

ESORICS’11 – 14/9/2011

Page 12: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The first step(this paper)

Truthful mechanismsi.e. providers ask for the user information they really needbecause that’s the best strategy

Second-price auctions (a.k.a. Vickrey’s auctions)perhaps the most popular truthful mechanism

Technical problemsour “currency” (profiles) is only partially orderedthere is no “second price”

First technical investigationIs there any truthful mechanism compatible with the structureof our scenarios ?

ESORICS’11 – 14/9/2011

Page 13: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The first step(this paper)

Truthful mechanismsi.e. providers ask for the user information they really needbecause that’s the best strategy

Second-price auctions (a.k.a. Vickrey’s auctions)perhaps the most popular truthful mechanism

Technical problemsour “currency” (profiles) is only partially orderedthere is no “second price”

First technical investigationIs there any truthful mechanism compatible with the structureof our scenarios ?

ESORICS’11 – 14/9/2011

Page 14: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The first step(this paper)

Truthful mechanismsi.e. providers ask for the user information they really needbecause that’s the best strategy

Second-price auctions (a.k.a. Vickrey’s auctions)perhaps the most popular truthful mechanism

Technical problemsour “currency” (profiles) is only partially orderedthere is no “second price”

First technical investigationIs there any truthful mechanism compatible with the structureof our scenarios ?

ESORICS’11 – 14/9/2011

Page 15: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Auction-like mechanismV 0.0

Protocol:1 User asks for a service

2 Providers respond with their information requests, e.g.{login, password} or {credit-card, ID}

3 User selects provider (user ∼ auctioneer, providers ∼ bidders)

Information items (called credentials) are not equally sensitive

{prepaid-card} ≺ {birthdate,zip} (strict partial order)

Simplifying assumptions (to be dropped)providers offer functionally equivalent servicesinformation-disclosure costs only(e.g. flight booking like Kayak, Momondo, ...)

users choose providers based on information requests onlyrepeated service usage has no additional costs

ESORICS’11 – 14/9/2011

Page 16: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Auction-like mechanismV 0.0

Protocol:1 User asks for a service2 Providers respond with their information requests, e.g.{login, password} or {credit-card, ID}

3 User selects provider (user ∼ auctioneer, providers ∼ bidders)

Information items (called credentials) are not equally sensitive

{prepaid-card} ≺ {birthdate,zip} (strict partial order)

Simplifying assumptions (to be dropped)providers offer functionally equivalent servicesinformation-disclosure costs only(e.g. flight booking like Kayak, Momondo, ...)

users choose providers based on information requests onlyrepeated service usage has no additional costs

ESORICS’11 – 14/9/2011

Page 17: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Auction-like mechanismV 0.0

Protocol:1 User asks for a service2 Providers respond with their information requests, e.g.{login, password} or {credit-card, ID}

3 User selects provider (user ∼ auctioneer, providers ∼ bidders)

Information items (called credentials) are not equally sensitive

{prepaid-card} ≺ {birthdate,zip} (strict partial order)

Simplifying assumptions (to be dropped)providers offer functionally equivalent servicesinformation-disclosure costs only(e.g. flight booking like Kayak, Momondo, ...)

users choose providers based on information requests onlyrepeated service usage has no additional costs

ESORICS’11 – 14/9/2011

Page 18: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Auction-like mechanismV 0.0

Protocol:1 User asks for a service2 Providers respond with their information requests, e.g.{login, password} or {credit-card, ID}

3 User selects provider (user ∼ auctioneer, providers ∼ bidders)

Information items (called credentials) are not equally sensitive

{prepaid-card} ≺ {birthdate,zip} (strict partial order)

Simplifying assumptions (to be dropped)providers offer functionally equivalent servicesinformation-disclosure costs only(e.g. flight booking like Kayak, Momondo, ...)

users choose providers based on information requests onlyrepeated service usage has no additional costs

ESORICS’11 – 14/9/2011

Page 19: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Auction-like mechanismV 0.0

Protocol:1 User asks for a service2 Providers respond with their information requests, e.g.{login, password} or {credit-card, ID}

