skip to main content
10.1145/1415472.1415486acmconferencesArticle/Chapter ViewAbstractPublication PagesplopConference Proceedingsconference-collections
research-article

Privacy patterns for online interactions

Published:21 October 2006Publication History

ABSTRACT

A proper security architecture is an essential part of implementing robust and reliable networked applications. Security patterns have shown how reoccurring problems can be best solved with proven solutions. However, while they are critical for ensuring the confidentiality, integrity and availability of computing systems, security patterns do not specifically (or necessarily) address the privacy of individuals. Building on existing privacy pattern work, we identify three privacy patterns for web-based activity: INFORMED CONSENT FOR WEB-BASED TRANSACTIONS, MASKED ONLINE TRAFFIC, and MINIMAL INFORMATION ASYMMETRY. The first pattern addresses a system architecture issue and draws on Friedman's model for informed consent. The second and third patterns provide support for end users and extend Jiang's 'Principle of Minimum Asymmetry.' These patterns describe how users can protect their privacy by both revealing less about themselves, and acquiring more information from the party with whom they are communicating.

References

  1. Yoder, J. and Baraclow, J., "Architectural Patterns for Enabling Application Security," In Proceedings of Pattern Languages of Programs (PLoP), 1997.Google ScholarGoogle Scholar
  2. Matjaz, M., Nashi, N., Berry, C., Kunnumpurath, M., Carnell, J. and Romanosky, S., "J2EE Design Patterns Applied," WROX Press, 2002.Google ScholarGoogle Scholar
  3. Markus, M., Fernandez, E., Hybertson, D., Buschmann, F. and Sommerlad P. (editors) "Security Patterns: Integrating Security and System Engineering," Wiley Press, 2006.Google ScholarGoogle Scholar
  4. Blakely, B., Health, C., "Security Design Patterns," The Open Group, 2004.Google ScholarGoogle Scholar
  5. Steel, C., Nagappan, R. and Lai, R., "Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management," Prentice Hall, 2005.Google ScholarGoogle Scholar
  6. International Standards Organisation, "Common Criteria for Information Technology Security Evaluation," http://www.commoncriteriaportal.org/public/consumer/index.php?menu=2, 1999.Google ScholarGoogle Scholar
  7. Schumacher, M., "Security Patterns and Security Standards - With Selected Security Patterns for Anonymity and Privacy," European Conference on Pattern Languages of Programs (EuroPLoP), 2002.Google ScholarGoogle Scholar
  8. Chung, E. S., Hong, J., Lin, J., Prabaker, M. K., Landay, J. A., and Liu, A., "Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing," In Proceedings of Designing Interactive Systems (DIS2004), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Schümmer, T., "The Public Privacy -- Patterns for Filtering Personal Information in Collaborative Systems," In Proceedings of the Conference on Human Factors in Computing Systems (CHI) 2004.Google ScholarGoogle Scholar
  10. Friedman, B., Millett, L. and Felten, E., "Informed consent online: A conceptual model and design principles," UW CSE Technical Report 00-12-02. Seattle, WA: University of Washington, Department of Computer Science and Engineering, 2000.Google ScholarGoogle Scholar
  11. Friedman, B., Howe, D. C. and Felten, E., "Informed consent in the Mozilla browser: Implementing Value-Sensitive Design," In Proceedings of the Thirty-Fifth Annual Hawai'i International Conference on System Sciences, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Duncan, G. and Pearson, R., "Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future," Statistical Science, Vol 6, No3, pp219--239, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  13. Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P. and Stal, P., "Pattern-Oriented Software Architecture," John Wiley & Sons, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Acquisti, A., "Privacy in Electronic Commerce and the Economics of Immediate Gratification", In Proceedings of the ACM Electronic Commerce Conference (EC 04). New York, NY: ACM Press, 21--29, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Cranor, L. F., "Web Privacy with P3P," O'Reilly Media Inc., 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jiang, X., Hong, J. and Landay, J., "Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing," University of California Berkeley, 2002.Google ScholarGoogle Scholar
  17. Goldschlag, D., Reed, M., and Syverson, P., "Onion Routing for Anonymous and Private Internet Connections," Communications of the ACM, vol. 42, num. 2, February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Serjantov, A., Danezis, G., "Towards an Information Theoretic Metric for Anonymity," University of Cambridge, 2002.Google ScholarGoogle Scholar
  19. Engelman, S., Cranor, L. F. and Chowdury, A., "An analysis of P3P-Enabled web sites among Top-20 Search Results," Carnegie Mellon University, 2005.Google ScholarGoogle Scholar
  20. Odlyzko, A., "Privacy, Economics, and Price Discrimination" Digital Technology Center, University of Minnesota, 2003.Google ScholarGoogle Scholar
  21. Cranor, L. F., Reagle, J. and Ackerman, M., "Beyond Concern: Understanding Net Users' Attitudes About Online Privacy," AT&T Labs, 1999.Google ScholarGoogle Scholar
  22. Reiter, M. and Rubin, A., "Crowds: Anonymity for Web Transactions," Communications of the ACM, 1999.Google ScholarGoogle Scholar
  23. Chaum, D., "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, v. 24, n. 2, pp. 84--88, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Dingledine, R., Mathewson, N., and Syverson, P., "Tor: The Second-Generation Onion Router," In Proceedings of the 13th USENIX Security Symposium, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Danezis, G., Dingledine, R. and Mathewson. N., "Mixminion: Design of a Type III Anonymous Remailer Protocol," IEEE Symposium on Security and Privacy, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Davis, J., "The Experience of 'Bad' Behavior in Online Social Spaces: A Survey of Online Users," Social Computing Group, Microsoft Research, 2002.Google ScholarGoogle Scholar
  27. Noam, E., "Privacy and Self-Regulation: Markets for Electronic Privacy" Privacy and Self-Regulation in the Information Age," US Department of Commerce, 1997.Google ScholarGoogle Scholar
  28. Akerlof, G., "The Market for Lemons: Quality uncertainty and the Market Mechanism," Quarterly Journal of Economics, 84(3), pp. 488--500, 1970.Google ScholarGoogle ScholarCross RefCross Ref
  29. Sadicoff, M., Larrondo-Petrie, M., and Fernandez, E., "Privacy-Aware Network Client Pattern," Proceedings of the Pattern Languages of Programs, 2005.Google ScholarGoogle Scholar

Index Terms

  1. Privacy patterns for online interactions

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            PLoP '06: Proceedings of the 2006 conference on Pattern languages of programs
            October 2006
            397 pages
            ISBN:9781605583723
            DOI:10.1145/1415472

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 21 October 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate28of36submissions,78%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader