Skip to main content
Top

2019 | OriginalPaper | Chapter

Privacy Protocols

Authors : Jason Castiglione, Dusko Pavlovic, Peter-Michael Seidel

Published in: Foundations of Security, Protocols, and Equational Reasoning

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security protocols enable secure communication over insecure channels. Privacy protocols enable private interactions over secure channels. Security protocols set up secure channels using cryptographic primitives. Privacy protocols set up private channels using secure channels. But just like some security protocols can be broken without breaking the underlying cryptography, some privacy protocols can be broken without breaking the underlying security. Such privacy attacks have been used to leverage e-commerce against targeted advertising from the outset; but their depth and scope became apparent only with the overwhelming advent of influence campaigns in politics. The blurred boundaries between privacy protocols and privacy attacks present a new challenge for protocol analysis. Or maybe they do not, as the novelty is often in the eye of the observer. Cathy Meadows spearheaded and steered our research in security protocols. The methods for analyzing privacy protocols arise directly from her work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Information is, of course, a resource, so it can be private.
 
2
A \(\mathcal{Y}\times \mathcal{Y}\)-matrix with finitely many nonzero, nonnegative entries is doubly stochastic if the sums of the entries in each nonzero row and in each nonzero column are 1. Already Garrett Birkhoff considered infinite doubly stochastic matrices, asking for the infinitary generalization of his doubly stochastic decomposition in the problem 111 of his Lattice Theory.
 
3
Nikolai Vasilievich Gogol was a XIX century Russian writer. Gogols are also the ape-like enemies in the video game Xenoblade Chronicles.
 