3 User selects provider (user ∼ auctioneer, providers ∼ bidders)

Information items (called credentials) are not equally sensitive

{prepaid-card} ≺ {birthdate,zip} (strict partial order)

Simplifying assumptions (to be dropped)providers offer functionally equivalent servicesinformation-disclosure costs only(e.g. flight booking like Kayak, Momondo, ...)

users choose providers based on information requests onlyrepeated service usage has no additional costs

ESORICS’11 – 14/9/2011

Page 20: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Auction-like mechanismV 0.0

Protocol:1 User asks for a service2 Providers respond with their information requests, e.g.{login, password} or {credit-card, ID}

3 User selects provider (user ∼ auctioneer, providers ∼ bidders)

Information items (called credentials) are not equally sensitive

{prepaid-card} ≺ {birthdate,zip} (strict partial order)

Simplifying assumptions (to be dropped)providers offer functionally equivalent servicesinformation-disclosure costs only(e.g. flight booking like Kayak, Momondo, ...)

users choose providers based on information requests onlyrepeated service usage has no additional costs

ESORICS’11 – 14/9/2011

Page 21: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – User privacy constraintsV 0.0

User privacy constraints (user policy): maximal disclosablesets

{zip,nationality} or {credit-card, birthdate}

zip is OK; credit-card + birthdate is OKzip + birthdate not releasable

Admissible requestsLet adm be the set of all requests (sets of items) that satisfythe user’s privacy preferences

ESORICS’11 – 14/9/2011

Page 22: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – User privacy constraintsV 0.0

User privacy constraints (user policy): maximal disclosablesets

{zip,nationality} or {credit-card, birthdate}zip is OK; credit-card + birthdate is OK

zip + birthdate not releasable

Admissible requestsLet adm be the set of all requests (sets of items) that satisfythe user’s privacy preferences

ESORICS’11 – 14/9/2011

Page 23: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – User privacy constraintsV 0.0

User privacy constraints (user policy): maximal disclosablesets

{zip,nationality} or {credit-card, birthdate}zip is OK; credit-card + birthdate is OKzip + birthdate not releasable

Admissible requestsLet adm be the set of all requests (sets of items) that satisfythe user’s privacy preferences

ESORICS’11 – 14/9/2011

Page 24: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – User privacy constraintsV 0.0

User privacy constraints (user policy): maximal disclosablesets

{zip,nationality} or {credit-card, birthdate}zip is OK; credit-card + birthdate is OKzip + birthdate not releasable

Admissible requestsLet adm be the set of all requests (sets of items) that satisfythe user’s privacy preferences

ESORICS’11 – 14/9/2011

Page 25: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider policyV 0.0

Provider policy: minimal acceptable sets (for service access){login,password} or {credit-card, exp-date,username,...}

login + password + credit-card is OKlogin + credit-card not enough

Fulfilling disclosuresLet ful(pol i) be all sets of items that satisfy provider i’s policy

ESORICS’11 – 14/9/2011

Page 26: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider policyV 0.0

Provider policy: minimal acceptable sets (for service access){login,password} or {credit-card, exp-date,username,...}login + password + credit-card is OK

login + credit-card not enough

Fulfilling disclosuresLet ful(pol i) be all sets of items that satisfy provider i’s policy

ESORICS’11 – 14/9/2011

Page 27: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider policyV 0.0

Provider policy: minimal acceptable sets (for service access){login,password} or {credit-card, exp-date,username,...}login + password + credit-card is OKlogin + credit-card not enough

Fulfilling disclosuresLet ful(pol i) be all sets of items that satisfy provider i’s policy

ESORICS’11 – 14/9/2011

Page 28: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider policyV 0.0

Provider policy: minimal acceptable sets (for service access){login,password} or {credit-card, exp-date,username,...}login + password + credit-card is OKlogin + credit-card not enough

Fulfilling disclosuresLet ful(pol i) be all sets of items that satisfy provider i’s policy

ESORICS’11 – 14/9/2011

Page 29: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider requests (strategies)V 0.0

Request , policythey have the same structure, though (a list of info sets)reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets{credit-card, ID, SSN} or ...

