Privacy to the Test – Exploring the Limits of Online Anonymity and Accountability

Published: 25 July 2008 y., Friday

 

The films we watch, the products we buy and the subjects that interest us can tell others a lot about who we are — information that, rightly, we might wish to keep to ourselves. The internet, to which we entrust so much of this information, works because of our faith in the confidentiality of the behaviours we exhibit and in a shared sense of responsibility. Work from three teams, recognised today in the Microsoft-sponsored Privacy Enhancing Technology Awards, suggests that more can be done to ensure that people can be confident that their privacy will be protected online.

Arvind Narayanan and Vitaly Shmatikov, researchers at the University of Texas, began looking into large, publicly available data sets that were cleansed of names or other personally identifiable information. They very quickly discovered a major privacy risk — anonymised data sets could be used to re-identify individuals using efficient algorithms. They took the theory and tested it in reality, examining anonymised movie ratings and dates of rating for 500,000 users published by a major online movie rental service. Narayanan and Shmatikov found that they could identify a user's ratings record with only five to ten educated guesses relating to some of those ratings. Narayanan and Shmatikov proceeded to develop a theory that shows how this applies to other data sets such as an online store's purchasing records.

Their work, which earned them the overall 2008 PET award, shows the danger in releasing apparently anonymised data without better methods to ensure that it can't be compromised. Their research will be invaluable in promoting and informing the development of ways to release data with provable privacy guarantees.

Chair of the 2008 judging committee Dr. Matthew Wright, assistant professor of computer science and engineering at the University of Texas at Arlington, recognised the team's contribution to improved privacy. “This year's PET award finalists are representatives of the breadth of the privacy technology field. The winners have discovered a technique that would identify an internet user's anonymised data, such as preferences and purchasing records, having the potential to create a critical privacy breach. This type of research will help organisations understand that, to protect their users' privacy, it is not sufficient to simply remove all obvious identifiers.”

The Privacy Enhancing Technologies Symposium (PETS) was launched seven years ago as a specialised conference focused on anonymous communication, but has extended its scope to address a wide range of challenging technical problems that need to be overcome to define and protect individuals' privacy. The PET Award is given to researchers who have made an exceptional contribution to the theory, design, implementation or deployment of privacy-enhancing technology. The winners are judged by a committee of leading privacy researchers from around the world. Microsoft has funded the annual €3,000 prize since the award's inception in 2003, but leaves decision-making in the hands of the symposium's prominent academic contributors.

“Microsoft believes it is necessary to bring together academic researchers and the privacy community to find original and innovative ways to protect people's personal information online,” said Caspar Bowden, chief privacy advisor for Microsoft Europe, Middle East and Africa. “Our sponsorship of the PET Award and Symposium is intended to promote excellence in this area of growing importance.”

Runners-up Steven J. Murdoch and Piotr Zieliński of Cambridge University also uncovered possible dangers to our online anonymity. Their paper discusses and analyses, for the first time, the possibility of surveillance at internet exchanges (IXes). High volumes of traffic pass through these exchanges when travelling from one network to another, making them an ideal point from which to gather surveillance data. Murdoch and Zieliński first showed that a single IX could observe a large fraction of traffic on the experimental Tor network, a distributed network of relays that bounces traffic around the internet to facilitate anonymous access to information. Despite the fact that the amount of data was overwhelming, Murdoch and Zielinski's study looked into how much they could learn about users from only a snapshot of the surveillance data gathered.

Using techniques that are realistic with today's network technology, they showed that this method of looking at a small sample of data was surprisingly effective and could uncover a lot of information about Tor users. This research is notable because it could change the way researchers think of the security of network privacy systems, and is likely to be influential in future research about internet surveillance.