4
Gogol receives advertising requests in a separate privacy protocol. It will be briefly discussed in the next section.
 
Literature
1.
go back to reference Acquisti, A., Gritzalis, S., Lambrinoudakis, C., di Vimercati, S.: Digital Privacy: Theory, Technologies, and Practices. CRC Press, Boca Raton (2007) Acquisti, A., Gritzalis, S., Lambrinoudakis, C., di Vimercati, S.: Digital Privacy: Theory, Technologies, and Practices. CRC Press, Boca Raton (2007)
2.
go back to reference Alberti, P.M., Uhlmann, A.: Stochasticity and Partial Order: Double Stochastic Maps and Unitary Mixing. Mathematics and its Applications. Springer, Heidelberg (1981)MATH Alberti, P.M., Uhlmann, A.: Stochasticity and Partial Order: Double Stochastic Maps and Unitary Mixing. Mathematics and its Applications. Springer, Heidelberg (1981)MATH
3.
go back to reference Ando, T.: Majorization, doubly stochastic matrices, and comparison of eigenvalues. Linear Algebra Appl. 118, 163–248 (1989)MathSciNetCrossRef Ando, T.: Majorization, doubly stochastic matrices, and comparison of eigenvalues. Linear Algebra Appl. 118, 163–248 (1989)MathSciNetCrossRef
4.
go back to reference Angela, A., Conti, G.: A Day in the Life of Ancient Rome. Europa Editions, New York (2009) Angela, A., Conti, G.: A Day in the Life of Ancient Rome. Europa Editions, New York (2009)
5.
go back to reference Angwin, J.: Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance. Henry Holt and Company, New York (2014) Angwin, J.: Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance. Henry Holt and Company, New York (2014)
6.
go back to reference Arendt, H.: The Human Condition. Charles R. Walgreen Foundation Lectures, Second edn. University of Chicago Press, Chicago (1998) Arendt, H.: The Human Condition. Charles R. Walgreen Foundation Lectures, Second edn. University of Chicago Press, Chicago (1998)
7.
go back to reference Bailey, J.: From public to private: the development of the concept of “private”. Soc. Res. 69(1), 15–31 (2002)MathSciNet Bailey, J.: From public to private: the development of the concept of “private”. Soc. Res. 69(1), 15–31 (2002)MathSciNet
8.
go back to reference Ball, K., Haggerty, K., Lyon, D.: Routledge Handbook of Surveillance Studies. Routledge International Handbooks. Taylor & Francis, Milton Park (2012) Ball, K., Haggerty, K., Lyon, D.: Routledge Handbook of Surveillance Studies. Routledge International Handbooks. Taylor & Francis, Milton Park (2012)
9.
go back to reference Benkler, Y.: The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press, New Haven (2006) Benkler, Y.: The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press, New Haven (2006)
10.
go back to reference Birkhoff, G.: Tres observaciones sobre el algebra lineal. Univ. Nac. Tucumán Rev. Ser. A 5, 147–151 (1946) Birkhoff, G.: Tres observaciones sobre el algebra lineal. Univ. Nac. Tucumán Rev. Ser. A 5, 147–151 (1946)
11.
go back to reference Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A.D.: Handbook of Computational Social Choice. Cambridge University Press, Cambridge (2016) Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A.D.: Handbook of Computational Social Choice. Cambridge University Press, Cambridge (2016)
12.
go back to reference Burke, S.: Delos: investigating the notion of privacy within the ancient greek house. Ph.D. thesis, University of Leicester (2000) Burke, S.: Delos: investigating the notion of privacy within the ancient greek house. Ph.D. thesis, University of Leicester (2000)
13.
go back to reference Cervesato, I., Meadows, C., Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution protocols. In: Guttman, J. (ed.) Proceedings of CSFW 2005, pp. 48–61. IEEE (2005) Cervesato, I., Meadows, C., Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution protocols. In: Guttman, J. (ed.) Proceedings of CSFW 2005, pp. 48–61. IEEE (2005)
14.
go back to reference Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429–444 (1977) Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429–444 (1977)
15.
go back to reference Datta, A., Derek, A., Mitchell, J., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Secur. 13, 423–482 (2005)CrossRef Datta, A., Derek, A., Mitchell, J., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Secur. 13, 423–482 (2005)CrossRef
16.
go back to reference Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Abstraction and refinement in protocol derivation. In: Focardi, R. (ed.) Proceedings of CSFW 2004, pp. 30–47. IEEE (2004) Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Abstraction and refinement in protocol derivation. In: Focardi, R. (ed.) Proceedings of CSFW 2004, pp. 30–47. IEEE (2004)
17.
go back to reference Diffie, W., Landau, S.: Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press, Cambridge (2010) Diffie, W., Landau, S.: Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press, Cambridge (2010)
18.
go back to reference van Dijk, J.: The Network Society. SAGE Publications, Thousand Oaks (2012) van Dijk, J.: The Network Society. SAGE Publications, Thousand Oaks (2012)
19.
go back to reference Durgin, N., Mitchell, J., Pavlovic, D.: A compositional logic for proving security properties of protocols. J. Comput. Security 11(4), 677–721 (2004)CrossRef Durgin, N., Mitchell, J., Pavlovic, D.: A compositional logic for proving security properties of protocols. J. Comput. Security 11(4), 677–721 (2004)CrossRef
20.