Providers may omit alternativese.g. omit student-id because passport is “richer”{credit-card, student-id} or {credit-card, passport}

A strategy reqi is truthful if reqi = pol iUsers must release a set in ful(reqi)

Each set in reqi must be in ful(pol i)

ESORICS’11 – 14/9/2011

Page 30: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider requests (strategies)V 0.0

Request , policythey have the same structure, though (a list of info sets)reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets{credit-card, ID, SSN} or ...

Providers may omit alternativese.g. omit student-id because passport is “richer”{credit-card, student-id} or {credit-card, passport}

A strategy reqi is truthful if reqi = pol iUsers must release a set in ful(reqi)

Each set in reqi must be in ful(pol i)

ESORICS’11 – 14/9/2011

Page 31: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider requests (strategies)V 0.0

Request , policythey have the same structure, though (a list of info sets)reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets{credit-card, ID, SSN} or ...

Providers may omit alternativese.g. omit student-id because passport is “richer”{credit-card, student-id} or {credit-card, passport}

A strategy reqi is truthful if reqi = pol iUsers must release a set in ful(reqi)

Each set in reqi must be in ful(pol i)

ESORICS’11 – 14/9/2011

Page 32: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider requests (strategies)V 0.0

Request , policythey have the same structure, though (a list of info sets)reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets{credit-card, ID, SSN} or ...

Providers may omit alternativese.g. omit student-id because passport is “richer”{credit-card, student-id} or {credit-card, passport}

A strategy reqi is truthful if reqi = pol i

Users must release a set in ful(reqi)

Each set in reqi must be in ful(pol i)

ESORICS’11 – 14/9/2011

Page 33: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider requests (strategies)V 0.0

Request , policythey have the same structure, though (a list of info sets)reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets{credit-card, ID, SSN} or ...

Providers may omit alternativese.g. omit student-id because passport is “richer”{credit-card, student-id} or {credit-card, passport}

A strategy reqi is truthful if reqi = pol iUsers must release a set in ful(reqi)

Each set in reqi must be in ful(pol i)

ESORICS’11 – 14/9/2011

Page 34: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The Formal Framework – Provider requests (strategies)V 0.0

Request , policythey have the same structure, though (a list of info sets)reqi denotes the information request of provider i (its strategy)

Providers may ask for larger information sets{credit-card, ID, SSN} or ...

Providers may omit alternativese.g. omit student-id because passport is “richer”{credit-card, student-id} or {credit-card, passport}

A strategy reqi is truthful if reqi = pol iUsers must release a set in ful(reqi)

Each set in reqi must be in ful(pol i)

ESORICS’11 – 14/9/2011

Page 35: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Provider goals

Which information sets do they prefer?larger (w.r.t. ⊆)more sensitive (w.r.t. ≺)

hypothesis: more sensitive⇒ more valuable

What are their priorities?getting preferred info setswinning (i.e. being selected)

ESORICS’11 – 14/9/2011

Page 36: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Provider goals

Which information sets do they prefer?larger (w.r.t. ⊆)more sensitive (w.r.t. ≺)

hypothesis: more sensitive⇒ more valuable

What are their priorities?getting preferred info setswinning (i.e. being selected)

ESORICS’11 – 14/9/2011

Page 37: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Profiles

A profile π is a vector that summarizes the whole scenariouser policyall provider policies, strategies, and preferences

ESORICS’11 – 14/9/2011

Page 38: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario πreqi ∩ opt(π) , ∅

opt(π) = min ≺

N⋃j=1

reqj ∩ adm

1 Choose some provider i ∈ cw(π) (randomly)2 Choose a set of credentials from res(π, i) and disclose it to i

if res(π, i) = ∅ the transaction failshow to define res(π, i) ?

ESORICS’11 – 14/9/2011

Page 39: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario πreqi ∩ opt(π) , ∅

opt(π) = min ≺

N⋃j=1

reqj ∩ adm

1 Choose some provider i ∈ cw(π) (randomly)2 Choose a set of credentials from res(π, i) and disclose it to i

if res(π, i) = ∅ the transaction failshow to define res(π, i) ?

ESORICS’11 – 14/9/2011

Page 40: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario πreqi ∩ opt(π) , ∅

opt(π) = min ≺

N⋃j=1

reqj ∩ adm

1 Choose some provider i ∈ cw(π) (randomly)2 Choose a set of credentials from res(π, i) and disclose it to i

if res(π, i) = ∅ the transaction failshow to define res(π, i) ?

ESORICS’11 – 14/9/2011

Page 41: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario πreqi ∩ opt(π) , ∅

opt(π) = min ≺

N⋃j=1

reqj ∩ adm

1 Choose some provider i ∈ cw(π) (randomly)

2 Choose a set of credentials from res(π, i) and disclose it to iif res(π, i) = ∅ the transaction failshow to define res(π, i) ?

ESORICS’11 – 14/9/2011

Page 42: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The mechanism

Candidate winners cw(π)

those who make an optimal request in the current scenario πreqi ∩ opt(π) , ∅

opt(π) = min ≺

N⋃j=1

reqj ∩ adm

1 Choose some provider i ∈ cw(π) (randomly)2 Choose a set of credentials from res(π, i) and disclose it to i

if res(π, i) = ∅ the transaction failshow to define res(π, i) ?

ESORICS’11 – 14/9/2011

Page 43: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The right notion of response

Some definitions introduce additional failures (see the paper)

Some don’t, but release lots of information items (see thepaper)

Other variants make it profitable to lieVaults are the best solution so far

the largest admissible responses that are not more sensitivethan any other provider’s request

vault(π, i) = max ⊆{r | r ∈ adm ∧ ∀r ′ ∈ opt−i(π). r ′ ⊀ r

}.

Responses must also fulfil some of i’s optimal requests

res(π, i) = vault(π, i) ∩ ful(opt(π) ∩ reqi) .

ESORICS’11 – 14/9/2011

Page 44: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The right notion of response

Some definitions introduce additional failures (see the paper)

Some don’t, but release lots of information items (see thepaper)

Other variants make it profitable to lieVaults are the best solution so far

the largest admissible responses that are not more sensitivethan any other provider’s request

vault(π, i) = max ⊆{r | r ∈ adm ∧ ∀r ′ ∈ opt−i(π). r ′ ⊀ r

}.

Responses must also fulfil some of i’s optimal requests

res(π, i) = vault(π, i) ∩ ful(opt(π) ∩ reqi) .

ESORICS’11 – 14/9/2011

Page 45: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The right notion of response

Some definitions introduce additional failures (see the paper)

Some don’t, but release lots of information items (see thepaper)

Other variants make it profitable to lieVaults are the best solution so far

the largest admissible responses that are not more sensitivethan any other provider’s request

vault(π, i) = max ⊆{r | r ∈ adm ∧ ∀r ′ ∈ opt−i(π). r ′ ⊀ r

}.

Responses must also fulfil some of i’s optimal requests

res(π, i) = vault(π, i) ∩ ful(opt(π) ∩ reqi) .

ESORICS’11 – 14/9/2011

Page 46: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The right notion of response

Some definitions introduce additional failures (see the paper)

Some don’t, but release lots of information items (see thepaper)

Other variants make it profitable to lieVaults are the best solution so far

the largest admissible responses that are not more sensitivethan any other provider’s request

vault(π, i) = max ⊆{r | r ∈ adm ∧ ∀r ′ ∈ opt−i(π). r ′ ⊀ r

}.

Responses must also fulfil some of i’s optimal requests

res(π, i) = vault(π, i) ∩ ful(opt(π) ∩ reqi) .

ESORICS’11 – 14/9/2011

Page 47: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The right notion of response

Some definitions introduce additional failures (see the paper)

Some don’t, but release lots of information items (see thepaper)

Other variants make it profitable to lieVaults are the best solution so far

the largest admissible responses that are not more sensitivethan any other provider’s request

vault(π, i) = max ⊆{r | r ∈ adm ∧ ∀r ′ ∈ opt−i(π). r ′ ⊀ r

}.

Responses must also fulfil some of i’s optimal requests

res(π, i) = vault(π, i) ∩ ful(opt(π) ∩ reqi) .