Fellow finalists from the Department of Computer Science at Brown University in the US were recognised for a different privacy aspect — maintaining anonymity while ensuring accountability. Mira Belenkiy, Melissa Chase, C. Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya and Erich Rachlin focused on peer-to-peer (P2P) systems, such as the popular BitTorrent file-sharing service. These types of services rely on every user's computer providing service as well as receiving services from others. The decentralised nature of peer-to-peer systems makes it difficult to ensure that all computers are providing their fair share of service.

Although privacy and accountability may seem contradictory, the team has found a way to enable this by using advanced cryptography techniques, which they also developed. The proposed approach is analogous to using electronic cash (e-cash) for payment for online services. E-cash systems are designed to be anonymous like real cash, but can also be engineered with mechanisms to inhibit cheating. Here, the currency of e-cash is not monetary value, but levels of trust within a P2P network. The authors explored the economic issues that would be involved in a real deployment in a system like BitTorrent, and evaluated the performance of the system in both simulation and testing of a prototype implementation. The team used computer equipment that is considered basic by today's standards, and concludes that provably secure, anonymous and scalable P2P systems are within reach.

The awards ceremony is part of the annual PET Symposium where prominent academics from around the world gather to discuss recent advances and new perspectives in information privacy on the internet, in data-sharing, and in other technologies such as location tracking of mobile devices. Microsoft supports the PET Symposium by providing a fund for travel stipends to graduate students in the field who want to attend but lack the financial means. The recipients of the stipends are decided independently by the PET organisation committee.

Dr Wright added, “The PET symposium brings together the people working to make IT compatible with our basic value of privacy. As more aspects of our daily lives are conducted on the internet, from banking to dating to politics, it's more important than ever to develop and evaluate new approaches for protecting privacy.”

Šaltinis: www.microsoft.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

New Release of Unisys Baggage Reconciliation System Helps Enhance Security and Efficiency of Baggage Handling at Airport

Unisys Corporation (NYSE: UIS) announced enhancements to its Baggage Reconciliation System (BRS) featuring more detailed information about baggage handling requirements for incoming flights, real-time monitoring and alerts of service level agreements (SLAs), and a mobile app to provide passengers with live updates on when and where to collect their bags. more »

Samsung gains tablet market share as Apple lead narrows

Samsung doubled its share of the tablet PC market in the last three months of 2012, research firm IDC has said. more »

Facebook boss insists site is not making a phone

Facebook boss Mark Zuckerberg has strongly denied the social network is planning to release its own phone. more »

Google TVs get gaming service via LG deal

The OnLive gaming service is to be made available to Google TV users, following a deal with electronics firm LG. One of a handful of firms making hardware for Google TV. LG's G2 series sets have Google's TV service built in. more »

Blackberry introduces free wi-fi calls on BBM

Blackberry has become the latest smartphone to offer free wi-fi calls to users via its own software. Research In Motion (RIM) has added the facility to its Blackberry Messenger (BBM) app, which already offered an alternative to text messages. more »

2012 SIIA CODiE Awards

We are delighted to announce that on 26th of January SafeNet Sentinel Cloud was awarded the SiiA 2012 Best Digital Rights Management Solution! more »

Anti-internet piracy law adopted by Spanish government

The Spanish government has approved tough new legislation which could see websites deemed to be trading in pirated material blocked within ten days. more »

Los Angeles World Airports Selects Unisys to Upgrade ID Card Reader System and Network

The Los Angeles World Airports (LAWA), which oversees airport operations for the city of Los Angeles, has awarded a contract modification to Unisys (NYSE: UIS) to upgrade its access control and alarm monitoring system, used to identify the 45,000 airport employees, contractors, police and others who work at the organization’s three airports. more »

Unisys Strengthens Enterprise-Class Cloud Offerings with New Version of Secure Private Cloud Solution

Unisys Corporation (NYSE: UIS) today announced Version 2 of its Unisys Secure Private Cloud Solution, the company’s flagship cloud solution for clients’ and cloud service providers’ data centers. more »

Fake Apple stores found in China

An American blogger has discovered three fake Apple stores operating in Kunming city, China. more »