Managing Privacy and Trust in P2P Communication 2.10.2003 v. 0.7 Privacy, Economy and Trust in P2P Content.

Slides:



Advertisements
Similar presentations
A leading provider of Content Identification & Monetization services, powering next generation Community and UGC web-sites.
Advertisements

Enabling Responsible International Workplaces New FFC Partnership Model.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
Interpersonal skills & Communication Edina Nagy Lajos Kiss Szabolcs Hornyák.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. It protects the right to: -Express ourselves.
Power and Conflict Dr. Yu Fu
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Trust on the Network. What is Trust  Trust is approached differently by different disciplines  Economics Rational trust exhibited through behavior 
How is the IT-Driven Concept of “Permission Marketing” Changing the Way Companies Establish Customer Relationships Using “Old” Media as well as New? By.
Dejan Lavbič University of Ljubljana, Faculty of Computer and Information Science, SLOVENIA.
Your Smart Solutions Partner Cristian Apa, Sales Director.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
1 Public Commerce brief introduction of the concept Vagan Terziyan University of Jyvaskyla, Finland
STATES AS THE PROBLEM The Predatory State 1. Power to Protect Property = Power to Take Property 2. Fiscal Illusion (citizen’s limited information) Accountability/Responsiveness.
Networks ∙ Services ∙ People John DYER TF-MSP Video Conference Community Procurement Support Building on the SPOT-ON Proposal Smart Procurement,
April 6, 2009 Ted Lesher - NexPrise, Inc..  Introduction/NexPrise Background  What is Software as a Service and how can it benefit my school?  Data.
EU cooperation, EU projects and their implications Simone Fischer-Hübner Karlstad University.
TV-Anytime (and the myTV project) Ronald Tol Philips Research.
Online marketing communications
Internet 2 Corporate Value Proposition Stuart Kippelman (J&J) Jeff Lemmer (Ford) December 12, 2005.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Collaboratories for Sustainable Design Matthew Kam Feb 27, 2003.
Preserving our audiovisual heritage Plan for a national television and radio archive.
SALMON (Sharing as an Alternative for Locking up the Music On the Net) – A proposal for NETS/Valtavirran.
E-BUSINESS. ই - বিজনেস  ইলেকট্রনিক্স ডিভাইস ব্যবহার করে সংঘটিত বিজনেসকে ই - বিজনেস বলা যেতে পারে।
UN CEFACT Single Window Recommendation Simplifying International Trade Gordon Cragge Chair – International Trade Procedures Working Group (TBG 15 of UN.
Digital Social Innovation (Digital) Innovation (Digital) Social Innovation Crowdsourcing, crowdfunding Collaboration / social values Competition / economic.
Ethernet Basics - 5 IGMP. The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report.
Creating Videos for the Web February 19, 2013 Presenter:Facilitators: Logan Goulett Manager, Member Communications Mary McNamara Assistant VP, Membership.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
An Open Source Firewall/Router Software Kwan – Chris – Jonathan ITEC451 – H. Lee.
Kavi Workspace Spring Advance the Standard Agenda - About Kavi - Kavi Workspace – Standards Process Management - Kavi Workspace – The Users and.
Economic Incentives in Information- Centric Networking: Implications for Protocol Design and Public Policy Group Members: Muhammad Kamran Siddique Adel.
PIC.edu Survey Review Internet2 Presence & Integrated Communications Working Group Fall Member Meeting, 2007.
Updated September 30, 2010 Open Health Tools (OHT) Strategic Plan.
Session 6: Summary of Discussion A. Institutional Barriers and Potential Solutions 1. Natural environment does not have national or institutional boundaries,
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Legitimate Vulnerability Markets By: Jeff Wheeler.
What Makes Users Refuse Web Single Sign-On? An Empirical Investigation of OpenID Daniel Smith.
1 Innovation in Services Business Service Design and Innovation Fostering the Economic and Legal Framework for Innovation Performance and Development of.
Dr. Martin Halbert Dr. Katherine Skinner Digital Preservation: What’s Now, What’s Next. Amigos Online Conference, August 12, 2011.
Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
Agents that Reduce Work and Information Overload and Beyond Intelligent Interfaces Presented by Maulik Oza Department of Information and Computer Science.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
Centre for Information & Knowledge Management INFORMATION SYSTEMS MANAGEMENT Jamie O’Brien Centre for Information & Knowledge Management University of.
The Clusters – An Advanced Concept In Educational Management Common borders. Common Solutions. EUROPEAN UNION.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Introduction to Information Retrieval Example of information need in the context of the world wide web: “Find all documents containing information on computer.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Article 28(2) USD Introduction. The Problem Fraud and Misuse scale Evolving risks Impact on end users –Direct financial impact –Direct inconvenience Indirect.
Development of a community-based participatory network for integrated solid waste management By: Y.P. Cai, G.H. Huang, Q. Tan & G.C. Li EVSE, Faculty of.
Creating Videos for the Web February 19, 2013 Presenter: Heather Gwaltney.
Tshilidzi Tshiredo. Introduction Long time ago even before technologies, social networking platforms and mobile devices, Dewey, J.( ) stated that.
Design Research and Ideas Generation CD201 The psychology of Space u BBCD Melbourne BAPDCOM Version 1 - October,
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
Agenda Past & Present Who we are & what we do Activities Challenges.
Fall 2006CS 395: Computer Security1 Key Management.
National Accounting Ch 1: The nature of the national accounting. Ch 2: National Commodities. Ch 3: The basic concepts of the national accounting. Ch 4:
Coordinated Resource Management Planning (CRMP) Who, What, Where, Why, When ?? So What ??
WREC Working Group IETF 49, San Diego Co-Chairs: Mark Nottingham Ian Cooper WREC Working Group.
Experience from H2020 Proposals (a personal assessment)
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
What is Blockchain (Distributed Ledger Technology)?
Cloud Computing for Wireless Networks
Presentation transcript:

Managing Privacy and Trust in P2P Communication v. 0.7 Privacy, Economy and Trust in P2P Content Distribution

Types of Communication We look at three types of communication: –Person-to-person communication Examples: IM, , VoIP, SMS/MMS –Group communication Sharing information in a group Example: Private comments and annotations on business news shared with selected other users –Broadcast (Commercial) content distribution Example: News service where users comment items publicly thus becoming content creators

P2P Communication P2P can offer radically new possibilities for all forms of communication (broadcast, group, person-to-person): –Lower transaction costs (users pay for it) –Better geographical reach (users act as routers) –Better service availability (no single point of failure)

We Need Privacy and Trust Who are we communicating with? How do we protect the privacy of each user’s communication and communication patterns? Who do we trust as a source of information? How do a convince others that I am trustworthy? How is trust (karma) gained? How is trust different if the source is an individual or a community? Is the information received from others received intact? How to balance privacy with the need for earning trust? Can we solve some privacy and trust problems by creating vs. depriving economic incentives for good vs. bad behaviour?

Trust Model We have the technology for enforcing many of these issues, but they are all governed by a trust model. How is this model gained? From outside the system: –The person communicating knows the other party and knows they are trustworthy –Social filtering The system learns/deduces the trustworthiness –Devices in close proximity are likely to participate in a meeting –Communication history (# of past successful/failed transactions) determines the degree of trust

Trust Models for P2P Some of the above problems already have a centralised solution In a P2P environment, we need a distributed solution for trust modelling –General solution is a tough nut to break –Instead, we propose studying trust and privacy through studying progressively broadcast, group, and person-to-person communication integrated as a single focused “communications gadget”

Project Proposal Three-year project –4 researchers –Annual budget of ~270 k€ E.g., 4 companies, ~15 k€ each per year Deliverables –Insight into P2P, novel solution concepts –Sequence of demonstration prototypes year 1: P2P “broadcast” year 2: year 1 + P2P group communication year 3: year 2 + P2P VOIP or P2P IM –Scientific publications, theses

Progression Each year focuses on a new theme and builds on the previous years –Uses results from STAMI project as baseline Co-operation with other research institutes –Example: economic issues with Berkeley Goal: communication management is done with minimal user interaction –We automate most of the tasks –The remaining ones are integrated in the work flow

Year 1: Broadcast Communication Baseline: STAMI demonstration prototype for simple P2P content distribution Extensions: –User-originated annotations, karma, … Focus: Users as P2P broadcasters –How to enable user-originated information to be distributed effectively in a P2P network? –How to motivate users to donate bandwidth and battery resources to other users? –How to prevent / discourage unwanted use? –How to preserve privacy while enabling trust building?

Year 2: Group Communication Baseline: Year 1 Extensions: –Discussions limited to a group –Group management Focus: Managing group membership –How do we create, manage and dissolve a group in an ad-hoc situation? –How do we manage different group members rights to participate in communications? –Example: sharing contact information and presentation material with all parties in this meeting

Year 3: Person-to-Person Communication Baseline: Year 2 Extensions: –Some person-to-person communication facility (P2P VOIP, P2P IM, …), preferably on the basis of an existing open source solution Focus: Identity sharing and management –How can the different communication channels (broadcast, group, person-to-person) share user identities? –How to manage the various rights associated with various identities?