ESORICS’11 – 14/9/2011

Page 48: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Analogy with second price

Vickrey’s auctionsThe winner pays the minimum price that is not worse (i.e., smaller)than any other offer (and satisfies the winner’s request)

Vault-based mechanismThe winner gets a maximal response that is not worse (i.e., moresensitive) than any other offer, and satisfies both the user’s policyand the winner’s request

ESORICS’11 – 14/9/2011

Page 49: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Resultscomparison with other res we tried

The vault-based definition of resdoes not fail if at least one provider makes an admissiblerequestit never releases more information than the other responsefunctions with the same property

ESORICS’11 – 14/9/2011

Page 50: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Resultsreleasing maximal admissible sets

In general, a provider may get more than what it asked foras in 2nd price auctionsthe price to pay for truthfulnessnonetheless...

The vault-based definition of res may release a maximaladmissible set r only if

either there is no competitionor some j asks exactly for r

in practice, systematic exploitation requires exact knowledge ofuser preferences

ESORICS’11 – 14/9/2011

Page 51: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Resultsreleasing maximal admissible sets

In general, a provider may get more than what it asked foras in 2nd price auctionsthe price to pay for truthfulnessnonetheless...

The vault-based definition of res may release a maximaladmissible set r only if

either there is no competitionor some j asks exactly for r

in practice, systematic exploitation requires exact knowledge ofuser preferences

ESORICS’11 – 14/9/2011

Page 52: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Resultstruthfulness

The vault-based mechanism is truthful, i.e. reqi = pol i is themost effective strategy

both for the providers that give higher priority to getting morepreferred sets (larger or more sensitive)and for the providers that give higher priority to winning

Knowledge about the other agents’ behavior does not affecttruthfulness(Minimal disclosures) If all providers have the same policy

by exhogenous technological constraintse.g. because they support the same credit card companies

and i is rational/truthful, then:all other agents j , i can get only elements of pol jif some k , i is rational/truthful, too, then all providers j can getonly elements of pol j

ESORICS’11 – 14/9/2011

Page 53: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Resultstruthfulness

The vault-based mechanism is truthful, i.e. reqi = pol i is themost effective strategy

both for the providers that give higher priority to getting morepreferred sets (larger or more sensitive)and for the providers that give higher priority to winning

Knowledge about the other agents’ behavior does not affecttruthfulness

(Minimal disclosures) If all providers have the same policyby exhogenous technological constraintse.g. because they support the same credit card companies

and i is rational/truthful, then:all other agents j , i can get only elements of pol jif some k , i is rational/truthful, too, then all providers j can getonly elements of pol j

ESORICS’11 – 14/9/2011

Page 54: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Resultstruthfulness

The vault-based mechanism is truthful, i.e. reqi = pol i is themost effective strategy

both for the providers that give higher priority to getting morepreferred sets (larger or more sensitive)and for the providers that give higher priority to winning

Knowledge about the other agents’ behavior does not affecttruthfulness(Minimal disclosures) If all providers have the same policy

by exhogenous technological constraintse.g. because they support the same credit card companies

and i is rational/truthful, then:

all other agents j , i can get only elements of pol jif some k , i is rational/truthful, too, then all providers j can getonly elements of pol j

ESORICS’11 – 14/9/2011

Page 55: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Resultstruthfulness

The vault-based mechanism is truthful, i.e. reqi = pol i is themost effective strategy

both for the providers that give higher priority to getting morepreferred sets (larger or more sensitive)and for the providers that give higher priority to winning

Knowledge about the other agents’ behavior does not affecttruthfulness(Minimal disclosures) If all providers have the same policy

by exhogenous technological constraintse.g. because they support the same credit card companies

and i is rational/truthful, then:all other agents j , i can get only elements of pol jif some k , i is rational/truthful, too, then all providers j can getonly elements of pol j

ESORICS’11 – 14/9/2011

Page 56: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Related worknothing really similar

In trust negotiationno equivalent to pol i : TN policies ≈ reqino attempt to minimize provider requests

In [Feigenbaum et al 2010] the goal is minimizing theinformation that bidders (providers) have to disclose to theauctioneer

In [Kleinberg et al 2001] the goal is inducing users to releasemore (and more accurate) information about theirpreferences, by means of compensation

To the best of our knowledge, no auction mechanism dealswith partially ordered payment means.

