Lecture 2b - Getting a grip on anonymity

Download Report

Transcript Lecture 2b - Getting a grip on anonymity

Anonymity - Background

Prof. Newman, instructor

CSE-E346

352-505-1579 (don’t leave message)

Office Hours (tentative): 10-noon TR

[email protected] - subject: Anon ...
Reading

Read Pfitzman & Waidner

Read Chaum Mix paper

Start discussion of these Friday

Reading list (approximate) on web page
What is Anonymity

Literally, lacking a name (a + onyma)

Unidentifiability

Inability to attribute artifact or actions

Related to privacy - how?
Topics

Defining anonymity

Defining privacy

Need for anonymity

Threats to anonymity and privacy

Mechanisms to provide anonymity

Applications of anonymity technology
Exercise

Take a minute or two to define privacy

Share with your neighbor(s)

Share with the class
What is Privacy?

Ability of an entity to control its own space

Physical space

Bodily space

Data space

Communication space

What else?
Exercise


What are examples of privacy in these spaces?

Physical space

Bodily space

Data space

Communication space
What other spaces can you think of?
Privacy Spaces

Physical space:


Bodily space:


identity, activity, status, records
Communication space:


medical consent, battery
Data space:


invasion, paparazzi, location (GPS)
email, Internet privacy, correspondents, phone #,
address, stalking, harassment
Overlap in spaces (e.g., location)
Topics

Defining anonymity

Defining privacy

Need for anonymity

Threats to anonymity and privacy

Mechanisms to provide anonymity

Applications of anonymity technology
Need for Privacy/Anonymity

Planning/execution in competition

Fundamental right – voting, celebrities

Philosophical necessity (free will)

Restarting when past can cripple

Statutory requirements (HIPAA, FISMA)

Liability issues – data release

Freedom/survival in repressive environments

Increasing pressure from technologies
Privacy/Anonymity Threats

Available surveillance technology

Identification technology

Increasing use of databases

Data mining

Identity theft

Increasing requirements for I&A

Increasing governmental desire for surveillance