Both concepts design properties of a system and, by extension, their enforcement
Both concepts design properties of a system and, by extension, their enforcement
Security focuses on protecting users and businesses from intrusions, attacks, vulnerabilities, etc.
Security provides a safe environment and secure communication along with end user and business protection (Chang et al., 2005)
Feeling of security
Privacy: “State of being alone and not watched or disturbed by other people / State of being free from the attention of the public” (Oxford Dictionary)
Privacy: “State of being alone and not watched or disturbed by other people / State of being free from the attention of the public” (Oxford Dictionary)
The perception of privacy is shaped by
the perceived identity of the information receiver
the perceived usageof the information
the subjective sensitivityof the disclosed information, and
the contextin which the information is disclosed
(Adams, cited by Lederer et al, 2003)
“An individual actively yet intuitively monitors and adjusts his behavior in the presence of others in an attempt to control their conceptions of his identity”
(Goffman, cited by Lederer et al, 2003)
(Feeling of) Security along with privacy are user-sensitive (user-dependent) concepts
Security and privacy are key enablers
for interaction, collaboration and DE dynamics
Digital Ecosystems
Digital Ecosystems
Security and Privacy
The Personalization vs Privacy Dilemma
Enforcing Security and Privacy
Identity
Location
Accountability
Trust
Reputation
Privacy-Preserving Trust and Reputation protocols
A Proposition of Research Agenda
Pervasiveness/smartness means personalization
Pervasiveness/smartness means personalization
Personalization needs context and user (profile) information disclosure
Privacy needs context and user (profile) information hiding
The central dilemma: Personalization or Privacy
The central challenge: mitigate personalization and privacy
(Digital Ecosystems)
(Digital Ecosystems)
Security and Privacy
The Personalization vs Privacy Dilemma
Enforcing Security and Privacy
Identity
Location
Accountability
Trust
Reputation
Privacy-Preserving Trust and Reputation protocols
A Proposition of Research Agenda
Who are you? Is this information private or public?
Who are you? Is this information private or public?
A second approach: pray the watcher is a good and intelligent guy
A third approach: pray the watcher is a good guy that will respect your location privacy rules (ensure he agrees with that); give him the usage rules he is concerned by; if the guy appears as a bad guy, have a discussion together (or start a legal action)
This last issue illustrates a very important concern about privacy: the further (uncontrolled) usage of a disclosed information (see also: Creative Commons)
Definition: “Condition in which individuals who exercise power are constrained by external means and by internal norms” (Public Administration Dictionary)
Definition: “Condition in which individuals who exercise power are constrained by external means and by internal norms” (Public Administration Dictionary)
Accountable services/systems
Un-deniability (non repudiation of actions)
Verifiability (correctness and deviations)
Detection of deviations
(from Malone et al.)
monitoring/logging
easy with trusted third parties; complex otherwise
Open unpredictable un-secure: live is risk
Open unpredictable un-secure: live is risk
The alternative would be Big Brother…
Use security tools, forget security systems
Shift from (false) determinism (of security) to probability, risk management, and social-awareness
Gambetta (1990): “Trust […] is a particular level of the subjective probability with which an agent assesses that another agent [..] will perform a particular action […] in a context in which it affects his own action”
Gambetta (1990): “Trust […] is a particular level of the subjective probability with which an agent assesses that another agent [..] will perform a particular action […] in a context in which it affects his own action”
Wang (2003): “an Agent’s belief in another Agent’s capabilities, honesty and reliability based on its own direct experiences”
Chang and al. (2005): “Belief that the Trusting Agent has in the Trusted Agent’s willingness and capability to deliver a quality of service in a given context and in a given Timeslot”
Jøsang et al. (2007):
Trust (reliability trust) is the subjective probability by which an individual, A, expects that another individual, B, performs a given action on which its welfare depends
Trust (decision trust) is the extent to which one party is willing to depend on something or somebody in a given situation with a feeling of relative security, even though negative consequences are possible
Marsh (1994): all studies on trust make the assumption of the presence of a society
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. O. Hasan, L. Brunie, E. Bertino, N. Shang. IEEE Transactions on Information Forensics and Security, vol.8, n°6, p. 949-962, 2013.
(Digital Ecosystems)
(Digital Ecosystems)
Security and Privacy
The Personalization vs Privacy Dilemma
Enforcing Security and Privacy
Identity
Location
Accountability
Trust
Reputation
Privacy-Preserving Trust and Reputation protocols
Some Hints for a Research Agenda
Seamless certified and secure integration of multiple heterogeneous ecosystems, e.g., sensor network and cloud infrastructure
Seamless certified and secure integration of multiple heterogeneous ecosystems, e.g., sensor network and cloud infrastructure
Holistic trust, reputation and security business-centric value-aware framework (do not forget security…)
Lifecycle of a piece of information (is a piece of information a new “thing”?)
The issue of identity and anonymity
Personalization vs Privacy dilemma / User-centric privacy management proxy
Enforcing new rights: indifference and oblivion
A social Web of things
« [In the] Internet of Things (IoT) […] physical and virtual ‘things’ have identities […] and virtual personalities and […] are expected to become active participants in business, information and social processes […] » (CERP-IoT)
Identity? Personality? Relationship? Social network of things? Trust? Privacy?