ESORICS’11 – 14/9/2011

Page 57: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Related worknothing really similar

In trust negotiationno equivalent to pol i : TN policies ≈ reqino attempt to minimize provider requests

In [Feigenbaum et al 2010] the goal is minimizing theinformation that bidders (providers) have to disclose to theauctioneer

In [Kleinberg et al 2001] the goal is inducing users to releasemore (and more accurate) information about theirpreferences, by means of compensation

To the best of our knowledge, no auction mechanism dealswith partially ordered payment means.

ESORICS’11 – 14/9/2011

Page 58: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Related worknothing really similar

In trust negotiationno equivalent to pol i : TN policies ≈ reqino attempt to minimize provider requests

In [Feigenbaum et al 2010] the goal is minimizing theinformation that bidders (providers) have to disclose to theauctioneer

In [Kleinberg et al 2001] the goal is inducing users to releasemore (and more accurate) information about theirpreferences, by means of compensation

To the best of our knowledge, no auction mechanism dealswith partially ordered payment means.

ESORICS’11 – 14/9/2011

Page 59: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

Related worknothing really similar

In trust negotiationno equivalent to pol i : TN policies ≈ reqino attempt to minimize provider requests

In [Feigenbaum et al 2010] the goal is minimizing theinformation that bidders (providers) have to disclose to theauctioneer

In [Kleinberg et al 2001] the goal is inducing users to releasemore (and more accurate) information about theirpreferences, by means of compensation

To the best of our knowledge, no auction mechanism dealswith partially ordered payment means.

ESORICS’11 – 14/9/2011

Page 60: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

ConclusionAchievements

Competition between equivalent applications provablyminimizes the amount of personal information requested byrational providers

Possible applicationspreventing attacks to TN strategies that gradually extract allreleasable information from the user agent

enhancing the privacy of profile transfers (as in OpenID)transfer only what the new provider asks for (minimized throughcompetition)

ESORICS’11 – 14/9/2011

Page 61: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

ConclusionAchievements

Competition between equivalent applications provablyminimizes the amount of personal information requested byrational providers

Possible applicationspreventing attacks to TN strategies that gradually extract allreleasable information from the user agent

enhancing the privacy of profile transfers (as in OpenID)transfer only what the new provider asks for (minimized throughcompetition)

ESORICS’11 – 14/9/2011

Page 62: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

ConclusionAchievements

Competition between equivalent applications provablyminimizes the amount of personal information requested byrational providers

Possible applicationspreventing attacks to TN strategies that gradually extract allreleasable information from the user agent

enhancing the privacy of profile transfers (as in OpenID)transfer only what the new provider asks for (minimized throughcompetition)

ESORICS’11 – 14/9/2011

Page 63: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

ConclusionFuture work: A long to-do list (details in the paper)

Introduce service costs, functional differences, quality ofservice...

information requests are not the only choice criterion anylongeropportunities for compensation and negotiation/repeatedauctions

Deployment issuesProviding guarantees to providers, e.g.

Cryptographic protocols for checking that the user carries outthe auction correctly (e.g. via commitments & blind signatures,secure multiparty computations)Trusted third parties: a new role for portals like Kayak,Momondo etc.?

ESORICS’11 – 14/9/2011

Page 64: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

ConclusionFuture work: A long to-do list (details in the paper)

Introduce service costs, functional differences, quality ofservice...

information requests are not the only choice criterion anylongeropportunities for compensation and negotiation/repeatedauctions

Deployment issuesProviding guarantees to providers, e.g.

Cryptographic protocols for checking that the user carries outthe auction correctly (e.g. via commitments & blind signatures,secure multiparty computations)Trusted third parties: a new role for portals like Kayak,Momondo etc.?

ESORICS’11 – 14/9/2011

Page 65: Towards a mechanism for incentivating privacy · Towards a mechanism for incentivating privacy Piero Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro Universita di Napoli “Federico

The End

Question time

ESORICS’11 – 14/9/2011