go back to reference Yearwood, M.H., et al.: On wealth and the diversity of friendships: high social class people around the world have fewer international friends. Personality Individ. Differ. 87, 224–229 (2015)CrossRef Yearwood, M.H., et al.: On wealth and the diversity of friendships: high social class people around the world have fewer international friends. Personality Individ. Differ. 87, 224–229 (2015)CrossRef
21.
go back to reference Habermas, J.: The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Studies in Contemporary German Social Thought. MIT Press, Cambridge (1991) Habermas, J.: The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Studies in Contemporary German Social Thought. MIT Press, Cambridge (1991)
22.
go back to reference Hardy, G.H., Littlewood, J.E., Pólya, G.: Inequalities. The University Press (1934) Hardy, G.H., Littlewood, J.E., Pólya, G.: Inequalities. The University Press (1934)
23.
go back to reference Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. 110(15), 5802–5805 (2013)CrossRef Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. 110(15), 5802–5805 (2013)CrossRef
24.
go back to reference Malin, B., Sweeney, L.: Re-identification of DNA through an automated linkage process. In: American Medical Informatics Association Annual Symposium, AMIA 2001, Washington, DC, USA, 3–7 November 2001. AMIA (2001) Malin, B., Sweeney, L.: Re-identification of DNA through an automated linkage process. In: American Medical Informatics Association Annual Symposium, AMIA 2001, Washington, DC, USA, 3–7 November 2001. AMIA (2001)
25.
go back to reference Marshall, A.W., Olkin, I.: Inequalities: Theory of Majorization and Its Applications. Mathematics in Science and Engineering, vol. 143. Academic Press, Cambridge (1979) Marshall, A.W., Olkin, I.: Inequalities: Theory of Majorization and Its Applications. Mathematics in Science and Engineering, vol. 143. Academic Press, Cambridge (1979)
27.
go back to reference Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP 2008, pp. 111–125. IEEE Computer Society, Washington (2008) Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP 2008, pp. 111–125. IEEE Computer Society, Washington (2008)
28.
go back to reference Nielsen, M.A.: Characterizing mixing and measurement in quantum mechanics. Phys. Rev. A 63(2), 022114 (2001) Nielsen, M.A.: Characterizing mixing and measurement in quantum mechanics. Phys. Rev. A 63(2), 022114 (2001)
29.
go back to reference Orlin, L.C.: Locating Privacy in Tudor London. Oxford University Press, Oxford (2009) Orlin, L.C.: Locating Privacy in Tudor London. Oxford University Press, Oxford (2009)
30.
go back to reference Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web. Technical report, Stanford Digital Library Technologies Project (1998) Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web. Technical report, Stanford Digital Library Technologies Project (1998)
32.
go back to reference Pavlovic, D., Meadows, C.: Deriving authentication for pervasive security. In: McLean, J. (ed.) Proceedings of the ISTPS 2008, 15 p. ACM (2008) Pavlovic, D., Meadows, C.: Deriving authentication for pervasive security. In: McLean, J. (ed.) Proceedings of the ISTPS 2008, 15 p. ACM (2008)
35.
go back to reference Pavlović, D., Escardó, M.: Calculus in coinductive form. In: Pratt, V. (ed.) Proceedings of Thirteenth Annual IEEE Symposium on Logic in Computer Science, pp. 408–417. IEEE Computer Society (1998) Pavlović, D., Escardó, M.: Calculus in coinductive form. In: Pratt, V. (ed.) Proceedings of Thirteenth Annual IEEE Symposium on Logic in Computer Science, pp. 408–417. IEEE Computer Society (1998)
36.
go back to reference Popper, K.R.: Conjectures and Refutations: The Growth of Scientific Knowledge. Classics Series. Routledge, Abingdon (2002) Popper, K.R.: Conjectures and Refutations: The Growth of Scientific Knowledge. Classics Series. Routledge, Abingdon (2002)
37.
go back to reference Rogaway, P.: The moral character of cryptographic work. IACR Cryptology ePrint Archive 2015:1162 (2015) Rogaway, P.: The moral character of cryptographic work. IACR Cryptology ePrint Archive 2015:1162 (2015)
39.
go back to reference Schoeman, F.D.: Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge (1984) Schoeman, F.D.: Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge (1984)
41.
go back to reference Suzumura, K.: Rational Choice, Collective Decisions, and Social Welfare. Cambridge University Press, Cambridge (2009) Suzumura, K.: Rational Choice, Collective Decisions, and Social Welfare. Cambridge University Press, Cambridge (2009)
42.
go back to reference Sweeney, L.: Weaving technology and policy together to maintain confidentiality. J. Law Med. Ethics 25, 98–110 (1997)CrossRef Sweeney, L.: Weaving technology and policy together to maintain confidentiality. J. Law Med. Ethics 25, 98–110 (1997)CrossRef
43.
go back to reference Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 571–588 (2002)MathSciNetCrossRef Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 571–588 (2002)MathSciNetCrossRef
44.
go back to reference Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRef Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRef
45.
go back to reference Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4(5), 193–220 (1890)CrossRef Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4(5), 193–220 (1890)CrossRef
47.
go back to reference Zuboff, S.: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs, New York (2019) Zuboff, S.: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs, New York (2019)
Metadata
Title
Privacy Protocols
Authors
Jason Castiglione
Dusko Pavlovic
Peter-Michael Seidel
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-19052-1_12

Premium Partner